Inicio  /  Future Internet  /  Vol: 15 Par: 1 (2023)  /  Artículo
ARTÍCULO
TITULO

A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph

Qiang Li    

Resumen

Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system.

Palabras claves

 Artículos similares

       
 
Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes and Lucas Bouvarel    
This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health... ver más
Revista: Future Internet

 
Andrew John Poulter, Steven J. Ossont and Simon J. Cox    
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-c... ver más
Revista: Future Internet

 
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile... ver más
Revista: Future Internet

 
Nikos Fotiou and George C. Polyzos    
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s... ver más
Revista: Future Internet

 
Zakariae Belghazi, Nabil Benamar, Adnane Addaim and Chaker Abdelaziz Kerrache    
With the rapid growth of Internet of Things (IoT) devices around the world, thousands of mobile users share many data with each other daily. IoT communication has been developed in the past few years to ensure direct connection among mobile users. Howeve... ver más
Revista: Future Internet