Computer Science ›› 2025, Vol. 52 ›› Issue (12): 331-338.doi: 10.11896/jsjkx.241100093

• Information Security • Previous Articles     Next Articles

Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation

SU Xinzhong1, XU Youyun2   

  1. 1 School of Communication and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    2 National Engineering Research Center for Communication and Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2024-11-15 Revised:2025-02-13 Online:2025-12-15 Published:2025-12-09
  • About author:SU Xinzhong,born in 1997,postgra-duate.His main research interests include Internet of Vehicles security and identity authentication.
    XU Youyun,born in 1966,Ph.D,professor,Ph.D supervisor.His main research interests include high speed railway communication,wireless Ad hoc network and Internet of Vehicles security.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China(62371246),National Key Research and Development Program of China(2016YFE0200200) and Practice Innovation Program of Jiangsu Province(KYCX22_0936).

Abstract: With the advancement of 5G technology,urban transportation system can facilitate information exchange more efficiently,significantly enhancing the road experience for all participants.In this system,roadside units access and forward data from on-board units,pedestrian terminals,and road sensors through 5G connectivity,providing drivers and pedestrians with effective situational awareness and reducing the incidence of accidents,thereby improving driving efficiency.However,existing authentication schemes suffer from low security,high overhead,and poor scalability.To address these issues,this paper proposes an end-to-end lightweight secure authentication and key update scheme for Internet of Vehicles.Firstly,it implements fine-grained access control for RSU permissions through factorial trees.Then,it designs a mutual authentication protocol for RSUs and IOV devices using low-cost algorithms such as physical unclonable function.Finally,it provides a dynamic online key update method for parti-cipating nodes to address issues like IoV mobility.The scheme’s security against various attacks is verified through Proverif,and informal analysis.Comparisons with other studies in terms of performance overhead demonstrate that the proposed scheme is suitable for resource-constrained IoV scenario.

Key words: Internet of Vehicles, Access control, Low cost authentication, Key update, Security analysis

CLC Number: 

  • TP309.2
[1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey[J].Internet of Things,2023,22:100809.
[2]VISHWAKARMA L,NAHAR A,DAS D.LBSV:Lightweightblockchain security protocol for secure storage and communication in SDN-enabled IoV[J].IEEE Transactions on Vehicular Technology,2022,71(6):5983-5994.
[3]OSIBO B K,ZHANG C,XIA C,et al.Security and privacy in 5G Internet of Vehicles(IoV) environment[J].Journal on Internet of Things,2021,3(2):77.
[4]STORCK C R,DUARTE-FIGUEIREDO F.A survey of 5Gtechnology evolution,standards,and infrastructure associated with vehicle-to-everything communications by Internet of Vehicles[J].IEEE Access,2020,8:117593-117614.
[5]LIANG W,XIE S,LONG J,et al.A double PUF-based RFIDidentity authentication protocol in service-centric internet of things environments[J].Information Sciences,2019,503:129-147.
[6]SHANG F J,DENG X X.Blockchain-based privacy-preserving Internet of Vehicles data sharing scheme[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2025,37(2):155-164.
[7]SONG L,SUN G,YU H,et al.Fbia:A fog-based identity authentication scheme for privacy preservation in Internet of Vehicles[J].IEEE Transactions on Vehicular Technology,2020,69(5):5403-5415.
[8]MA K,SONG G,ZHOU Y,et al.An efficient identity authentication protocol with revocation,tracking and fine-grained access control for electronic medical system[J].Computer Standards & Interfaces,2024,88:103784.
[9]MALL P,AMIN R,DAS A K,et al.PUF-based authentication and key agreement protocols for IoT,WSNs,and smart grids:A comprehensive survey[J].IEEE Internet of Things Journal,2022,9(11):8205-8228.
[10]WU L,SUN Q,WANG X,et al.An efficient privacy-preserving mutual authentication scheme for secure V2V communication in vehicular ad hoc network[J].IEEE Access,2019,7:55050-55063.
[11]WANG P,CHEN C M,KUMARI S,et al.HDMA:Hybrid D2D message authentication scheme for 5G-enabled VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2020,22(8):5071-5080.
[12]MUN H,SEO M,LEE D H.Secure privacy-preserving V2Vcommunication in 5G-V2X supporting network slicing[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(9):14439-14455.
[13]DU Q,ZHOU J,MA M.EAIA:An Efficient and AnonymousIdentity-Authentication Scheme in 5G-V2V[J].Sensors,2024,24(16):5376.
[14]ULLAH S,ZHENG J,DIN N,et al.Elliptic Curve Cryptography;Applications,challenges,recent advances,and future trends:A comprehensive survey[J].Computer Science Review,2023,47:100530.
[15]CERVESATO I.The Dolev-Yao intruder is the most powerful attacker[C]//16th AnnualSymposium on Logic in Computer Science.2001.
[16]YιLDιZ H,CENK M,ONUR E.PLGAKD:A PUF-based lightweight group authentication and key distribution protocol[J].IEEE Internet of Things Journal,2020,8(7):5682-5696.
[17]PARK C S,PARK W S.A group-oriented DTLS handshake for secure IoT applications[J].IEEE Transactions on Automation Science and Engineering,2018,15(4):1920-1929.
[18]SU X,XU Y.Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment[J].Sensors,2024,24(22):7119.
[19]XIE Q,DING Z,TANG W,et al.Provable secure and light-weight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs[J].IEEE Transactions on Vehicular Technology,2023,72(12):15200-15212.
[1] LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395.
[2] REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian. Web Access Control Vulnerability Detection Approach Based on Site Maps [J]. Computer Science, 2024, 51(9): 416-424.
[3] ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili. Construction of Internet of Vehicles Covert Channel Based on Websocket Protocol [J]. Computer Science, 2024, 51(8): 364-370.
[4] TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7.
[5] LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387.
[6] WANG Bo, ZHAO Jincheng, XU Bingfeng, HE Gaofeng. Zero Day Attack Detection Method for Internet of Vehicles [J]. Computer Science, 2024, 51(12): 334-342.
[7] XUE Jianbin, YU Bowen, XU Xiaofeng, DOU Jun. Queueing Theory-based Joint Optimization of Communication and Computing Resources in Edge Computing Networks [J]. Computer Science, 2024, 51(11A): 240100103-9.
[8] ZENG Congai, LIU Yali, CHEN Shuyi, ZHU Xiuping, NING Jianting. Multi-type K-nearest Neighbor Query Scheme with Mutual Privacy-preserving in Road Networks [J]. Computer Science, 2024, 51(11): 400-417.
[9] MEN Ruirui, JIA Hongyong, DU Jinru. Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts [J]. Computer Science, 2024, 51(10): 372-379.
[10] LIN Xinyu, YAO Zewei, HU Shengxi, CHEN Zheyi, CHEN Xing. Task Offloading Algorithm Based on Federated Deep Reinforcement Learning for Internet of Vehicles [J]. Computer Science, 2023, 50(9): 347-356.
[11] TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25.
[12] ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347.
[13] GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316.
[14] YANG Xin, LI Gengxin, LI Hui. EHFM:An Efficient Hierarchical Filtering Method for Multi-source Network Malicious Alerts [J]. Computer Science, 2023, 50(2): 324-332.
[15] MA Qican, WU Zehui, WANG Yunchao, WANG Xinlei. Approach of Web Application Access Control Vulnerability Detection Based on State Deviation Analysis [J]. Computer Science, 2023, 50(2): 346-352.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!