Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2023-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023136/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841540080327458816 |
---|---|
author | Yinghui ZHANG Jiale QIAN Jin CAO Dong ZHENG |
author_facet | Yinghui ZHANG Jiale QIAN Jin CAO Dong ZHENG |
author_sort | Yinghui ZHANG |
collection | DOAJ |
description | Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%. |
format | Article |
id | doaj-art-e4bfb9e0a3a34f569161a769bf0e955d |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2023-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-e4bfb9e0a3a34f569161a769bf0e955d2025-01-14T06:22:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-08-014414415459385952Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2XYinghui ZHANGJiale QIANJin CAODong ZHENGAiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023136/5G-V2Xgroup handover authenticationuser groupingcertificateless aggregation signatureScyther |
spellingShingle | Yinghui ZHANG Jiale QIAN Jin CAO Dong ZHENG Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X Tongxin xuebao 5G-V2X group handover authentication user grouping certificateless aggregation signature Scyther |
title | Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X |
title_full | Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X |
title_fullStr | Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X |
title_full_unstemmed | Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X |
title_short | Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X |
title_sort | secure and efficient group handover authentication protocol based on trajectory prediction in 5g v2x |
topic | 5G-V2X group handover authentication user grouping certificateless aggregation signature Scyther |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023136/ |
work_keys_str_mv | AT yinghuizhang secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x AT jialeqian secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x AT jincao secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x AT dongzheng secureandefficientgrouphandoverauthenticationprotocolbasedontrajectorypredictionin5gv2x |