A Batch Authentication Protocol Based on Small Exponent Test for Internet of Vehicles

Intelligent Transportation System (ITS) is a road transportation system that uses advanced technologies such as the Internet of Things (IoT), big data, and artificial intelligence (AI) to realize dynamic real-time information interaction between people, vehicles and roads. As an indispensable part o...

Full description

Saved in:
Bibliographic Details
Published in2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta) pp. 580 - 587
Main Authors Zhang, Ruirui, Xu, Zisang, Xu, Jianbo
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2022
Subjects
Online AccessGet full text
DOI10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00098

Cover

More Information
Summary:Intelligent Transportation System (ITS) is a road transportation system that uses advanced technologies such as the Internet of Things (IoT), big data, and artificial intelligence (AI) to realize dynamic real-time information interaction between people, vehicles and roads. As an indispensable part of the ITS, the Internet of Vehicles (IoV) has received extensive attention from many researchers. Since vehicles entering the range of RSU communication need to be authenticated. Therefore, in a high vehicle traffic flow environment, it is easily to form a computation or communication bottleneck at the RSU. To solve the above problems, some researchers have proposed many batch authentication protocols. However, on the one hand, Some proposed batch authentication protocols use computationally expensive bilinear pairing operations. On the other hand, some proposed protocols do not consider the existence of semi-trusted vehicle nodes. Therefore, this paper proposes a batch authentication protocol based on the small exponent test for IoV. In the protocol, the RSU will not send any authentication secret parameters to the proxy vehicle, thus eliminating the security risk of semi-trusted nodes leaking secret parameters. Meanwhile, the proposed protocol is based on the small exponent test method, which reduces the computation cost while ensuring security. Finally, the proposed protocol is proved to be secure by mathematical derivation, and the performance analysis results also show that the proposed protocol has lower communication cost.
DOI:10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00098