EconPapers    
Economics at your fingertips  
 

Highly secure authentication and key agreement protocol for the internet of vehicles

Li Li (), XingJuan Fan (), BoYuan Zhi (), ShaoJun Li () and Seyyed Amirreza Dabollahi ()
Additional contact information
Li Li: Shijiazhuang Posts and Telecommunications Technical College
XingJuan Fan: Shijiazhuang Posts and Telecommunications Technical College
BoYuan Zhi: Nanyang Technological University
ShaoJun Li: ShiJiaZhuang Equipment Manufacturing School
Seyyed Amirreza Dabollahi: University of Tabriz

Telecommunication Systems: Modelling, Analysis, Design and Management, 2024, vol. 87, issue 1, No 6, 73-88

Abstract: Abstract In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and dynamic 5 G networks. Safeguarding these networks presents numerous challenges, particularly in controlling access for unauthenticated users and establishing secure key agreements with fine-grained access control. Balancing these security measures is vital to prevent unauthorized information flow while aligning with the promising goals of future generation technologies. Despite numerous related studies being conducted, existing schemes face risks such as privacy breaches, identity tracing, and substantial computation overheads. Consequently, there is an urgent need to introduce a more secure and efficient scheme to counter various attacks. This paper introduces an authenticated key agreement scheme, tailored for fog-based IoV. The scheme’s security is established under the Random Oracle Model and verified using the ProVerif tool. Additionally, a performance assessment is conducted, demonstrating that the proposed protocol simultaneously meets both security and efficiency requirements when compared to several related schemes.

Keywords: Internet of vehicles; Authentication; Key Agreement; ProVerif (search for similar items in EconPapers)
Date: 2024
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s11235-024-01172-z Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:87:y:2024:i:1:d:10.1007_s11235-024-01172-z

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-024-01172-z

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:87:y:2024:i:1:d:10.1007_s11235-024-01172-z