计算机科学 ›› 2025, Vol. 52 ›› Issue (12): 331-338.doi: 10.11896/jsjkx.241100093

• 信息安全 • 上一篇    下一篇

面向5G城市交通的轻量级安全认证和密钥更新方案

苏新忠1, 徐友云2   

  1. 1 南京邮电大学通信与信息工程学院 南京 210003
    2 南京邮电大学通信与网络技术国家工程研究中心 南京 210003
  • 收稿日期:2024-11-15 修回日期:2025-02-13 出版日期:2025-12-15 发布日期:2025-12-09
  • 通讯作者: 徐友云(yyxu@njupt.edu.cn)
  • 作者简介:(suxinz20@163.com)
  • 基金资助:
    国家自然科学基金(62371246);国家重点研发计划(2016YFE0200200);江苏省研究生科研创新计划(KYCX22_0936)

Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation

SU Xinzhong1, XU Youyun2   

  1. 1 School of Communication and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    2 National Engineering Research Center for Communication and Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2024-11-15 Revised:2025-02-13 Published:2025-12-15 Online:2025-12-09
  • About author:SU Xinzhong,born in 1997,postgra-duate.His main research interests include Internet of Vehicles security and identity authentication.
    XU Youyun,born in 1966,Ph.D,professor,Ph.D supervisor.His main research interests include high speed railway communication,wireless Ad hoc network and Internet of Vehicles security.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China(62371246),National Key Research and Development Program of China(2016YFE0200200) and Practice Innovation Program of Jiangsu Province(KYCX22_0936).

摘要: 随着5G技术的发展,城市交通系统能够以更高效的方式实现信息交互,极大提升了参与者的道路体验。在该系统中,路侧单元通过5G接入访问并转发车载单元、行人终端和道路传感器等节点的数据,可为驾驶员和行人提供有效的态势感知视野,降低事故发生率,提高行车效率。然而,现有认证方案存在安全性低、开销大、可拓展性低等缺陷,为此,提出了一种端到端的车联网轻量级安全认证和密钥更新方案。首先,通过阶乘树实现RSU权限的细粒度访问控制;然后,利用物理不可克隆函数等低开销算法为RSU和车联网设备设计相互认证协议。针对车联网移动性等问题,为参与节点提供动态在线的密钥更新方法,并借助Proverif以及非形式化分析验证其面对各种攻击的安全性。与其他方案在性能开销等方面的对比表明,所提方案适用于资源有限的车联网场景。

关键词: 车联网, 访问控制, 低开销认证, 密钥更新, 安全分析

Abstract: With the advancement of 5G technology,urban transportation system can facilitate information exchange more efficiently,significantly enhancing the road experience for all participants.In this system,roadside units access and forward data from on-board units,pedestrian terminals,and road sensors through 5G connectivity,providing drivers and pedestrians with effective situational awareness and reducing the incidence of accidents,thereby improving driving efficiency.However,existing authentication schemes suffer from low security,high overhead,and poor scalability.To address these issues,this paper proposes an end-to-end lightweight secure authentication and key update scheme for Internet of Vehicles.Firstly,it implements fine-grained access control for RSU permissions through factorial trees.Then,it designs a mutual authentication protocol for RSUs and IOV devices using low-cost algorithms such as physical unclonable function.Finally,it provides a dynamic online key update method for parti-cipating nodes to address issues like IoV mobility.The scheme’s security against various attacks is verified through Proverif,and informal analysis.Comparisons with other studies in terms of performance overhead demonstrate that the proposed scheme is suitable for resource-constrained IoV scenario.

Key words: Internet of Vehicles, Access control, Low cost authentication, Key update, Security analysis

中图分类号: 

  • TP309.2
[1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey[J].Internet of Things,2023,22:100809.
[2]VISHWAKARMA L,NAHAR A,DAS D.LBSV:Lightweightblockchain security protocol for secure storage and communication in SDN-enabled IoV[J].IEEE Transactions on Vehicular Technology,2022,71(6):5983-5994.
[3]OSIBO B K,ZHANG C,XIA C,et al.Security and privacy in 5G Internet of Vehicles(IoV) environment[J].Journal on Internet of Things,2021,3(2):77.
[4]STORCK C R,DUARTE-FIGUEIREDO F.A survey of 5Gtechnology evolution,standards,and infrastructure associated with vehicle-to-everything communications by Internet of Vehicles[J].IEEE Access,2020,8:117593-117614.
[5]LIANG W,XIE S,LONG J,et al.A double PUF-based RFIDidentity authentication protocol in service-centric internet of things environments[J].Information Sciences,2019,503:129-147.
[6]SHANG F J,DENG X X.Blockchain-based privacy-preserving Internet of Vehicles data sharing scheme[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2025,37(2):155-164.
[7]SONG L,SUN G,YU H,et al.Fbia:A fog-based identity authentication scheme for privacy preservation in Internet of Vehicles[J].IEEE Transactions on Vehicular Technology,2020,69(5):5403-5415.
[8]MA K,SONG G,ZHOU Y,et al.An efficient identity authentication protocol with revocation,tracking and fine-grained access control for electronic medical system[J].Computer Standards & Interfaces,2024,88:103784.
[9]MALL P,AMIN R,DAS A K,et al.PUF-based authentication and key agreement protocols for IoT,WSNs,and smart grids:A comprehensive survey[J].IEEE Internet of Things Journal,2022,9(11):8205-8228.
[10]WU L,SUN Q,WANG X,et al.An efficient privacy-preserving mutual authentication scheme for secure V2V communication in vehicular ad hoc network[J].IEEE Access,2019,7:55050-55063.
[11]WANG P,CHEN C M,KUMARI S,et al.HDMA:Hybrid D2D message authentication scheme for 5G-enabled VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2020,22(8):5071-5080.
[12]MUN H,SEO M,LEE D H.Secure privacy-preserving V2Vcommunication in 5G-V2X supporting network slicing[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(9):14439-14455.
[13]DU Q,ZHOU J,MA M.EAIA:An Efficient and AnonymousIdentity-Authentication Scheme in 5G-V2V[J].Sensors,2024,24(16):5376.
[14]ULLAH S,ZHENG J,DIN N,et al.Elliptic Curve Cryptography;Applications,challenges,recent advances,and future trends:A comprehensive survey[J].Computer Science Review,2023,47:100530.
[15]CERVESATO I.The Dolev-Yao intruder is the most powerful attacker[C]//16th AnnualSymposium on Logic in Computer Science.2001.
[16]YιLDιZ H,CENK M,ONUR E.PLGAKD:A PUF-based lightweight group authentication and key distribution protocol[J].IEEE Internet of Things Journal,2020,8(7):5682-5696.
[17]PARK C S,PARK W S.A group-oriented DTLS handshake for secure IoT applications[J].IEEE Transactions on Automation Science and Engineering,2018,15(4):1920-1929.
[18]SU X,XU Y.Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment[J].Sensors,2024,24(22):7119.
[19]XIE Q,DING Z,TANG W,et al.Provable secure and light-weight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs[J].IEEE Transactions on Vehicular Technology,2023,72(12):15200-15212.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!