Journal on Communications ›› 2021, Vol. 42 ›› Issue (6): 213-225.doi: 10.11959/j.issn.1000-436x.2021073

• Correspondences • Previous Articles     Next Articles

Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles

Haibo ZHANG1,2, Hongwu HUANG1,2, Kaijian LIU1,2, Xiaofan HE3   

  1. 1 School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    2 Chongqing Key Laboratory of Mobile Communication Technology, Chongqing 400065, China
    3 School of Electronic Information, Wuhan University, Wuhan 430072, China
  • Revised:2021-03-03 Online:2021-06-25 Published:2021-06-01
  • Supported by:
    The National Natural Science Foundation of China(61801065);The Program for Changjiang Scholars and Innovative Research Team in University(IRT16R72);Chongqing Innovation and Entrepreneurship Project for Returned Overseas Chinese Scholars(cx2020059);The General Project on Foundation and Cutting-edge Research Plan of Chongqing(cstc2018jcyjAX0463)

Abstract:

Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.

Key words: IoV, anonymous traceability, chaotic mapping, group authentication, reverse Hash chain, blockchain

CLC Number: 

No Suggested Reading articles found!