Cross-domain Identity Authentication in IoV
To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication algorithm based on the master-slave multi-chain, called CAMS. It utilizes the master-slave multi-chain to achieve cross-domain storage and sharing...
        Saved in:
      
    
          | Published in | Proceedings (International Conference on Communication Technology. Online) pp. 696 - 701 | 
|---|---|
| Main Authors | , , , , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        20.10.2023
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2576-7828 | 
| DOI | 10.1109/ICCT59356.2023.10419648 | 
Cover
| Abstract | To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication algorithm based on the master-slave multi-chain, called CAMS. It utilizes the master-slave multi-chain to achieve cross-domain storage and sharing of vehicle data, thereby improving cross-domain authentication efficiency. Moreover, the CAMS algorithm introduces pseudonym generation and verification parameters in the cross-domain authentication process. It further verifies the vehicle identity before verifying the message, ensuring the anonymity of authentication identity and resisting the identity forgery attack. Finally, the simulation results show that the superior performance of the CAMS in terms of computational overhead and authentication efficiency. | 
    
|---|---|
| AbstractList | To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication algorithm based on the master-slave multi-chain, called CAMS. It utilizes the master-slave multi-chain to achieve cross-domain storage and sharing of vehicle data, thereby improving cross-domain authentication efficiency. Moreover, the CAMS algorithm introduces pseudonym generation and verification parameters in the cross-domain authentication process. It further verifies the vehicle identity before verifying the message, ensuring the anonymity of authentication identity and resisting the identity forgery attack. Finally, the simulation results show that the superior performance of the CAMS in terms of computational overhead and authentication efficiency. | 
    
| Author | Li, Hui Li, Yujuan Guo, Yufan Li, Yuhang Liao, Dan Zhang, Ming  | 
    
| Author_xml | – sequence: 1 givenname: Ming surname: Zhang fullname: Zhang, Ming email: 8202362@gmail.com organization: School of Information and Communication Engineering, University of Electronic Science and Technology of China – sequence: 2 givenname: Yuhang surname: Li fullname: Li, Yuhang email: liyuhang@ruixinan.com organization: Chengdu Ruixinan Information Security Technology Co.,Ltd,Evaluation Division,Chengdu,China – sequence: 3 givenname: Yufan surname: Guo fullname: Guo, Yufan email: 963312439@qq.com organization: School of Information and Communication Engineering, University of Electronic Science and Technology of China – sequence: 4 givenname: Dan surname: Liao fullname: Liao, Dan email: dliao.uestc@gmail.com organization: School of Information and Communication Engineering, University of Electronic Science and Technology of China – sequence: 5 givenname: Hui surname: Li fullname: Li, Hui email: whwbylihui@gmail.com organization: School of Aeronautics and Astronautics, University of Electronic Science and Technology of China,Chengdu,China – sequence: 6 givenname: Yujuan surname: Li fullname: Li, Yujuan email: 451339904@qq.com organization: Sichuan Electronic Information Industry Technology Research Institute Co., Ltd,Chengdu,China  | 
    
| BookMark | eNo1j8FKxDAURaMoOI79A8HupfW9vKTNWw7F0cKAm9HtkCYpRpxG2rqYv5eirs6FAxfOtbgY0hCEuEMoEYEf2qbZayZdlRIklQgKuVLmTGRcsyENJDVrPhcrqeuqqI00VyKbpg8AIDTMwCtx34xpmgqfjjYOeevDMMf5lG--5_dlOjvHNOSLSm834rK3n1PI_rgWr9vHffNc7F6e2mazKyIizwVip5wmB6r3jnr0PXTkiKivLKC2rGqv2RlQ3tWSrEHbBcV-MZUxltbi9vc3hhAOX2M82vF0-O-jH_a5RYY | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/ICCT59356.2023.10419648 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISBN | 9798350325959 | 
    
| EISSN | 2576-7828 | 
    
| EndPage | 701 | 
    
| ExternalDocumentID | 10419648 | 
    
| Genre | orig-research | 
    
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61971105 funderid: 10.13039/501100001809  | 
    
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL  | 
    
| ID | FETCH-LOGICAL-i119t-11b4c53c04fdc3f1df0b3c333f6a015a947d59c804dc723a81abe49d5a94688a3 | 
    
| IEDL.DBID | RIE | 
    
| IngestDate | Wed Oct 01 07:05:09 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i119t-11b4c53c04fdc3f1df0b3c333f6a015a947d59c804dc723a81abe49d5a94688a3 | 
    
| PageCount | 6 | 
    
| ParticipantIDs | ieee_primary_10419648 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2023-Oct.-20 | 
    
| PublicationDateYYYYMMDD | 2023-10-20 | 
    
| PublicationDate_xml | – month: 10 year: 2023 text: 2023-Oct.-20 day: 20  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | Proceedings (International Conference on Communication Technology. Online) | 
    
| PublicationTitleAbbrev | ICCT | 
    
| PublicationYear | 2023 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssj0003189909 | 
    
| Score | 1.8511142 | 
    
| Snippet | To address the problems of identity forgery attack and low authentication efficiency, this paper proposes a cross-domain vehicle identity authentication... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 696 | 
    
| SubjectTerms | Authentication Cams Cross-domain Delays Forgery IoV Main-secondary Master-slave multi-chain Resists Throughput  | 
    
| Title | Cross-domain Identity Authentication in IoV | 
    
| URI | https://ieeexplore.ieee.org/document/10419648 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB7cPenFV8U3PXiT1KZJ2uRcXFbBxcOu7G3JExaxFeke9NebtN31AYK3IUMgmTy-ZDLfBOCqoNJQrRxikgt_QVEYCQ_zKDeYauaYFe1zwcMkH8_o_ZzNe7J6y4Wx1rbBZzYJYvuWb2q9Cq4yv8JpyB_FBzAoeN6RtTYOFT85_c4q-hgunIqbu7KcMkFYiETISLKu_eMflRZGRrswWTegix55TlaNSvTHr9yM_27hHkRfjL34cYNF-7BlqwPY-ZZs8BCuywCIyNQvclnFPUH3PQ4-siB2rrs4qOqnCGaj22k5Rv1XCWiJsWgQxsqbluiUOqOJw8alimhCiMulB3wpaGGY0DylRhcZkRxLZakwQZNzLskRDKu6sscQU38i5Do1zuacKltIp7yxFbVacO1PtycQhX4vXrtsGIt1l0__KD-D7WD-sN9n6TkMm7eVvfBA3qjLdgA_AWyPnAM | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDMDCq4g3GdhQQlyfE3uOqFpoK4YWdav8lCrUBKF0gF-PnaTlISGxWbYs-Xnf-e6-M0I3KQgNStqQCsbdA0XikDuYDxONQVFLDa_cBcNR0pvAw5ROG7J6xYUxxlTBZybyxcqXrwu19KYyd8PB549im2iLAgCt6Vprk4o7nk628iaKC8f8rp9lY8oJ9bEIHRKt-v_4SaUCku4eGq2GUMePvETLUkbq41d2xn-PcR-1vzh7wdMajQ7QhskP0e63dINH6DbzkBjqYiHmedBQdN8DbyXzxdp4F_im4rmNJt37cdYLm88SwjnGvAwxlm5xiYrBakUs1jaWRBFCbCIc5AsOqaZcsRi0SjtEMCykAa59S8KYIMeolRe5OUEBOJ2QqVhbkzCQJhVWpiyRYBRnyum3p6jt5z17rfNhzFZTPvuj_hpt98bDwWzQHz2eox2_FV76d-IL1CrflubSwXopr6rN_ATMvZ9Q | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%28International+Conference+on+Communication+Technology.+Online%29&rft.atitle=Cross-domain+Identity+Authentication+in+IoV&rft.au=Zhang%2C+Ming&rft.au=Li%2C+Yuhang&rft.au=Guo%2C+Yufan&rft.au=Liao%2C+Dan&rft.date=2023-10-20&rft.pub=IEEE&rft.eissn=2576-7828&rft.spage=696&rft.epage=701&rft_id=info:doi/10.1109%2FICCT59356.2023.10419648&rft.externalDocID=10419648 |