检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:刘静婷 刘高 王宁[1] 向涛[1] LIU Jingting;LIU Gao;WANG Ning;XIANG Tao(College of Computer Science,Chongqing University,Chongqing 402676,China)
出 处:《网络空间安全科学学报》2024年第5期87-98,共12页Journal of Cybersecurity
基 金:国家重点研发计划(2022YFB3103500);国家自然科学基金(62302070,62101079,62272073,62402202,62202071);重庆市自然科学基金(cstc2021jcyj-msxm0465,cstc2021jcyj-msxmX0273);重庆市留学人员回国创业创新支持计划(cx2021012);成都市科技计划(2023-YF11-00020-HZ);中国博士后科学基金(2023M740399,2022M710520,2022M710518);教育部装备预研联合基金(8091B032127)。
摘 要:车辆与路边单元(RoadSide Units,RSUs)之间的认证密钥协商(Authenticated Key Agreement,AKA)协议在车联网(Vehicular Ad-hoc Networks,VANETs)中至关重要。然而,现有的解决方案仍然存在效率低下的问题。为了解决这个问题,提出一种面向VANETs的轻量级匿名AKA协议,支持车辆与RSUs之间的轻量级匿名认证和密钥协商。通过轨迹规划,将车辆的认证信息提前同步到目标RSUs,加速认证,使得RSUs可以在车辆到达之前做好身份验证的准备,并防止可信权威机构(Trusted Authority,TA)干涉车辆与RSUs之间的AKA。采用轻量级加密操作,降低了计算开销和通信开销,确保AKA的高效性。安全分析表明,本方案不仅可以实现匿名性、条件隐私性、假名不可链接性、免密钥托管和物理安全,而且能够抵御大多数已知攻击。对比实验结果表明,此方案在轻量化设计方面优于现有方案。Authenticated key agreement(AKA)protocol between roadside units(RSUs)and vehicles is a crucial aspect of vehicu-lar ad-hoc networks(VANETs).Nevertheless,existing solutions still have the problem of low efficiency.In order to resolve this issue,a lightweight anonymous AKA protocol specifically designed for VANETs was proposed.It supported lightweight anonymous authentica-tion and key agreement between vehicles and RSUs simultaneously.The trajectory planning was employed to synchronize the authenti-cation information of vehicles to target RSUs in advance for accelerating the authentication,ensuring that RSUs were ready for identity authentication before the vehicles arrive,and eliminating the need for the trusted authority(TA)to participate in each mutual AKA in-stance.By employing only lightweight cryptographic operations,the computational and communication overheads were reduced,guaran-teeing the efficiency of AKA.Security analysis demonstrates that this protocol not only achieve anonymity,conditional privacy,pseudonym unlinkability,key escrow freeness and physical security,but also withstand most known attacks.Comparative experimental results indicate this protocol’s superiority compared to existing protocols in terms of efficiency.
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.229