Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X

Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved...

Full description

Saved in:
Bibliographic Details
Main Authors: Yinghui ZHANG, Jiale QIAN, Jin CAO, Dong ZHENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2023-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023136/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841540080327458816
author Yinghui ZHANG
Jiale QIAN
Jin CAO
Dong ZHENG
author_facet Yinghui ZHANG
Jiale QIAN
Jin CAO
Dong ZHENG
author_sort Yinghui ZHANG
collection DOAJ
description Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.
format Article
id doaj-art-e4bfb9e0a3a34f569161a769bf0e955d
institution Kabale University
issn 1000-436X
language zho
publishDate 2023-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-e4bfb9e0a3a34f569161a769bf0e955d2025-01-14T06:22:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-08-014414415459385952Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2XYinghui ZHANGJiale QIANJin CAODong ZHENGAiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023136/5G-V2Xgroup handover authenticationuser groupingcertificateless aggregation signatureScyther
spellingShingle Yinghui ZHANG
Jiale QIAN
Jin CAO
Dong ZHENG
Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
Tongxin xuebao
5G-V2X
group handover authentication
user grouping
certificateless aggregation signature
Scyther
title Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
title_full Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
title_fullStr Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
title_full_unstemmed Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
title_short Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
title_sort secure and efficient group handover authentication protocol based on trajectory prediction in 5g v2x
topic 5G-V2X
group handover authentication
user grouping
certificateless aggregation signature
Scyther
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023136/
work_keys_str_mv AT yinghuizhang secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x
AT jialeqian secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x
AT jincao secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x
AT dongzheng secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x