An Anonymous and Efficient Authentication Scheme with Conditional Privacy Preservation in Internet of Vehicles Networks
Chaeeon Kim,
DeokKyu Kwon,
Seunghwan Son,
Sungjin Yu () and
Youngho Park ()
Additional contact information
Chaeeon Kim: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
DeokKyu Kwon: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
Seunghwan Son: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
Sungjin Yu: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
Youngho Park: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
Mathematics, 2024, vol. 12, issue 23, 1-30
Abstract:
The Internet of Vehicles (IoV) is an emerging technology that enables vehicles to communicate with their surroundings, provide convenient services, and enhance transportation systems. However, IoV networks can be vulnerable to security attacks because vehicles communicate with other IoV components through an open wireless channel. The recent related work suggested a two-factor-based lightweight authentication scheme for IoV networks. Unfortunately, we prove that the related work cannot prevent various security attacks, such as insider and ephemeral secret leakage (ESL) attacks, and fails to ensure perfect forward secrecy. To address these security weaknesses, we propose an anonymous and efficient authentication scheme with conditional privacy-preserving capabilities in IoV networks. The proposed scheme can ensure robustness against various security attacks and provide essential security features. The proposed scheme ensures conditional privacy to revoke malicious behavior in IoV networks. Moreover, our scheme uses only one-way hash functions and XOR operations, which are low-cost cryptographic operations suitable for IoV. We also prove the security of our scheme using the “Burrows–Abadi–Needham (BAN) logic”, “Real-or-Random (ROR) model”, and “Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool”. We evaluate and compare the performance and security features of the proposed scheme with existing methods. Consequently, our scheme provides improved security and efficiency and is suitable for practical IoV networks.
Keywords: Internet of Vehicle (IoV); authentication; conditional privacy; key agreement; lightweight (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2024
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/12/23/3756/pdf (application/pdf)
https://www.mdpi.com/2227-7390/12/23/3756/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:12:y:2024:i:23:p:3756-:d:1532130
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().