Cross-domain Identity Authentication in IoV

To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication algorithm based on the master-slave multi-chain, called CAMS. It utilizes the master-slave multi-chain to achieve cross-domain storage and sharing...

Full description

Saved in:
Bibliographic Details
Published inProceedings (International Conference on Communication Technology. Online) pp. 696 - 701
Main Authors Zhang, Ming, Li, Yuhang, Guo, Yufan, Liao, Dan, Li, Hui, Li, Yujuan
Format Conference Proceeding
LanguageEnglish
Published IEEE 20.10.2023
Subjects
Online AccessGet full text
ISSN2576-7828
DOI10.1109/ICCT59356.2023.10419648

Cover

Abstract To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication algorithm based on the master-slave multi-chain, called CAMS. It utilizes the master-slave multi-chain to achieve cross-domain storage and sharing of vehicle data, thereby improving cross-domain authentication efficiency. Moreover, the CAMS algorithm introduces pseudonym generation and verification parameters in the cross-domain authentication process. It further verifies the vehicle identity before verifying the message, ensuring the anonymity of authentication identity and resisting the identity forgery attack. Finally, the simulation results show that the superior performance of the CAMS in terms of computational overhead and authentication efficiency.
AbstractList To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication algorithm based on the master-slave multi-chain, called CAMS. It utilizes the master-slave multi-chain to achieve cross-domain storage and sharing of vehicle data, thereby improving cross-domain authentication efficiency. Moreover, the CAMS algorithm introduces pseudonym generation and verification parameters in the cross-domain authentication process. It further verifies the vehicle identity before verifying the message, ensuring the anonymity of authentication identity and resisting the identity forgery attack. Finally, the simulation results show that the superior performance of the CAMS in terms of computational overhead and authentication efficiency.
Author Li, Hui
Li, Yujuan
Guo, Yufan
Li, Yuhang
Liao, Dan
Zhang, Ming
Author_xml – sequence: 1
  givenname: Ming
  surname: Zhang
  fullname: Zhang, Ming
  email: 8202362@gmail.com
  organization: School of Information and Communication Engineering, University of Electronic Science and Technology of China
– sequence: 2
  givenname: Yuhang
  surname: Li
  fullname: Li, Yuhang
  email: liyuhang@ruixinan.com
  organization: Chengdu Ruixinan Information Security Technology Co.,Ltd,Evaluation Division,Chengdu,China
– sequence: 3
  givenname: Yufan
  surname: Guo
  fullname: Guo, Yufan
  email: 963312439@qq.com
  organization: School of Information and Communication Engineering, University of Electronic Science and Technology of China
– sequence: 4
  givenname: Dan
  surname: Liao
  fullname: Liao, Dan
  email: dliao.uestc@gmail.com
  organization: School of Information and Communication Engineering, University of Electronic Science and Technology of China
– sequence: 5
  givenname: Hui
  surname: Li
  fullname: Li, Hui
  email: whwbylihui@gmail.com
  organization: School of Aeronautics and Astronautics, University of Electronic Science and Technology of China,Chengdu,China
– sequence: 6
  givenname: Yujuan
  surname: Li
  fullname: Li, Yujuan
  email: 451339904@qq.com
  organization: Sichuan Electronic Information Industry Technology Research Institute Co., Ltd,Chengdu,China
BookMark eNo1j8FKxDAURaMoOI79A8HupfW9vKTNWw7F0cKAm9HtkCYpRpxG2rqYv5eirs6FAxfOtbgY0hCEuEMoEYEf2qbZayZdlRIklQgKuVLmTGRcsyENJDVrPhcrqeuqqI00VyKbpg8AIDTMwCtx34xpmgqfjjYOeevDMMf5lG--5_dlOjvHNOSLSm834rK3n1PI_rgWr9vHffNc7F6e2mazKyIizwVip5wmB6r3jnr0PXTkiKivLKC2rGqv2RlQ3tWSrEHbBcV-MZUxltbi9vc3hhAOX2M82vF0-O-jH_a5RYY
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCT59356.2023.10419648
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9798350325959
EISSN 2576-7828
EndPage 701
ExternalDocumentID 10419648
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61971105
  funderid: 10.13039/501100001809
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i119t-11b4c53c04fdc3f1df0b3c333f6a015a947d59c804dc723a81abe49d5a94688a3
IEDL.DBID RIE
IngestDate Wed Oct 01 07:05:09 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-11b4c53c04fdc3f1df0b3c333f6a015a947d59c804dc723a81abe49d5a94688a3
PageCount 6
ParticipantIDs ieee_primary_10419648
PublicationCentury 2000
PublicationDate 2023-Oct.-20
PublicationDateYYYYMMDD 2023-10-20
PublicationDate_xml – month: 10
  year: 2023
  text: 2023-Oct.-20
  day: 20
PublicationDecade 2020
PublicationTitle Proceedings (International Conference on Communication Technology. Online)
PublicationTitleAbbrev ICCT
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003189909
Score 1.8511142
Snippet To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication...
SourceID ieee
SourceType Publisher
StartPage 696
SubjectTerms Authentication
Cams
Cross-domain
Delays
Forgery
IoV
Main-secondary
Master-slave multi-chain
Resists
Throughput
Title Cross-domain Identity Authentication in IoV
URI https://ieeexplore.ieee.org/document/10419648
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB7cPenFV8U3PXiT1KZJ2uRcXFbBxcOu7G3JExaxFeke9NebtN31AYK3IUMgmTy-ZDLfBOCqoNJQrRxikgt_QVEYCQ_zKDeYauaYFe1zwcMkH8_o_ZzNe7J6y4Wx1rbBZzYJYvuWb2q9Cq4yv8JpyB_FBzAoeN6RtTYOFT85_c4q-hgunIqbu7KcMkFYiETISLKu_eMflRZGRrswWTegix55TlaNSvTHr9yM_27hHkRfjL34cYNF-7BlqwPY-ZZs8BCuywCIyNQvclnFPUH3PQ4-siB2rrs4qOqnCGaj22k5Rv1XCWiJsWgQxsqbluiUOqOJw8alimhCiMulB3wpaGGY0DylRhcZkRxLZakwQZNzLskRDKu6sscQU38i5Do1zuacKltIp7yxFbVacO1PtycQhX4vXrtsGIt1l0__KD-D7WD-sN9n6TkMm7eVvfBA3qjLdgA_AWyPnAM
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDMDCq4g3GdhQQlyfE3uOqFpoK4YWdav8lCrUBKF0gF-PnaTlISGxWbYs-Xnf-e6-M0I3KQgNStqQCsbdA0XikDuYDxONQVFLDa_cBcNR0pvAw5ROG7J6xYUxxlTBZybyxcqXrwu19KYyd8PB549im2iLAgCt6Vprk4o7nk628iaKC8f8rp9lY8oJ9bEIHRKt-v_4SaUCku4eGq2GUMePvETLUkbq41d2xn-PcR-1vzh7wdMajQ7QhskP0e63dINH6DbzkBjqYiHmedBQdN8DbyXzxdp4F_im4rmNJt37cdYLm88SwjnGvAwxlm5xiYrBakUs1jaWRBFCbCIc5AsOqaZcsRi0SjtEMCykAa59S8KYIMeolRe5OUEBOJ2QqVhbkzCQJhVWpiyRYBRnyum3p6jt5z17rfNhzFZTPvuj_hpt98bDwWzQHz2eox2_FV76d-IL1CrflubSwXopr6rN_ATMvZ9Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%28International+Conference+on+Communication+Technology.+Online%29&rft.atitle=Cross-domain+Identity+Authentication+in+IoV&rft.au=Zhang%2C+Ming&rft.au=Li%2C+Yuhang&rft.au=Guo%2C+Yufan&rft.au=Liao%2C+Dan&rft.date=2023-10-20&rft.pub=IEEE&rft.eissn=2576-7828&rft.spage=696&rft.epage=701&rft_id=info:doi/10.1109%2FICCT59356.2023.10419648&rft.externalDocID=10419648