Journal on Communications ›› 2023, Vol. 44 ›› Issue (6): 103-116.doi: 10.11959/j.issn.1000-436x.2023055

• Papers • Previous Articles     Next Articles

Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles

Haibo ZHANG1,2, Kai LAN1,2, Zhou CHEN1,2, Ruyan WANG1,2, Can ZOU3, Mingyue WANG1,4   

  1. 1 School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    2 Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China, Chongqing 400065, China
    3 360 Digital Security Technology Group Co., Ltd., Beijing 100015, China
    4 Aalborg University, Aalborg 9220, Denmark
  • Revised:2023-02-06 Online:2023-06-25 Published:2023-06-01
  • Supported by:
    The National Natural Science Foundation of China(61901071);The National Natural Science Foundation of China(61801065);The Program for Changjiang Scholars and Innovative Research Team in University(IRT16R72);Chongqing Innovation and Entrepreneurship Program for the Returned Overseas Chinese Scholars(cx2020059)

Abstract:

Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.

Key words: IoV, batch authentication, group key agreement, chaotic mapping, key update mechanism

CLC Number: 

No Suggested Reading articles found!