Journal on Communications ›› 2023, Vol. 44 ›› Issue (8): 144-154.doi: 10.11959/j.issn.1000-436x.2023136

• Papers • Previous Articles    

Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X

Yinghui ZHANG1,2, Jiale QIAN1,2, Jin CAO3, Dong ZHENG1,2   

  1. 1 School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    2 National Engineering Research Center for Secured Wireless, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    3 School of Cyber Engineering, Xidian University, Xi’an 710071, China
  • Revised:2023-07-16 Online:2023-08-01 Published:2023-08-01
  • Supported by:
    The National Natural Science Foundation of China(62072369);The National Natural Science Foundation of China(62072371);The Youth Innovation Team of Shaanxi Universities Foundation;The Shaanxi Special Support Program Youth Top-notch Talent Program;The Key Research and Development Program of Shaanxi(2021ZDLGY06-02);The Key Research and Development Program of Shaanxi(2020ZDLGY08-04);The Technology Innovation Leading Program of Shaanxi(2023-YD-CGZH-31)

Abstract:

Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.

Key words: 5G-V2X, group handover authentication, user grouping, certificateless aggregation signature, Scyther

CLC Number: 

No Suggested Reading articles found!