This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
It is an inevitable trend that all things are connected. With the development of the IoV, vehicular networks are becoming more and more important in modern life [1]. By the continuous increase of motor vehicles, road traffic has become gradual complex, which results in higher requirements for the IoV [2, 3]. As mobile cellular networks rapidly develop, 5G networks have officially entered our lives. Due to the characteristics of 5G networks (high speed, low latency, high reliability, and wide coverage) and the newly concomitant technologies (millimeter wave communication, MIMO, D2D, etc.), it greatly improves the mobile Internet field of IoV [4–6]. Supporting Internet of Vehicles services through 5G network technology can overcome the limitations of current IoV. Recently, more attention is paid on the integration of 5G technology and the IoV [7].
The deepening application of 5G technology provides a strong guarantee for the vehicular networks. The current research of vehicular networks focuses on driving safety, improving the traffic efficiency of vehicles, ensuring the safe and efficient communication between vehicle and vehicle (V2V) and vehicle and roadside infrastructure (V2I), and realizing the vehicle safety applications such as emergency braking warning [2]. This can effectively avoid vehicle collisions or reduce the personal injury caused by traffic accidents. Vehicular network communication mainly relies on Cellular Vehicle to Everything (C-V2X) [8]. Through the communication among vehicle to vehicle, vehicle to person, vehicle to infrastructure, and vehicle to network, it can ensure the driving safety and comfort and drive the realization of automatic driving.C-V2X includes two standards: Long-Term Evolution Vehicle to Everything (LTE-V2X) and 5G Vehicle to Everything (5G-V2X). Compared with the two standards, the performance of 5G-V2X is better than that of LTE-V2X [9]. LTE-V2X has insufficient delay and reliability, while 5G-V2X has the advantages of long coverage time, low delay and high reliability. It can obtain various state information of the road timely and accurately, interact with each other in real time, and complete the driving task better. It is the key technology of the future of the Internet of vehicles application, especially the autonomous driving and overtake, which require very low network latency [10]. At the same time, as a kind of ultrareliable and low-latency communications (URLLC), it requires safe and reliable authentication and low computation overhead [11, 12]. Therefore, a better solution is to use group key agreement (GKA) in vehicle group [13]. In this way, the vehicle group communicate safely. So, our paper mainly studies the key agreement scheme between groups in the Internet of Vehicles under the 5G networks. In addition, due to the openness of the wireless channel, the signal exposed in the open environment is likely to be stolen, interfered, or even modified by the attacker, which brings adverse effects to the vehicular networks [14–17].
This paper proposes a vehicle group authentication protocol based on extended chaotic mapping in 5G networks. This solution enables the participating vehicles to communicate securely through the group key in the 5G networks. Therefore, this paper mainly does the following work:
(1) This paper proposes a vehicle group authentication scheme under the 5G network architecture. In order to protect the security of RSU, the shared key will be updated. In addition, this scheme is a lightweight authentication scheme based on extended chaotic mapping and distributes group key through Chinese remainder theorem
(2) This paper verifies the security of the scheme by using the Scyther tool
(3) By comparing the existing schemes, this scheme can effectively reduce the computation and communication overhead
Other parts of this paper are as follows. Section 2 reviews the related research work of this paper. Section 3 introduces the preliminary knowledge of this paper. Section 4 introduce a lightweight and secure vehicle group authentication protocol in detail. We carried out security and performance analysis, respectively, in Sections 5 and 6. Finally, Section 7 summarizes the full paper.
2. Related Work
At present, in order to solve the problems faced by vehicular networks, the scholars have proposed many authentication schemes for vehicular networks. The following mainly introduces from three aspects: group signature authentication, group key agreement, and based on trusted authority.
First, we introduce the authentication protocol based on group signature. In 2011, Huang et al. [18] proposed an anonymous batch identity authentication and key agreement protocol in the Internet of Vehicles. The scheme could not only authenticate request messages from multiple vehicles but also carry out key agreement. Cui et al. [19] proposed a solution based on software without relying on any special hardware. In the batch verification stage, it adopted cuckoo filtering and binary search methods, which achieved a higher success rate than previous solutions. Vijayakumar et al. [20] proposed a privacy preserving anonymity scheme with high computational efficiency. At the same time, an efficient anonymous batch authentication protocol was introduced to authenticate multiple vehicles on the road of the Internet of Things, which reduced the authentication time and was more efficient in certificate and signature verification. These schemes can complete the certification of vehicle group. However, these schemes will bring higher verification costs, thereby affecting the performance of the schemes.
Next, we introduce the related group key agreement. In 2016, Han et al. [21] established an efficient group authentication scheme by adopting a self-certification without certification authority. The scheme could set up groups between roadside units and vehicles. In [22], Vijayakumar et al. proposed a dual group key scheme, which distributed the group keys to each vehicle and ensured that the group keys were updated. In [23], Vijayakumar et al. proposed an effective anonymous group key distribution protocol, which can safely distribute the group key to the vehicle group. The RSU can use the group key to send location-based information to the vehicle group in a secure way. In 2018, Cui et al. [24] proposed a conditional privacy preserving authentication scheme based on hash function. The scheme distributed group keys through the mechanism of the Chinese remainder theorem (CRT) and provided update mechanism for vehicles to join and leave. Zhang et al. [25] proposed an identity authentication scheme based on the Chinese remainder theorem (CRT). This scheme avoided the use of bilinear pairing operations and solved the leakage problem of side channel attacks, and both safety and performance were guaranteed. In [26], Lai et al. proposed a lightweight group access authentication scheme based on message authentication code aggregation technology, which could resist DoS attacks. In 2019, Zhang et al. [27] proposed a group key agreement protocol, in which directional attribute layering was used. Shi et al. [28] proposed a password-based conditional confidentiality authentication and group key generation protocol. The protocol provided the generation of group keys, and the calculation and communication overheads were small. In 2020, Gharsallah et al. [29] proposed a scheme to authenticate a group of vehicles in 5G networks. The protocol supported group authentication of vehicle equipment in 3GPP network. Cui et al. [13] proposed a session key agreement scheme based on chaotic mapping. In this scheme, the fog server was introduced, and the chaotic mapping algorithm was used for group key agreement between vehicles. In this group, vehicles could communicate with each other through group key. Zhang et al. [30] proposed a privacy preserving authentication framework based on edge technology in 5G-enabled vehicular networks. In this scheme, edge computing was used to calculate and verify on vehicles, so as to achieve the communication between vehicles. Ouaissa et al. [31] proposed an authentication protocol for a large number of vehicle equipment following 5G-AKA authentication framework. The protocol used ECDH algorithm to establish the key and authenticate the identity, which ensured the information security and integrity. Although the scheme could resist a variety of attacks, the computation overhead was relatively large. Although these schemes reduced the cost of verification, some schemes had a large computation and communication overhead, which affected the performance of the schemes.
Thirdly, we introduce the authentication protocol based on trusted authority. Azees et al. [32] proposed an effective anonymous authentication scheme. The scheme provided a conditional tracking mechanism to prevent malicious vehicles from entering the VANET. Zhang et al. [33] proposed a many-to-many authentication and key agreement scheme for security authentication between multiple vehicles and CSP. Under the premise of information leakage, this scheme could prevent illegal access and provide key security. In 2019, Cui et al. [34] proposed a lightweight authentication protocol based on reputation system for 5G-enabled vehicular networks. The authority was responsible for reputation management, and vehicles with low reputation score could not participate in communication, which significantly reduces the possibility of untrusted vehicles entering IoV. Huang et al. [35] proposed a new privacy preserving authentication scheme based on 5G software-defined vehicular networks. This scheme uses 5G software to define the advantages of the network, so that the vehicle certification process will only need light-weighted hash operation, thus greatly reducing the computation overhead. Li et al. [36] proposed a lightweight authentication scheme. In this scheme, only hash function and XOR operations are used to realize vehicle identity authentication and anonymity. Wang et al. [37] proposed a lightweight authentication protocol that could avoid emergency vehicles in VANET. After the first authentication with the nearest roadside unit, the scheme could complete the mutual authentication with the subsequent roadside unit without repeating the cumbersome calculation. Although these schemes can resist various attacks and ensure the safety of vehicles, they are not suitable for vehicle group authentication, and some schemes have relatively large computation overhead.
3. Preliminaries
3.1. System Model
This paper mainly studies the vehicle communication in the same RSU range in V2V communication. As shown in Figure 1, the specific system model includes the following communication entities.
[figure omitted; refer to PDF]
5G core (5GC): 5GC controls the entire 5G-V2X network and provides mobile data connection and services. 5GC is divided into access and mobility management function (AMF), security anchor function (SEAF), authentication server function (AUSF), authentication credential repository and processing function (ARPF), and unified data management (UDM) [38]. AMF is responsible for handling connection and mobility management tasks. SEAF is used for authentication and communication. AUSF performs identity verification. ARPF calculates authentication data and keys. UDM carries functions related to data management. According to literature [38], UDM should be protected from physical attacks. In addition, in order to ensure the security of vehicle identity, the security is provided and insured by technical and legal [39]. In order to simplify the certification process and facilitate research, they are collectively referred to as 5GC.
Trusted authority (TA): TA is a completely trusted public organization, which is mainly responsible for system initialization, generation of public parameters, and registration for other entities participating in communication. In the registration stage, TA generates the pseudonym of the vehicle, then records the real identity of the vehicle, and shares the data with 5GC through the secure channel [29]. When a malicious vehicle is found, the 5GC can directly identify the opponent by searching for the malicious vehicle.
Roadside unit (RSU): RSU is an important communication entity in the system. It acts as a roadside unit to communicate with the vehicle in real time.
Vehicles: Each vehicle has an on-board unit (OBU), and each OBU has an antitampering device to protect secret information. It is responsible for collecting relevant information and transmitting other vehicles and RSU.
3.2. Security Requirements
The main goal of this article is to design a lightweight, safe, and effective vehicle group communication solution in the 5G networks to ensure the safe communication of the vehicular networks. Therefore, here are the security requirements to be met [13, 29–31, 34–37, 40–45].
(1) Anonymity: the true identity of the vehicle must not be disclosed to any organization or user other than the authority and 5GC. To ensure that the attacker cannot obtain the true identity of the vehicle from the transmitted data, the vehicles participating in the communication should use fake identities
(2) Message authentication and integrity: in the process of vehicle communication, the authenticity and integrity of the transmitted data should be guaranteed. The receiver can confirm that the received content is a true and complete message by authenticating the sender, rather than a message forged or modified by others
(3) Traceability: when there is a malicious vehicle that releases false information, the authority can quickly trace the real identity of the malicious vehicle and broadcast its real identity to the outside world
(4) Unlinkability: the attacker cannot link different messages of the same vehicle through intercepted transmission data.
(5) Common attack resistance: it can resist common attacks such as replay attacks, man-in-the-middle attacks, and modification attacks in the Internet of Vehicles
3.3. Chebyshev Chaotic Mapping
Bergamo et al. [46] clearly proposed that public-key cryptographic algorithms designed based on the semigroup characteristics of Chebyshev polynomial did not satisfy security. Therefore, the solution in this paper adopts the more secure extended Chebyshev polynomial proposed by Zhang [47], which is defined as follows:
Definition 1.
Let
The iterative relation of Chebyshev polynomial is as follows:
Property 2.
Semigroup property
Let
Property 3.
Discrete logarithm problem of extended Chebyshev polynomials
Here, the value of the extended Chebyshev polynomial is
Property 4.
Extended Chebyshev polynomial DH problem
Given
3.4. Chinese Remainder Theorem
The definition of Chinese remainder theorem [50, 51] is as follows: Let
Then, the positive integer solution of the congruence equation system can be expressed as:
4. Proposed Scheme
Based on research [13, 18–36, 48], this paper proposes a vehicle group authentication protocol based on extended chaotic mapping in 5G networks. This solution enables the participating vehicles to communicate securely through the group key in the 5G networks. Table 1 lists the main notations used here. Figure 2 shows the detailed authentication process of the protocol.
Table 1
Notations.
| Notations | Definitions |
| TA | A trusted authority |
| RSU | A roadside unit |
| OBU | On-board units |
| The hash function | |
| {G} | Mutually prime nonrepeating positive integer library |
| Exclusive-OR operation | |
| || | Concatenation operation |
| The timestamp | |
| The large prime number | |
| The system public key | |
| The system master key | |
| Message authentication code |
4.1. System Setup
In this stage, TA generates public parameters and master private key for the system and preloads the public parameters to the RSU and vehicle. TA selects large prime numbers
4.2. Registration
At this stage, the vehicle and RSU obtain the required system parameters from TA and register with TA. The specific registration process is as follows.
(1) RSU registration
(2) Vehicle registration
The vehicle
Here, the registration data stored in TA are shared with 5GC through secure channel.
4.3. Access Authentication
(1) When
(2) When the vehicle receives the notification, the
(3)
(4) When 5GC receives the message, it first verifies the validity of the timestamp
(5) After receiving the message sent by 5GC,
(6) When the corresponding message is received in the group vehicles, the
(7) When
(8) After 5GC receives the sent message, it verifies whether OCCVS and CCVS are equal. If they are equal, the group members are successfully authenticated
5. Security Evaluation
5.1. Formal Verification with Scyther Tool
Here, we use the Scyther tool to verify our protocol, which is a formal verification tool for security protocols [52]. There are many models in the Scyther, such as standard Dolev-Yao model, CK model, and eCK model. By using the Scyther to model our protocol, the Scyther can effectively discover potential security issues. The tool evaluates the confidentiality and authenticity of protocol information by writing protocol roles. Moreover, the tool provides a friendly graphical user interface, which is convenient to analyze and verify the complex attack scenarios on the target protocol. Authentication statement in Scyther is as follows: Alive, Weakagree, Niagre, and Nisynch are used to detect malicious attacks such as replay attacks, reflection attacks, and man-in-the-middle attacks [53].
In this scheme, there are four roles: GV, RSU, 5GC, and TA. Since the protocol proposed in this paper is secure in the registration phase, we only consider the security in the access authentication phase. In the process of verification, we choose Dolev–Yao model to test, because attackers can carry out related attacks by controlling the network in this model. The simulation results based on Scyther are shown in Figure 3. It can be concluded from the results that our scheme successfully meets all the requirements of the Scyther confidentiality and authentication and resists attacks.
[figure omitted; refer to PDF]5.2. Security Analysis
According to the safety requirements given in the previous chapter, the following safety analysis is given.
(1) Anonymity: this is an important aspect of vehicle privacy protection. In our proposed scheme, vehicles have communicated through the use of pseudonym
(2) Message authentication and integrity: the communication entities in the scheme verify each other’s legitimacy by verifying the message authentication code, so the scheme can provide message authentication. Since the generation of the message authentication code is based on the extended Chebyshev polynomial DH problem, the message authentication code is secure. Therefore, the integrity of the message can be verified
(3) Traceability: once a message is disputed, according to the report message sent by the malicious vehicle and the pseudoidentity, TA can trace back the true identity of the malicious vehicle by calculating
(4) Unlinkability: because the scheme uses random numbers and timestamps, the messages transmitted over the network are different. In addition, since the pseudoidentity of the vehicle is dynamically updated, the attacker cannot confirm that they are from the same sender.
(5) Resistance to common attacks: the proposed scheme should be able to resist the following common types of attacks:
(a) Resistance replay attack: since a timestamp is attached to the message, by checking the validity of the timestamp, the entities participating in the authentication can find out whether message replay has occurred
(b) Resistance modification attack: in our proposed scheme, the message authentication code is calculated by the secret value held by the corresponding entity. And the secret value is updated dynamically. Therefore, the entity can verify whether the message has been modified
(c) Resistance man-in-the-middle attack: according to the analysis of the previous message authentication and modification attacks, once an attacker intercepts and maliciously changes the message in transmission, the entity verifies that the message authentication code in the message cannot be passed. This can be quickly found that the transmission content has been changed
(d) Resist counterfeit attacks: in order to disguise a legitimate vehicle to send a request message, the adversary needs to send correct
5.3. Security Comparison
Through the previous safety analysis, we show the comparison results with other schemes in Table 2. Comparison of the results in the table show that our scheme has better security performance.
Table 2
Security features comparison.
| Functionality | [24] | [29] | [13] | [30] | [35] | [36] | [31] | Our scheme |
| Anonymous | Yes | No | No | Yes | Yes | Yes | Yes | Yes |
| Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Integrity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Traceability | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Unlinkability | Yes | Yes | No | No | Yes | Yes | No | Yes |
| Replay attack | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Man-in-the-middle attack | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Counterfeit attack | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes |
| Batch certification | No | Yes | Yes | Yes | No | No | No | Yes |
6. Performance Analysis
By computation overhead and communication overhead, we evaluate the performance of the scheme. Here, we will mainly compare the performance of some schemes similar to our proposed scheme, so our main comparison schemes are [13, 30, 31, 33]. Here,
6.1. Computation Overhead
In terms of computation overhead, we evaluated the proposed scheme on a laptop. We tested the calculation time of ECC-based scalar multiplication
Table 3
Computation overhead.
| Protocol | Total computation overhead | Total execution time |
| [33] | 0.546093 | |
| [13] | 0.28025 | |
| [30] | ||
| [31] | 0.263078 | |
| Our scheme |
As can be seen from Figure 4, compared with other schemes, our scheme has the least computation overhead. When the number of vehicles are increasing, the advantage will be more obvious.
[figure omitted; refer to PDF]6.2. Communication Overhead
Before analyzing related protocols, we first define the size of relevant parameter in the protocol. Assume that the key size based on the ECC algorithm is 256 bits, the size of Chebyshev chaotic map is 128 bits, the size of hash value is 128 bits, the size of identity information is 128 bits, the size of timestamp is 32 bits, and the size of random number is 128 bits [54]. Calculation of the communication overhead for the above schemes is shown in Table 4.
Table 4
Communication overhead.
| Protocol | Communication overhead |
| [33] | 2176 |
| [13] | 2688 |
| [30] | |
| [31] | |
| Our scheme |
As can be seen from Figure 5, our scheme has obvious advantages in communication overhead by comparing with other schemes [30].
[figure omitted; refer to PDF]7. Conclusion
As the communication among vehicle groups involves the problems of low delay, safety, and efficiency in the 5G-enabled vehicular networks, we propose a lightweight and secure vehicle group authentication protocol. The scheme is based on the extended chaotic mapping algorithm to achieve authentication, and the group key is distributed through the Chinese remainder theorem, so that the vehicle groups will communicate through the group key. In order to protect the security of RSU, the shared key will be updated. In addition, the security of the scheme is verified by the Scyther tool, and the verification results show that the security of the protocol can be guaranteed. And through the security analysis, the scheme can not only effectively resist all kinds of attacks but also ensure the anonymity, unlinkability, and other security requirements. Finally, by comparing the computation overhead and communication overhead with related schemes, our scheme has less overhead. In the future research work, we will start to study the group management scheme based on aggregation authentication. With the development of 5G communication technology, an efficient scheme is designed to meet the needs of security and privacy.
Acknowledgments
This work was supported by the 2020 Industrial Technology Foundation Public Service Platform Project (grant number 2020-0105-2-1).
[1] G. Dimitrakopoulos, P. Demestichas, "Intelligent transportation systems," IEEE Vehicular Technology Magazine, vol. 5 no. 1, pp. 77-84, DOI: 10.1109/MVT.2009.935537, 2010.
[2] J. Wang, Y. Shao, Y. Ge, R. Yu, "A survey of vehicle to everything (V2X) testing," Sensors, vol. 19 no. 2,DOI: 10.3390/s19020334, 2019.
[3] S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, "Vehicular ad hoc networks (VANETS): status, results, and challenges," Telecommunication Systems, vol. 50 no. 4, pp. 217-241, DOI: 10.1007/s11235-010-9400-5, 2012.
[4] S. Zhang, N. Zhang, X. Fang, P. Yang, X. S. Shen, "Self-sustaining caching stations: Toward cost-effective 5g-enabled vehicular networks," IEEE Communications Magazine, vol. 55 no. 11, pp. 202-208, 2017.
[5] N. Panwar, S. Sharma, A. K. Singh, "A survey on 5G: the next generation of mobile communication," Physical Communication, vol. 18, pp. 64-84, DOI: 10.1016/j.phycom.2015.10.006, 2016.
[6] A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka, H. Tullberg, M. A. Uusitalo, B. Timus, M. Fallgren, "Scenarios for 5G mobile and wireless communications: the vision of the METIS project," IEEE Communications Magazine, vol. 52 no. 5, pp. 26-35, DOI: 10.1109/MCOM.2014.6815890, 2014.
[7] J. Saqlain, IoT and 5G: History Evolution and Its Architecture Their Compatibility and Future, [Ph.D. Thesis], 2018.
[8] S. A. Abdel Hakeem, A. A. Hady, H. W. Kim, "5G-V2X: standardization, architecture, use cases, network-slicing, and edge-computing," Wireless Networks, vol. 26 no. 8, pp. 6015-6041, DOI: 10.1007/s11276-020-02419-8, 2020.
[9] Z. Lin, X. Du, H. H. Chen, B. Ai, Z. Chen, D. Wu, "Millimeter-wave propagation modeling and measurements for 5G mobile networks," IEEE Wireless Communications, vol. 26 no. 1, pp. 72-77, DOI: 10.1109/MWC.2019.1800035, 2019.
[10] I. Rasheed, F. Hu, Y. K. Hong, B. Balasubramanian, "Intelligent vehicle network routing with adaptive 3D beam alignment for mmwave 5G-based V2X communications," IEEE Transactions on Intelligent Transportation Systems, vol. 22 no. 5, pp. 2706-2718, DOI: 10.1109/TITS.2020.2973859, 2021.
[11] N. Zhang, S. Zhang, P. Yang, O. Alhussein, W. Zhuang, X. S. Shen, "Software defined space-air-ground integrated vehicular networks: challenges and solutions," IEEE Communications Magazine, vol. 55 no. 7, pp. 101-109, DOI: 10.1109/MCOM.2017.1601156, 2017.
[12] O. Yilmaz, N. Johansson, "5G radio access for ultra-reliable and low-latency communications," Ericsson Research Blog, vol. 1, pp. 1184-1189, 2015.
[13] J. Cui, Y. Wang, J. Zhang, Y. Xu, H. Zhong, "Full session key agreement scheme based on chaotic map in vehicular ad hoc networks," IEEE Transactions on Vehicular Technology, vol. 69 no. 8, pp. 8914-8924, DOI: 10.1109/TVT.2020.2997694, 2020.
[14] C. Wang, D. Wang, G. Xu, D. He, Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0, 2020.
[15] Z. Li, D. Wang, E. Morais, "Quantum-safe round-optimal password authentication for mobile devices," IEEE Transactions on Dependable and Secure Computing,DOI: 10.1109/tdsc.2020.3040776, 2020.
[16] M. S. Sheikh, J. Liang, W. Wang, "A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs)," Sensors, vol. 19 no. 16,DOI: 10.3390/s19163589, 2019.
[17] C. Wang, D. Wang, Y. Tu, G. Xu, H. Wang, "Understanding node capture attacks in user authentication schemes for wireless sensor networks," IEEE Transactions on Dependable and Secure Computing,DOI: 10.1109/tdsc.2020.2974220, 2020.
[18] J. L. Huang, L. Y. Yeh, H. Y. Chien, "ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," IEEE Transactions on Vehicular Technology, vol. 60 no. 1, pp. 248-262, DOI: 10.1109/TVT.2010.2089544, 2011.
[19] J. Cui, J. Zhang, H. Zhong, Y. Xu, "SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter," IEEE Transactions on Vehicular Technology, vol. 66 no. 11, pp. 10283-10295, DOI: 10.1109/TVT.2017.2718101, 2017.
[20] P. Vijayakumar, V. Chang, L. Jegatha Deborah, B. Balusamy, P. G. Shynu, "Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks," Future Generations Computer Systems, vol. 78, pp. 943-955, DOI: 10.1016/j.future.2016.11.024, 2018.
[21] M. Han, L. Hua, S. Ma, "A self-authentication and deniable efficient group key agreement protocol for VANET," Ksii Transactions on Internet & Information Systems, vol. 11 no. 7, pp. 3678-3698, 2016.
[22] P. Vijayakumar, M. Azees, A. Kannan, L. Jegatha Deborah, "Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks," IEEE Transactions on Intelligent Transportation Systems, vol. 17 no. 4, pp. 1015-1028, DOI: 10.1109/TITS.2015.2492981, 2016.
[23] P. Vijayakumar, M. Azees, V. Chang, J. Deborah, B. Balusamy, "Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks," Cluster Computing, vol. 20 no. 3, pp. 2439-2450, DOI: 10.1007/s10586-017-0848-x, 2017.
[24] J. Cui, X. Tao, J. Zhang, Y. Xu, H. Zhong, "HCPA-GKA: a hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs," Vehicular Communications, vol. 14, pp. 15-25, DOI: 10.1016/j.vehcom.2018.09.003, 2018.
[25] J. Zhang, J. Cui, H. Zhong, Z. Chen, L. Liu, "PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks," IEEE Transactions on Dependable and Secure Computing, vol. 18 no. 2, pp. 722-735, DOI: 10.1109/TDSC.2019.2904274, 2021.
[26] C. Lai, D. Zheng, Q. Zhao, X. Jiang, "SEGM: a secure group management framework in integrated VANET-cellular networks," Vehicular Communications, vol. 11, pp. 33-45, DOI: 10.1016/j.vehcom.2018.01.004, 2018.
[27] Q. Zhang, X. Wang, J. Yuan, L. Liu, R. Wang, H. Huang, Y. Li, "A hierarchical group key agreement protocol using orientable attributes for cloud computing," Information Sciences, vol. 480, pp. 55-69, DOI: 10.1016/j.ins.2018.12.023, 2019.
[28] A. Shi, B. Mso, C. Pv, "A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs," Future Generation Computer Systems, vol. 84, pp. 216-227, 2018.
[29] I. Gharsallah, S. Smaoui, F. Zarai, "An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks," IET Information Security, vol. 14 no. 1, pp. 21-29, DOI: 10.1049/iet-ifs.2018.5443, 2020.
[30] J. Zhang, H. Zhong, J. Cui, M. Tian, Y. Xu, L. Liu, "Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks," IEEE Transactions on Vehicular Technology, vol. 69 no. 7, pp. 7940-7954, DOI: 10.1109/TVT.2020.2994144, 2020.
[31] M. Ouaissa, M. Houmer, M. Ouaissa, "An enhanced authentication protocol based group for vehicular communications over 5G networks," 2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet),DOI: 10.1109/commnet49926.2020.9199641, .
[32] M. Azees, P. Vijayakumar, L. J. Deboarh, "EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks," IEEE Transactions on Intelligent Transportation Systems, vol. 18 no. 9, pp. 2467-2476, DOI: 10.1109/TITS.2016.2634623, 2017.
[33] J. Zhang, H. Zhong, J. Cui, Y. Xu, L. Liu, "SMAKA: secure many-to-many authentication and key agreement scheme for vehicular networks," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1810-1824, DOI: 10.1109/TIFS.2020.3044855, 2021.
[34] J. Cui, X. Zhang, H. Zhong, Z. Ying, L. Liu, "RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks," IEEE Internet of Things Journal, vol. 6 no. 4, pp. 6417-6428, DOI: 10.1109/JIOT.2019.2895136, 2019.
[35] J. Huang, Y. Qian, R. Q. Hu, "Secure and efficient privacy-preserving authentication scheme for 5G software defined vehicular networks," IEEE Transactions on Vehicular Technology, vol. 69 no. 8, pp. 8542-8554, DOI: 10.1109/TVT.2020.2996574, 2020.
[36] X. Li, T. Liu, M. S. Obaidat, F. Wu, P. Vijayakumar, N. Kumar, "A lightweight privacy-preserving authentication protocol for VANETs," IEEE Systems Journal, vol. 14 no. 3, pp. 3547-3557, DOI: 10.1109/JSYST.2020.2991168, 2020.
[37] C. Wang, R. Huang, J. Shen, J. Liu, P. Vijayakumar, N. Kumar, "A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs," IEEE Internet of Things Journal,DOI: 10.1109/jiot.2021.3068268, 2021.
[38] 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects, "System Architecture for the 5G System (Release 16)," 3GPP Standard TS 33.501,V16.4.0, pp. 18-46, 2020.
[39] D. Zissis, D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28 no. 3, pp. 583-592, DOI: 10.1016/j.future.2010.12.006, 2012.
[40] X. Li, Y. Wang, P. Vijayakumar, D. He, N. Kumar, J. Ma, "Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network," IEEE Transactions on Vehicular Technology, vol. 68 no. 11, pp. 11309-11322, DOI: 10.1109/TVT.2019.2943118, 2019.
[41] O. Mir, T. Weide, C. C. Lee, "A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems," Journal of Medical Systems, vol. 39 no. 9, 2015.
[42] C. T. Li, C. C. Lee, C. Y. Weng, S. J. Chen, "A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems," Journal of Medical Systems, vol. 40 no. 11, article 233,DOI: 10.1007/s10916-016-0586-2, 2016.
[43] M. S. Hwang, C. C. Lee, Y. C. Lai, "Traceability on low-computation partially blind signatures for electronic cash," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E85-A no. 5, pp. 1181-1182, 2002.
[44] H.-A. Wen, K.-C. Lee, S.-Y. Hwang, T. Hwang, "On the traceability on RSA-based partially signature with low computation," Applied Mathematics and Computation, vol. 162 no. 1, pp. 421-425, DOI: 10.1016/j.amc.2003.12.110, 2005.
[45] C. C. Lee, M. S. Hwang, W. P. Yang, "A new blind signature based on the discrete logarithm problem for untraceability," Applied Mathematics & Computation, vol. 164 no. 3, pp. 837-841, DOI: 10.1016/j.amc.2004.06.034, 2005.
[46] P. Bergamo, P. D'Arco, A. de Santis, L. Kocarev, "Security of public-key cryptosystems based on Chebyshev polynomials," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 52 no. 7, pp. 1382-1393, DOI: 10.1109/TCSI.2005.851701, 2005.
[47] L. Zhang, "Cryptanalysis of the public key encryption based on multiple chaotic systems," Chaos, Solitons &Fractals, vol. 37 no. 3, pp. 669-674, DOI: 10.1016/j.chaos.2006.09.047, 2008.
[48] S. Qiu, D. Wang, G. Xu, S. Kumari, "Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices," IEEE Transactions on Dependable and Secure Computing,DOI: 10.1109/TDSC.2020.3022797, 2020.
[49] T. T. K. Hue, T. M. Hoang, A. Braeken, "Lightweight signcryption scheme based on discrete Chebyshev maps," 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 43-47, DOI: 10.23919/icitst.2017.8356343, .
[50] Y. Ren, V. Oleshchuk, F. Y. Li, "An efficient Chinese remainder theorem based node capture resilience scheme for mobile WSNs," 2010 IEEE International Conference on Information Theory and Information Security, pp. 689-692, DOI: 10.1109/icitis.2010.5689492, .
[51] P. Vijayakumar, S. Bose, A. Kannan, "Chinese remainder theorem based centralised group key management for secure multicast communication," Information Security, vol. 8 no. 3, pp. 179-187, 2014.
[52] J. Cao, Z. Yan, R. Ma, Y. Zhang, Y. Fu, H. Li, "LSAA: a lightweight and secure access authentication scheme for both UE and mMTC devices in 5G networks," IEEE Internet of Things Journal, vol. 7 no. 6, pp. 5329-5344, DOI: 10.1109/JIOT.2020.2976740, 2020.
[53] C. Cremers, The Scyther Tool, 2020. https://people.cispa.io/cas.cremers/scyther/
[54] Y. Sun, J. Cao, M. Ma, "EAP-DDBA: efficient anonymity proximity device discovery and batch authentication mechanism for massive D2D communication devices in 3GPP 5G HetNet," IEEE Transactions on Dependable and Secure Computing,DOI: 10.1109/tdsc.2020.2989784, 2020.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Junfeng Miao et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
When mobile network enters 5G era, 5G networks have a series of unparalleled advantages. Therefore, the application of 5G network technology in the Internet of Vehicles (IoV) can promote more intelligently vehicular networks and more efficiently vehicular information transmission. However, with the combination of 5G networks and vehicular networks technology, it requires safe and reliable authentication and low computation overhead. Therefore, it is a challenge to achieve such low latency, security, and high mobility. In this paper, we propose a secure and efficient lightweight authentication protocol for vehicle group. The scheme is based on the extended chaotic map to achieve authentication, and the Chinese remainder theorem distributes group keys. Scyther is used to verify the security of the scheme, and the verification results show that the security of the scheme can be guaranteed. In addition, through security analysis, the scheme can not only effectively resist various attacks but also guarantee security requirements such as anonymity and unlinkability. Finally, by performance analysis and comparison, our scheme has less computation and communication overhead.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer





