• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yao Hailong, Yan Qiao. Cryptanalysis and Design of Anonymous Authentication Protocol for Value-Added Services in Internet of Vehicles[J]. Journal of Computer Research and Development, 2022, 59(2): 440-451. DOI: 10.7544/issn1000-1239.20200487
Citation: Yao Hailong, Yan Qiao. Cryptanalysis and Design of Anonymous Authentication Protocol for Value-Added Services in Internet of Vehicles[J]. Journal of Computer Research and Development, 2022, 59(2): 440-451. DOI: 10.7544/issn1000-1239.20200487

Cryptanalysis and Design of Anonymous Authentication Protocol for Value-Added Services in Internet of Vehicles

Funds: This work was supported by the National Natural Science Foundation of China (61976142, 61772022) and Research Fund for the Doctoral of LZCU (LZCU-BS2021-03).
More Information
  • Published Date: January 31, 2022
  • The Internet of vehicles (IoV) is an important part of a smart city. It can provide road safety, traffic management, autonomous driving, and Internet content distribution services. Among them, the content distribution service is an Internet value-added service for vehicles or their occupants. It faces more stringent security challenges than traditional Internet services. The key agreement protocol for the Internet of vehicles value-added service can initialize the session key for its secure communication, but most of the existing multi-server protocols have the shortcomings of anonymity and forward security. Recently, Vasudev et al. proposed a lightweight authentication protocol for value-added services in IoV using Hash functions. Cryptanalysis shows that in addition to the vulnerability of anonymity and forward security, the protocol also has fatal flaws such as the loss of the master key of the system due to the loss of the smart card. In order to overcome these flaws, elliptic curve cryptography (ECC) and Hash function are used to design an authenticated key agreement protocol suitable for the value-added services in IoV. Security analysis shows that the proposal can satisfy the authenticated key agreement security in the random oracle model, has strong anonymity and forward security, and can resist known Internet attacks. Performance analysis shows that the security of the proposed protocol is better than similar protocols, and the communication overhead on the user side is reduced by at least 34%.
  • Related Articles

    [1]Li Qian, Hu Yupeng, Ye Zhenyu, Xiao Ye, Qin Zheng. An Ant Colony Optimization Algorithms Based Data Update Scheme for Erasure-Coded Storage Systems[J]. Journal of Computer Research and Development, 2021, 58(2): 305-318. DOI: 10.7544/issn1000-1239.2021.20200383
    [2]Zhang Yao, Chu Jiajia, Weng Chuliang. Survey on Data Updating in Erasure-Coded Storage Systems[J]. Journal of Computer Research and Development, 2020, 57(11): 2419-2431. DOI: 10.7544/issn1000-1239.2020.20190675
    [3]Tan Chao, Ji Genlin, Zhao Bin. Self-Adaptive Streaming Big Data Learning Algorithm Based on Incremental Tangent Space Alignment[J]. Journal of Computer Research and Development, 2017, 54(11): 2547-2557. DOI: 10.7544/issn1000-1239.2017.20160712
    [4]Wu Libing, Dang Ping, Nie Lei, He Yanxiang, Li Fei. A Fragmentable Admission Control Algorithm for Resource Reservation[J]. Journal of Computer Research and Development, 2014, 51(6): 1199-1205.
    [5]Xing Jing, Xiong Jin, Sun Ninghui, and Ma Jie. Scalable Storage Space Management to Support EB-Scale Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1573-1582.
    [6]Liu Shenglan, Feng Lin, Jin Bo, Wu Zhenyu. A New Local Space Alignment Algorithm[J]. Journal of Computer Research and Development, 2013, 50(7): 1426-1434.
    [7]Xiao Peng, Hu Zhigang. An Adaptive Dynamic Redundant Reservation Strategy in Grid Computing[J]. Journal of Computer Research and Development, 2013, 50(3): 481-489.
    [8]Liu Xiaozhu, Peng Zhiyong. On-Line Dynamic Index Hybrid Update Scheme Based on Self-Learning of Allocated Space[J]. Journal of Computer Research and Development, 2012, 49(10): 2118-2130.
    [9]Hu Chunming, Huai Jinpeng, and Wo Tianyu. Flexible Resource Capacity Reservation Mechanism for Service Grid Using Slack Time[J]. Journal of Computer Research and Development, 2007, 44(1): 20-28.
    [10]Yang Renzhong, Hou Zifeng, Li Jingxia. A Resource Reservation Scheme for PCF Handoff Station in WLAN[J]. Journal of Computer Research and Development, 2005, 42(11): 1962-1968.

Catalog

    Article views (309) PDF downloads (209) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return