Skip to main content

Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV

  • Conference paper
  • First Online:
Intelligent Information Processing XII (IIP 2024)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 703))

Included in the following conference series:

  • 43 Accesses

Abstract

The exchange of real-time data between vehicle-to-vehicle communications is crucial in the Internet of Vehicles (IoV) for vehicle-intelligent decisions. However, malicious and false communication data may cause serious personal safety accidents. Confirming the authenticity of the identities of both parties and encrypting communication content before communication is the first line of defense to ensure system security. Therefore, to secure the vehicle-to-vehicle communications, this paper proposes a secure and efficient authentication and key agreement scheme with lightweight operation. Our scheme achieves vehicle-to-vehicle authentication and establishes a session key to encrypt subsequent communication content with only lightweight operations such as symmetric encryption algorithms and hash functions. Furthermore, our scheme provides many ideal attributes, such as forward secrecy, which ensures that the final compromised of the system will not affect the previous communication content. Besides, we prove the security of the proposed scheme through heuristic analysis and BAN logic analysis and analyze the performance of the proposed scheme via comparing the computational cost and communication cost with three state-of-the-art related schemes. The results show that the proposed scheme has high communication efficiency.

This work is supported partly by the National Key Research and Development Program of China (No.: 2022YFB3104405).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Lu, Z., Qu, G., Liu, Z.: A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. 20, 760–776 (2018)

    Article  Google Scholar 

  2. Bagga, P., Das, A.K., Wazid, M., Rodrigues, J.J., Park, Y.: Authentication protocols in internet of vehicles: taxonomy, analysis, and challenges. IEEE Access 8, 54314–54344 (2020)

    Article  Google Scholar 

  3. Sutrala, A.K., Bagga, P., Das, A.K., Kumar, N., Rodrigues, J.J., Lorenz, P.: On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment. IEEE Trans. Veh. Technol. 69, 5535–5548 (2020)

    Article  Google Scholar 

  4. Fan, B., Zhang, Y., Chen, Y., Meng, L.: Intelligent vehicle lateral control based on radial basis function neural network sliding mode controller. CAAI Trans. Intell. Technol. 7, 455–468 (2022)

    Article  Google Scholar 

  5. Li, L., Li, T.: Traceability model based on improved witness mechanism. CAAI Trans. Intell. Technol. 7, 331–339 (2022)

    Article  Google Scholar 

  6. Raw, R.S., Kumar, M., Singh, N.: Security challenges, issues and their solutions for vanet. Int. J. Netw. Secur. Appl. 5(5), 95 (2013)

    Google Scholar 

  7. Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005)

    Google Scholar 

  8. Eichler, S.: Strategies for pseudonym changes in vehicularad hoc networks depending on node mobility. In: Proceedings of 2007 IEEE Intelligent Vehicles Symposium, pp. 541–546. IEEE Press, Washington (2007)

    Google Scholar 

  9. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1229–1237. IEEE (2008)

    Google Scholar 

  10. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology, pp. 47–53. Springer Berlin Heidelberg, Berlin, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  11. Ali, I., Li, F.: An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Vehicular Commun. 22, 100228 (2020)

    Article  Google Scholar 

  12. Kshetli, N.: Can blockchain strengthen the internet of things? IT Professional 19, 68–72 (2017)

    Article  Google Scholar 

  13. Liu, L., Li, F., Qi, E.: Research on risk avoidance and coordination of supply chain subject based on blockchain technology. Sustainability 11(7), 2182 (2019). https://doi.org/10.3390/su11072182

    Article  Google Scholar 

  14. Stallings, W.: Cryptography and network security: principles and practice. Int. Ann. Criminol. 46(4), 121–136 (1999)

    Google Scholar 

  15. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.) Advances in Cryptology - ASIACRYPT 2003, pp. 452–473. Springer Berlin Heidelberg, Berlin, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  16. Xiong, H., Guan, Z., Chen, Z., Li, F.: An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219, 225–235 (2013)

    Article  MathSciNet  Google Scholar 

  17. Ali, I., Chen, Y., Ullah, N., Kumar, R., He, W.: An efficient and provably secure ecc-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Trans. Veh. Technol. 70(2), 1278–1291 (2021)

    Article  Google Scholar 

  18. Chen, Y., Chen, J.: CPP-CLAS: efficient and conditional privacy-preserving certificateless aggregate signature scheme for VANETs. IEEE Internet Things J. 9(12), 10354–10365 (2022). https://doi.org/10.1109/JIOT.2021.3121552

    Article  Google Scholar 

  19. Thumbur, G., Rao, G.S., Reddy, P.V., Gayathri, N., Reddy, D.K., Padmavathamma, M.: Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks. IEEE Internet Things J. 8(3), 1908–1920 (2020)

    Article  Google Scholar 

  20. Yu, S., Cao, Q., Wang, C., Xu, G.: Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V. IEEE Trans. Veh. Technol. 72(11), 15028–15039 (2023)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guosheng Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hou, J., Jian, Y., Xu, G., Cao, Q., Xu, G. (2024). Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV. In: Shi, Z., Torresen, J., Yang, S. (eds) Intelligent Information Processing XII. IIP 2024. IFIP Advances in Information and Communication Technology, vol 703. Springer, Cham. https://doi.org/10.1007/978-3-031-57808-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57808-3_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57807-6

  • Online ISBN: 978-3-031-57808-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics