计算机科学 ›› 2025, Vol. 52 ›› Issue (12): 331-338.doi: 10.11896/jsjkx.241100093
苏新忠1, 徐友云2
SU Xinzhong1, XU Youyun2
摘要: 随着5G技术的发展,城市交通系统能够以更高效的方式实现信息交互,极大提升了参与者的道路体验。在该系统中,路侧单元通过5G接入访问并转发车载单元、行人终端和道路传感器等节点的数据,可为驾驶员和行人提供有效的态势感知视野,降低事故发生率,提高行车效率。然而,现有认证方案存在安全性低、开销大、可拓展性低等缺陷,为此,提出了一种端到端的车联网轻量级安全认证和密钥更新方案。首先,通过阶乘树实现RSU权限的细粒度访问控制;然后,利用物理不可克隆函数等低开销算法为RSU和车联网设备设计相互认证协议。针对车联网移动性等问题,为参与节点提供动态在线的密钥更新方法,并借助Proverif以及非形式化分析验证其面对各种攻击的安全性。与其他方案在性能开销等方面的对比表明,所提方案适用于资源有限的车联网场景。
中图分类号:
| [1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey[J].Internet of Things,2023,22:100809. [2]VISHWAKARMA L,NAHAR A,DAS D.LBSV:Lightweightblockchain security protocol for secure storage and communication in SDN-enabled IoV[J].IEEE Transactions on Vehicular Technology,2022,71(6):5983-5994. [3]OSIBO B K,ZHANG C,XIA C,et al.Security and privacy in 5G Internet of Vehicles(IoV) environment[J].Journal on Internet of Things,2021,3(2):77. [4]STORCK C R,DUARTE-FIGUEIREDO F.A survey of 5Gtechnology evolution,standards,and infrastructure associated with vehicle-to-everything communications by Internet of Vehicles[J].IEEE Access,2020,8:117593-117614. [5]LIANG W,XIE S,LONG J,et al.A double PUF-based RFIDidentity authentication protocol in service-centric internet of things environments[J].Information Sciences,2019,503:129-147. [6]SHANG F J,DENG X X.Blockchain-based privacy-preserving Internet of Vehicles data sharing scheme[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2025,37(2):155-164. [7]SONG L,SUN G,YU H,et al.Fbia:A fog-based identity authentication scheme for privacy preservation in Internet of Vehicles[J].IEEE Transactions on Vehicular Technology,2020,69(5):5403-5415. [8]MA K,SONG G,ZHOU Y,et al.An efficient identity authentication protocol with revocation,tracking and fine-grained access control for electronic medical system[J].Computer Standards & Interfaces,2024,88:103784. [9]MALL P,AMIN R,DAS A K,et al.PUF-based authentication and key agreement protocols for IoT,WSNs,and smart grids:A comprehensive survey[J].IEEE Internet of Things Journal,2022,9(11):8205-8228. [10]WU L,SUN Q,WANG X,et al.An efficient privacy-preserving mutual authentication scheme for secure V2V communication in vehicular ad hoc network[J].IEEE Access,2019,7:55050-55063. [11]WANG P,CHEN C M,KUMARI S,et al.HDMA:Hybrid D2D message authentication scheme for 5G-enabled VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2020,22(8):5071-5080. [12]MUN H,SEO M,LEE D H.Secure privacy-preserving V2Vcommunication in 5G-V2X supporting network slicing[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(9):14439-14455. [13]DU Q,ZHOU J,MA M.EAIA:An Efficient and AnonymousIdentity-Authentication Scheme in 5G-V2V[J].Sensors,2024,24(16):5376. [14]ULLAH S,ZHENG J,DIN N,et al.Elliptic Curve Cryptography;Applications,challenges,recent advances,and future trends:A comprehensive survey[J].Computer Science Review,2023,47:100530. [15]CERVESATO I.The Dolev-Yao intruder is the most powerful attacker[C]//16th AnnualSymposium on Logic in Computer Science.2001. [16]YιLDιZ H,CENK M,ONUR E.PLGAKD:A PUF-based lightweight group authentication and key distribution protocol[J].IEEE Internet of Things Journal,2020,8(7):5682-5696. [17]PARK C S,PARK W S.A group-oriented DTLS handshake for secure IoT applications[J].IEEE Transactions on Automation Science and Engineering,2018,15(4):1920-1929. [18]SU X,XU Y.Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment[J].Sensors,2024,24(22):7119. [19]XIE Q,DING Z,TANG W,et al.Provable secure and light-weight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs[J].IEEE Transactions on Vehicular Technology,2023,72(12):15200-15212. |
|
||