Font Size: a A A

Research On Lightweight Authentication And Key Agreement Mechanism For V2X Communications

Posted on:2023-06-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:L WeiFull Text:PDF
GTID:1522307043488254Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Vehicle-to-Everything(V2X)communication technology enables a vehicle to exchange information with nearby vehicles and infrastructures through Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communications,respectively,so that vehicle safety,road traffic efficiency,and driving experience can be improved.Since V2 X communication channels are open and the messages transmitted over V2 X communication channels are often related to traffic or life safety,V2 X communications are easy to be attacked from malicious adversaries.Therefore,security issues need to be considered in V2 X communication processes.Authentication and key agreement algorithm can achieve the authentication of the message and corresponding sender,and produce a common session key for subsequent secure communications.Traditional V2 X authentication and key agreement schemes have several deficiencies,i.e.,the designed algorithms are not lightweight enough,the security strengths are not high enough,and the covered scenarios are not comprehensive enough.To solve these deficiencies,this dissertation design lightweight authentication and key agreement schemes with high security strength from the centralization and decentralization perspectives.The main contributions of this dissertation are as follows.(1)This dissertation proposes a lightweight authentication scheme for securing the traffic emergency message,which is suitable for securing V2 V communications.The existing V2 V authentication schemes have two deficiencies.One is that the transmission overhead is hard to satisfy the delay requirement of traffic emergency messages.The other is that the secure updating issue for the secret key,which is stored in the tamper-proof device of every vehicle,has not been considered.To solve the two deficiencies,this dissertation proposed a lightweight authentication scheme that is based on message recovery and supports the updating of system secret key.The proposed scheme can be used for securing the broadcasting application of traffic emergency messages that rely on V2 V communications.Specifically,the proposed scheme uses elliptic curve cryptography to propose a message recovery-based lightweight traffic emergency message authentication algorithm,which can be used to implement the authentication of traffic emergency message and corresponding sender.Additionally,the proposed scheme designs a broadcast-based system secret key updating algorithm for improving the security strength of the authentication algorithm that heavily relies on the system secret key.Security analysis shows that the proposed scheme can not only satisfy essential security and privacy characteristics such as conditional anonymity and authentication,but also resist various attacks such as man-in-the-middle attacks and side-channel attacks.Performance analysis demonstrates that the proposed scheme has significantly lower communication overhead and computational overhead compared with representative schemes.(2)This dissertation proposes a lightweight authentication and key agreement scheme,which is suitable for securing V2 V and V2 I communications.The existing V2 X AKA schemes are hard to support V2 V and V2 I communications with security and efficiency simultaneously.To solve the issue,this dissertation proposes a binary-tree-based lightweight authentication and key agreement scheme.Specifically,the proposed scheme uses the elliptic curve cryptography to design a lightweight authentication and key agreement algorithm for achieving conditional anonymity and authentication characteristics in the key agreement process.Additionally,the proposed scheme designed a binary tree-based lightweight authentication and key agreement algorithm to support the key agreement in three scenarios,including vehicle dynamically joining,leaving,and cross-roadside-unit scenarios.Security analysis shows that the proposed scheme satisfies various security and privacy requirements of V2 X communications,whereas performance analysis demonstrates that the proposed scheme has low computation and communication overhead in multiple scenarios.(3)This dissertation proposes a lightweight authentication and key agreement scheme based on multi-trusted-authority(TA)model,which is suitable for securing vehicle-to-fog communications.The existing V2 I authentication and key agreement schemes have two deficiencies.One is that the adopted centralization architecture provides relatively low system security and robustness.The other is that the computation and communication overhead are hard to satisfy the requirement of vehicle-to-fog-based communication application that is delay-sensitive.To solve these deficiencies,this dissertation designs a multi-TA model-based lightweight authentication and key agreement scheme,which can be used to secure delay-sensitive applications that rely on vehicle-to-fog communications.Specifically,the proposed scheme designs a multi-TA decentralized communication architecture to improve the system robustness,achieve the privacy preservation of real identity list of vehicles,and implement the vehicle revocation function.Additionally,the proposed scheme uses symmetric cryptography to design a lightweight authentication and key agreement algorithm without sacrificing security strength,so that the efficiency and security can be implemented during the key agreement process of the vehicle and fog node.Security analysis shows that the proposed scheme satisfies session-key semantic security and various security and privacy requirements of V2 X communications.Performance analysis demonstrates that the proposed scheme significantly outperforms related schemes.(4)This dissertation proposes a full decentralized authentication and key agreement scheme,which is suitable for securing V2 X communications.Traditional blockchain-based V2 X authentication and key agreement schemes rely on trusted authority,fail to implement full decentralization,and has the performance optimization space.To solve these deficiencies,this dissertation designs a smart contract-based full decentralized authentication and key agreement scheme,which can be used to secure V2 X communications in the environment where trusted authority does not exist.The proposed scheme uses smart contract to design a vehicle management mechanism to implement the registration,authentication,and revocation functions for the identities or public keys of vehicles under the existing public blockchain environment,where the trusted authority does not exist.Additionally,the proposed scheme uses elliptic curve cryptography to design a lightweight authentication and key agreement algorithm to secure the efficiency and security of the key agreement process in the V2 V or V2 I scenario.Security proof and analysis show that the proposed scheme can satisfy multiple security characteristics and resist various attacks.Performance analysis demonstrates that the proposed scheme has low deployment costs and outperforms related schemes in both V2 V and V2 I communication modes...
Keywords/Search Tags:V2X, Authentication and key agreement, Lightweight, Security, Privacy preservation, Centralization, Decentralization
PDF Full Text Request
Related items