IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v12y2024i23p3756-d1532130.html
   My bibliography  Save this article

An Anonymous and Efficient Authentication Scheme with Conditional Privacy Preservation in Internet of Vehicles Networks

Author

Listed:
  • Chaeeon Kim

    (School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea)

  • DeokKyu Kwon

    (School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea)

  • Seunghwan Son

    (School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea)

  • Sungjin Yu

    (School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
    Electronics and Telecommunications Research Institute, Daejeon 34129, Republic of Korea)

  • Youngho Park

    (School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea)

Abstract

The Internet of Vehicles (IoV) is an emerging technology that enables vehicles to communicate with their surroundings, provide convenient services, and enhance transportation systems. However, IoV networks can be vulnerable to security attacks because vehicles communicate with other IoV components through an open wireless channel. The recent related work suggested a two-factor-based lightweight authentication scheme for IoV networks. Unfortunately, we prove that the related work cannot prevent various security attacks, such as insider and ephemeral secret leakage (ESL) attacks, and fails to ensure perfect forward secrecy. To address these security weaknesses, we propose an anonymous and efficient authentication scheme with conditional privacy-preserving capabilities in IoV networks. The proposed scheme can ensure robustness against various security attacks and provide essential security features. The proposed scheme ensures conditional privacy to revoke malicious behavior in IoV networks. Moreover, our scheme uses only one-way hash functions and XOR operations, which are low-cost cryptographic operations suitable for IoV. We also prove the security of our scheme using the “Burrows–Abadi–Needham (BAN) logic”, “Real-or-Random (ROR) model”, and “Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool”. We evaluate and compare the performance and security features of the proposed scheme with existing methods. Consequently, our scheme provides improved security and efficiency and is suitable for practical IoV networks.

Suggested Citation

  • Chaeeon Kim & DeokKyu Kwon & Seunghwan Son & Sungjin Yu & Youngho Park, 2024. "An Anonymous and Efficient Authentication Scheme with Conditional Privacy Preservation in Internet of Vehicles Networks," Mathematics, MDPI, vol. 12(23), pages 1-30, November.
  • Handle: RePEc:gam:jmathe:v:12:y:2024:i:23:p:3756-:d:1532130
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/12/23/3756/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/12/23/3756/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Deokkyu Kwon & Seunghwan Son & Kisung Park & Youngho Park, 2024. "A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET," Mathematics, MDPI, vol. 12(15), pages 1-21, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:12:y:2024:i:23:p:3756-:d:1532130. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.