A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
Abstract
:1. Introduction
2. C-V2X Security Risk and Security Technology Overview
2.1. C-V2X Security Risk
2.2. C-V2X Security Technology
3. Requirement Analysis of V2V Identity Authentication and Key Agreement
4. Identity-Based Cryptograph Technology
5. Lightweight V2V Identity Authentication and Key Agreement Scheme
5.1. Security Architecture
5.2. Equipment Registration and Access Process
5.3. V2V Identity Authentication and Key Agreement Process
5.4. V2V Secure Communication
6. Security Analysis and Experimental Validation
6.1. Security Analysis
6.2. Experimental Validation
7. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Chen, S.; Hu, J.; Shi, Y.; Zhao, L. LTE-V: A TD-LTE-Based V2X Solution for Future Vehicular Network. IEEE Internet Things J. 2016, 3, 997–1005. [Google Scholar] [CrossRef]
- Chen, S.; Hu, J.; Shi, Y.; Zhao, L.; Li, W. A Vision of C-V2X: Technologies, Field Testing, and Challenges with Chinese Development. IEEE Internet Things J. 2020, 7, 3872–3881. [Google Scholar] [CrossRef] [Green Version]
- Alnasser, A.; Sun, H.; Jiang, J. Cyber Security Challenges and Solutions for V2X Communications: A Survey. Comput. Netw. 2019, 151, 52–67. [Google Scholar] [CrossRef] [Green Version]
- Ivanov, I.; Maple, C.; Watson, T.; Lee, S. Cyber security standards and issues in V2X communications for Internet of Vehicles. In Living in the Internet of Things: Cybersecurity of the IoT–2018; London, UK, 2018; pp. 1–6. Available online: http://wrap.warwick.ac.uk/106474/1/WRAP-Cyber-security-standards-issues-communications-vehicles-Ivanov-2018.pdf (accessed on 17 November 2022).
- IMT-2020(5G) Promotion Group. LTE-V2X Security Technology. Available online: http://www.IMT-2020.cn (accessed on 1 July 2019).
- Gyawali, S.; Xu, S.; Qian, Y.; Hu, R.Q. Challenges and Solutions for Cellular Based V2X Communications. IEEE Commun. Surv. Tutor. 2021, 23, 222–255. [Google Scholar] [CrossRef]
- Hong, L.; Zhang, Y.; Tao, Y. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. IEEE Netw. 2018, 32, 78–83. [Google Scholar]
- Shin, S.; Kwon, T. A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things. IEEE Access 2020, 8, 67555–67571. [Google Scholar] [CrossRef]
- Hakeem, S.; El-Gawad, M.; Kim, H.W. A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks. IEEE Access 2019, 7, 119689–119705. [Google Scholar] [CrossRef]
- Zhang, J. Study on Secure Communication of Internet of Vehicles Based on Identity-Based Cryptograph. In Proceedings of the 2021 13th International Conference on Advanced Infocomm Technology (ICAIT), Yanji, China, 15–17 October 2021; pp. 156–160. [Google Scholar]
- Shuhaimi, N.I.; Juhana, T. Security in vehicular ad-hoc network with Identity-Based Cryptography approach: A survey. In Proceedings of the 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Denpasar-Bali, Indonesia, 30–31 October 2012. [Google Scholar]
- Shamir, A. Identity-Based Cryptosystems and Signature Schemes. In Proceedings of the CRYPTO 84 on Advances in Cryptology, Santa Barbara, CA, USA, 23 August 1985; Available online: https://dl.acm.org/doi/10.5555/19478.19483 (accessed on 17 November 2022).
- Gallegos-Garcia, G.; Gomez-Cardenas, R.; Duchen-Sanchez, G.I. Electronic Voting Using Identity Based Cryptography. Sci. World J. 2015, 2015, 741031. [Google Scholar] [CrossRef]
- Tian, C.; Wang, L.; Li, M. Design and Implementation of SM9 Identity Based Cryptograph Algorithm. In Proceedings of the 2020 International Conference on Computer Network, Electronic and Automation (ICCNEA), Xi’an, China, 25–27 September 2020; pp. 96–100. [Google Scholar]
- Cryptography Standardization Technical Committee. Information Security Technology—Identity-Based Cryptographic Algorithms SM9—Part 1: General. Available online: http://www.gmbz.org.cn (accessed on 1 November 2020).
- Li, H.; Sun, S. Identity-Based Cryptography for Grid. In Proceedings of the Eighth Acis International Conference on Software Engineering, Qingdao, China, 30 July–1 August 2007. [Google Scholar]
- Chen, S.; Li, Q.; Wang, Y.; Xu, H.; Jia, X. C-V2X equipment identification management and authentication mechanism. China Commun. 2021, 18, 297–306. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, Q. A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph. Future Internet 2023, 15, 25. https://doi.org/10.3390/fi15010025
Li Q. A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph. Future Internet. 2023; 15(1):25. https://doi.org/10.3390/fi15010025
Chicago/Turabian StyleLi, Qiang. 2023. "A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph" Future Internet 15, no. 1: 25. https://doi.org/10.3390/fi15010025
APA StyleLi, Q. (2023). A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph. Future Internet, 15(1), 25. https://doi.org/10.3390/fi15010025