Journal of Jilin University(Engineering and Technology Edition) ›› 2025, Vol. 55 ›› Issue (5): 1788-1797.doi: 10.13229/j.cnki.jdxbgxb.20240599

Previous Articles     Next Articles

Key-driven trust mechanisms for identity authentication in vehicular networks

Yin-fei DAI1(),Xiu-zhen ZHOU1,Zi-yao FAN1,Rong-yuan LIU2,Zhi-yuan LIU1,Shao-qiang WANG1(),Wei DU1   

  1. 1.College of Computer Science and Technology,Changchun University,Changchun 130022,China
    2.School of Computer Science and Engineering,Changchun University of Technology,Changchun 130102,China
  • Received:2024-05-30 Online:2025-05-01 Published:2025-07-18
  • Contact: Shao-qiang WANG E-mail:daiyf@ccu.edu.cn;xiu1232024@163.com

Abstract:

Firstly,a key negotiation based authentication and security trust scheme is proposed for security and privacy issues in vehicular ad-hoc network (VANET). Secondly, an elliptic curve cryptosystem based signature generation is used, and a low-consumption key distribution scheme is proposed, where the communicating parties exchange parameters to mutually authenticate and securely generate session keys. Finally, the communicating entities are authenticated by three-way two-way authentication. After security and performance analysis, it shows that the scheme can improve the efficiency of identity authentication and reduce the system overhead, which has good theoretical and application value, and the system is deployed in conjunction with the Network Security Level Protection level 3 requirements standard, which can solve the identity privacy protection and security trust problems in the in-vehicle self-organizing network.

Key words: network security and communication security, vehicular ad hoc-network, elliptic hyperbolic signature, key agreement, identity authentication

CLC Number: 

  • TP393.08

Fig.1

Reference model of entity relationship for vehicle network communication security"

Table 1

Description of some of the symbols of the program"

符号含义
sk, Q系统私钥及其对应公钥
G基点
a, b椭圆曲线方程的参数
UserId签名者标识符
lenUserId的长度
AC认证证书
SK会话密钥
m待签名的消息
x||?yxy的拼接,其中xy可以是比特串或字节串
kP椭圆曲线上点Pk倍点

Fig.2

Pic pseudo-random number generation process"

Table 2

Various calculation execution times"

运算类别执行时间/ms
双线性对上的加法运算(Tbpa)0.05
双线性配对运算(Tbp)6.05
映射到点的哈希运算(Tmtp)22.8
双线性配对中的标量乘(Tbpm)9.85
椭圆曲线上标量乘(Teccm)0.9
椭圆曲线上点加运算(Tecca)0.002
哈希函数运算(Th)0.001

Table 3

Calculation cost of four schemes"

方案运算次数计算开销/ms
文献[134Tbpm+Tbpa+2Th+Tmtp62.25
文献[144Tbpm+Th+Tbpa39.4
文献[153Teccm+Tecca+2Tmtp48.3
本文10Teccm+2Tecca+13Th9.02

Fig.3

Computational overhead required for each scenario with different numbers of vehicles"

Fig.4

Comparison of computational costs for four schemes"

Table 4

Comparison of request information length for four schemes"

方案单条消息/Bn条消息/B
文献[13296296
文献[14408408
文献[15469469
本文160160

Fig.5

Comparison of communication costs among four schemes"

[1] Cheng T, Wu Z, Wang C, et al. Research on vehicle-to-cloud communication based on lightweight authentication and extended quantum key distribution[J]. IEEE Transactions on Vehicular Technology, 2024, 73(8): 12082-12095.
[2] Di X, Sun Y, Lu J, et al. Blockchain-based authentication scheme for vehicle network nodes[C]∥2023 International Conference on Blockchain Technology and Information Security (ICBCTIS), Xi'an, China, 2023: 204-210.
[3] 叶卫明,常贺.基于智能网联汽车的通信和信息安全研究[J].电信工程技术与标准化, 2022,35(1):93-97.
Ye Wei-ming, Chang He. Research on communication and information security based on intelligent connected vehicles[J]. Telecommunications Engineering Technology and Standardization, 2022, 35 (1): 93-97.
[4] 曾晟珂,陈勇,夏梅宸.车载自组网的隐私保护问题[J].西华大学学报:自然科学版,2015, 34(4):1-7.
Zeng Sheng-ke, Chen Yong, Xia Mei-chen. Privacy protection issues in vehicle ad hoc networks[J]. Journal of Xihua University (Natural Science Edition), 2015, 34 (4): 1-7.
[5] 邓雨康, 张磊, 李晶. 车联网隐私保护研究综述[J].计算机应用研究, 2022, 39 (10): 2891-2906.
Deng Yu-kang, Zhang Lei, Li Jing. A review of research on privacy protection in telematics[J]. Computer Application Research, 2022, 39 (10): 2891-2906.
[6] 朱栋, 殷新春, 宁建廷. 车联网中具有强隐私保护的无证书签名方案[J]. 计算机应用, 2022, 42(10): 3091-3101.
Zhu Dong, Yin Xin-chun, Ning Jian-ting. A certificate-less signature scheme with strong privacy preservation in telematics[J]. Computer Applications, 2022, 42(10): 3091-3101.
[7] Chen Y, Chen J. CPP-CLAS: efficient and conditional privacy preserving certificateless aggregate signature scheme for VANETs[J]. IEEE Internet of Things Journal, 2022, 9 (12): 10354-10365.
[8] Liang Y, Luo E, Liu Y. Physically secure and conditional-privacy authenticated key agreement for VANETs[J]. IEEE Transactions on Vehicular Technology, 2023, 72 (6): 7914-7925.
[9] Azees M, Vijayakumar P, Deboarh L J. EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(9): 2467-2476.
[10] 杨晓东, 裴喜祯, 安发英, 等. 基于身份聚合签名的车载自组网消息认证方案[J]. 计算机工程, 2020, 46(2): 171-182.
Yang Xiao-dong, Pei Xi-zhen, An Fa-ying, et al. A message authentication scheme for vehicle ad hoc networks based on identity aggregation signature[J]. Computer Engineering, 2020,46 (2): 171-182.
[11] Han M, Yin Z K, Cheng P Z, et al. Zero-knowledge identity authentication for internet of vehicles: improvement and application[J]. PLoS ONE, 2020, 9:No. 0239043.
[12] 陈葳葳, 曹利, 邵长虹. 基于区块链技术的车联网高效匿名认证方案[J]. 计算机应用, 2020, 40(10): 2992-2999.
Chen Wei-wei, Cao Li, Shao Chang-hong. An efficient anonymous authentication scheme for Telematics based on blockchain technology[J]. Computer Applications, 2020, 40(10): 2992-2999.
[13] Pournaghi S M, Zahednejad B, Bayat M, et al. NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET[J]. Computer Networks, 2018, 134:78-92.
[14] Wang H, Wang L, Zhang K, et al. A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs[J]. IEEE Access, 2022, 10: 15605-15618.
[15] Xu Z Y, He D B, Kumar N, et al. Efficient certificateless aggregate signature scheme for performing secure routing in VANETs[J]. Security and Communication Networks,2020, 12(3): 53-68.
[16] 杨宜青. 车联网安全通信的密钥管理研究[D]. 成都: 成都电子科技大学信息通信与工程学院, 2021.
Yang Yi-qing. Research on key management for secure communication of internet of vehicles[D]. Chengdu: School of Information Communication and Engineering, Chengdu University of Electronic Science and Technology, 2021.
[17] 王冠, 张倩倩. 基于SGX的车联网身份认证方案研究[J].计算机技术与发展,2023,33(11):99-105.
Wang Guan, Zhang Qian-qian. Research on SGX-based identity authentication scheme for telematics[J]. Computer Technology and Development,2023,33(11):99-105.
[18] Jiang S, Zhu X, Wang L. An efficient anonymous batch authentication scheme based on hmac for VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2016, 17(8):2193-2204.
[19] 陈虹, 刘雨朦, 肖成龙, 等.基于椭圆曲线的改进RC4算法[J].计算机应用, 2019, 39(8):2339-2345.
Chen Hong, Liu Yu-meng, Xiao Cheng-long, et al. Improved RC4 algorithm based on elliptic curves[J]. Computer Applications, 2019, 39(8):2339-2345.
[20] 北京数字认证股份有限公司. 证书吊销列表分发方法、设备及存储介质、服务器、车联网设[P]. 中国: CN202111458608.5,2021-04-21.
[21] 张晓均, 唐浩宇, 张楠, 等. 分布式智能车载网联系统的匿名认证与密钥协商协议[J]. 电子与信息学报, 2024,46(4):1333-1342.
Zhang Xiao-jun, Tang Hao-yu, Zhang Nan, et al. An anonymous authentication and key negotiation protocol for distributed intelligent in-vehicle networked systems[J]. Journal of Electronics and Information, 2024,46(4):1333-1342.
[22] 于斌斌, 胡亮, 迟令. 可抵抗内外部攻击的无线传感器网络数字签名方案[J]. 吉林大学学报: 工学版, 2019, 49(5): 1666-1681.
Yu Bin-bin, Hu Liang, Chi Ling. A digital signature scheme for wireless sensor networks that can resist internal and external attacks[J]. Journal of Jilin University(Engineering and Technology Edition), 2019, 49 (5): 1666-1681.
[1] Shu-xu ZHAO,Zhi-chao SUN,Xiao-long WANG. Dynamic authentication protocol for mobile edge computing scenarios [J]. Journal of Jilin University(Engineering and Technology Edition), 2025, 55(3): 1050-1060.
[2] Li ZHENG,Guang-hui YAN,Tian-feng YAN. Identity authentication of wireless power mobile terminal based on mobile Agent [J]. Journal of Jilin University(Engineering and Technology Edition), 2024, 54(3): 815-820.
[3] Yi-cheng YU,Liang HU,Ling CHI,Jian-feng CHU. An anonymous authentication protocol for single⁃server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2021, 51(2): 659-666.
[4] YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng. Improved anonymous authentication protocol for multi-server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1586-1592.
[5] YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[6] WANG Hao, ZHANG Xiao, WANG Ping, ZHANG Yang. Lightweight certificateless signature and key agreement scheme for WSNs [J]. 吉林大学学报(工学版), 2014, 44(2): 465-470.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Sun Zhi-juan, Zhang Xin-ya, Jiang Qing-mei, Chen Huan-qin . Nucleation mechanism of MMA/BA semi-continuous emulsion copolymerization[J]. 吉林大学学报(工学版), 2007, 37(04): 965 -970 .
[2] . [J]. 吉林大学学报(工学版), 2007, 37(06): 1386 -1391 .
[3] ZONG Chang-fu,CHEN Shuang,FENG Gang,YIN Gang,XIANG Hui. Evaluation of vehicle ride comfort based on frequency weighted filtering[J]. 吉林大学学报(工学版), 2011, 41(6): 1517 -1521 .
[4] Xu Guan, Su Jian, Chen Rong, Zhang Li-bin, Su Li-li . Error analysis of measurement model and calibration method for automobile caster[J]. 吉林大学学报(工学版), 2008, 38(01): 17 -020 .
[5] Meng Fan-zhong;Cheng Ya-bing;Li Ya-nan . Fatigue lifetime distribution pattern of automotive chain[J]. 吉林大学学报(工学版), 2006, 36(06): 889 -0892 .
[6] SHI Gang,SHI Yong-jiu,WANG Yuan-qing . Analysis on overall buckling behaviour of ultra-high strength steel columns by ANSYS[J]. 吉林大学学报(工学版), 2009, 39(01): 113 -118 .
[7] ZHANG Shu-shan, GAO Da-xin|WANG Tao|WANG Li. Research on the design, simulation and optimization of logistics services ability based on |dynamic quality function deployment[J]. 吉林大学学报(工学版), 2009, 39(增刊2): 204 -0208 .
[8] Pan Hong-junSun Ji-gui,Qi Chang-song . Hierarchical fuzzy Petri nets: formal definitions and reasoning[J]. 吉林大学学报(工学版), 2007, 37(01): 111 -116 .
[9] Zhan Xiao-li;Zhang Xiao-ning;Lu Liang . Prediction of low temperature viscoelastic properties of asphalt [J]. 吉林大学学报(工学版), 2008, 38(03): 530 -0534 .
[10] Zhang Xue-song, Lu Yi-nan, Cui Wei-li . Call flow obfuscation technique for Java program
[J]. 吉林大学学报(工学版), 2008, 38(增刊): 150 -0155 .