Journal on Communications ›› 2021, Vol. 42 ›› Issue (6): 213-225.doi: 10.11959/j.issn.1000-436x.2021073
• Correspondences • Previous Articles Next Articles
Haibo ZHANG1,2, Hongwu HUANG1,2, Kaijian LIU1,2, Xiaofan HE3
Revised:
2021-03-03
Online:
2021-06-25
Published:
2021-06-01
Supported by:
CLC Number:
Haibo ZHANG, Hongwu HUANG, Kaijian LIU, Xiaofan HE. Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles[J]. Journal on Communications, 2021, 42(6): 213-225.
[1] | VASUDEV H , DAS D . Work-in-progress:SAFE:secure authentication for future entities using Internet of vehicles[C]// 2019 IEEE Real-Time Systems Symposium. Piscataway:IEEE Press, 2019: 560-563. |
[2] | SUN Y C , WU L , WU S Z ,et al. Security and privacy in the Internet of vehicles[C]// 2015 International Conference on Identification,Information,and Knowledge in the Internet of Things. Piscataway:IEEE Press, 2015: 116-121. |
[3] | TULADHAR K M , LIM K . Efficient and scalable certificate revocation list distribution in hierarchical VANETs[C]// 2018 IEEE International Conference on Electro/Information Technology. Piscataway:IEEE Press, 2018: 620-625. |
[4] | SUN G , SUN S Y , SUN J ,et al. Security and privacy preservation in fog-based crowd sensing on the Internet of vehicles[J]. Journal of Network and Computer Applications, 2019,134: 89-99. |
[5] | FREUDIGER J , RAYA M , FELEGHHAZI M . Mix zones for location privacy in vehicular networks[C]// ACM Workshop on Wireless Networking for Intelligent Transportation Systems. New York:ACM Press, 2007: 1-7. |
[6] | LU R , LIN X , ZHU H ,et al. ECPP:efficient conditional privacy preservation protocol for secure vehicular communications[C]// IEEE INFOCOM 2008-The 27th Conference on Computer Communications. Piscataway:IEEE Press, 2008: 1229-1237. |
[7] | ZHANG L , WU Q H , SOLANAS A ,et al. A scalable robust authentication protocol for secure vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2010,59(4): 1606-1617. |
[8] | JIANG Y X , SHI M H , SHEN X M ,et al. BAT:a robust signature scheme for vehicular networks using binary authentication tree[J]. IEEE Transactions on Wireless Communications, 2009,8(4): 1974-1983. |
[9] | YAO L , LIN C , DENG J ,et al. Biometrics-based data link layer anonymous authentication in VANETs[C]// 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Piscataway:IEEE Press, 2013: 182-187. |
[10] | JIANG S R , ZHU X Y , WANG L M . An efficient anonymous batch authentication scheme based on HMAC for VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2016,17(8): 2193-2204. |
[11] | YING B D , NAYAK A . Anonymous and lightweight authentication for secure vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2017,66(12): 10626-10636. |
[12] | LIU J W , LI Q Q , SUN R ,et al. An efficient anonymous authentication scheme for Internet of vehicles[C]// 2018 IEEE International Conference on Communications. Piscataway:IEEE Press, 2018: 1-6. |
[13] | ZHAO D W , PENG H P , LI L X ,et al. A secure and effective anonymous authentication scheme for roaming service in global mobility networks[J]. Wireless Personal Communications, 2014,78(1): 247-269. |
[14] | CUI J , WANG Y L , ZHANG J ,et al. Full session key agreement scheme based on chaotic map in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(8): 8914-8924. |
[15] | LI G S , JIANG Q , WEI F S ,et al. A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015,80(2): 581-589. |
[16] | ZENG Y B , GUANG H , LI G S . Attribute-based anonymous handover authentication protocol for wireless networks[J]. Security and Communication Networks, 2018,2018: 1-9. |
[17] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. Cryptography Mailing, 2008. |
[18] | SHARMA V . An energy-efficient transaction model for the blockchain-enabled Internet of vehicles (IoV)[J]. IEEE Communications Letters, 2019,23(2): 246-249. |
[19] | BAGGA P , DAS A K , WAZID M ,et al. Authentication protocols in Internet of vehicles:taxonomy,analysis,and challenges[J]. IEEE Access, 2020,8: 54314-54344. |
[20] | YANG J L , WANG D H . Applying extended chebyshev polynomials to construct a trap-door one-way function in real field[C]// 2009 First International Conference on Information Science and Engineering. Piscataway:IEEE Press, 2009: 1680-1682. |
[21] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance[C]// Proceedings of the Third Symposium on Operating Systems Design and Implementation. New York:ACM Press, 1999: 173-186. |
[22] | CHEN Z L , CHEN S Z , XU H ,et al. A security authentication scheme of 5G ultra-dense network based on block chain[J]. IEEE Access, 2018,6: 55372-55379. |
[23] | HU W , HU Y W , YAO W H ,et al. A blockchain-based Byzantine consensus algorithm for information authentication of the Internet of vehicles[J]. IEEE Access, 2019,7: 139703-139711. |
[24] | 郑敏, 王虹, 刘洪 ,等. 区块链共识算法研究综述[J]. 信息网络安全, 2019(7): 8-24. |
ZHENG M , WANG H , LIU H ,et al. Survey on consensus algorithms of blockchain[J]. Netinfo Security, 2019(7): 8-24. | |
[25] | BRESSON E , CHEVASSUT O , POINTCHEVAL D . Security proofs for an efficient password-based key exchange[C]// Proceedings of the 10th ACM Conference on Computer and Communication Security. New York:ACM Press, 2003: 241-250. |
[26] | 屈娟, 冯玉明, 李艳平 ,等. 可证明安全的面向无线传感器网络的三因素认证及密钥协商方案[J]. 通信学报, 2018,39(S2): 189-197. |
QU J , FENG Y M , LI Y P ,et al. Provably secure three-factor authentication and key agreement scheme for wireless sensor network[J]. Journal on Communications, 2018,39(S2): 189-197. |
[1] | Haibo ZHANG, Kai LAN, Zhou CHEN, Ruyan WANG, Can ZOU, Mingyue WANG. Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles [J]. Journal on Communications, 2023, 44(6): 103-116. |
[2] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[3] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[4] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[5] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[6] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[7] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[8] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[9] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[10] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[11] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[12] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[13] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[14] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[15] | Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism [J]. Journal on Communications, 2022, 43(8): 176-187. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|