A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network

Formal verification Authentication and key exchange protocol Real-or-random model Electronic computers. Computer science Internet of vehicles QA75.5-76.95 Insecure channel
DOI: 10.1007/s44196-025-00754-2 Publication Date: 2025-02-10T13:40:12Z
ABSTRACT
Abstract The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like identity leakage, man in the middle attack, key leakage and etc., are also introduced simultaneously and still challenging to be solved. Researches and practices have shown that authentication and key exchange protocols are effective methods to solve such security issues. However, most existing security protocols for Internet of Vehicles are established on the premise that the registration process is with a secure channel, which is usually not satisfied and deviates from practical applications. Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (28)
CITATIONS (0)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....