4.7 Article

Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TNSE.2021.3093435

关键词

Protocols; Authentication; Security; Vehicular ad hoc networks; Wireless communication; Password; Smart cities; Internet of Vehicles (IoV); communication; security; mutual authentication; AVISPA; ROR model; Honey list

资金

  1. National Research Foundation of Korea (NRF) - Ministry of Education [2020R1I1A3058605]
  2. BK21 FOUR - Ministry of Education, Korea [4199990113966]
  3. National Research Foundation of Korea [2020R1I1A3058605] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

VANET and IoV technologies are crucial for smart city systems, with V2V communication ensuring traffic system management and road safety. A lightweight protocol is proposed for regional segmentation management and overhead resolution, utilizing mutual authentication and honey_list technology for security.
Vehicular Ad Hoc Network (VANET) and Internet of Vehicle (IoV) technologies are particularly attracting attention from industrial communities because of the intelligent transportation systems of smart city technologies. Vehicle-to-vehicle (V2V) communication of VANET can guarantee traffic system management and road safety. However, V2V communication cannot manage many vehicles as a whole, so it needs to be segmented and communicated by region. Therefore, considering locality, key agreement is made for V2V communication of the same or different regions. Moreover, traditional public key infrastructure (PKI) and Kerberos systems to be applied in a real environment incur computational overhead. Therefore, we proposed a lightweight protocol for dynamic properties of vehicles for regional segmentation management and overhead resolution. In addition, because vehicle information is transmitted through public channels, our protocol uses mutual authentication and honey_list technology to ensure security against a variety of attacks. It provides verification of safety through a detailed security analysis using the formal analysis using the widely-accepted Real-Or-Random (ROR) model, and verifies formal security using the Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool and non-mathematical (informal) security analysis. In addition, a detailed comparative study that the proposed scheme can be applied in the communication environment between actual vehicles as compared to other existing competing schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据