A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network

Abstract The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like i...

Full description

Saved in:
Bibliographic Details
Main Authors: Peng Xu, Xiuzhen Wang, Meirong Chen
Format: Article
Language:English
Published: Springer 2025-02-01
Series:International Journal of Computational Intelligence Systems
Subjects:
Online Access:https://doi.org/10.1007/s44196-025-00754-2
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850067805370580992
author Peng Xu
Xiuzhen Wang
Meirong Chen
author_facet Peng Xu
Xiuzhen Wang
Meirong Chen
author_sort Peng Xu
collection DOAJ
description Abstract The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like identity leakage, man in the middle attack, key leakage and etc., are also introduced simultaneously and still challenging to be solved. Researches and practices have shown that authentication and key exchange protocols are effective methods to solve such security issues. However, most existing security protocols for Internet of Vehicles are established on the premise that the registration process is with a secure channel, which is usually not satisfied and deviates from practical applications. Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.
format Article
id doaj-art-c76f1ef2151a4b6b8cab83ed6637ec32
institution DOAJ
issn 1875-6883
language English
publishDate 2025-02-01
publisher Springer
record_format Article
series International Journal of Computational Intelligence Systems
spelling doaj-art-c76f1ef2151a4b6b8cab83ed6637ec322025-08-20T02:48:12ZengSpringerInternational Journal of Computational Intelligence Systems1875-68832025-02-0118111610.1007/s44196-025-00754-2A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure NetworkPeng Xu0Xiuzhen Wang1Meirong Chen2National-Local Joint Engineering Laboratory of System Credibility Automatic VerificationNational-Local Joint Engineering Laboratory of System Credibility Automatic VerificationNational-Local Joint Engineering Laboratory of System Credibility Automatic VerificationAbstract The Internet of Vehicles technology has been widely applied in various communication scenarios, including vehicles to vehicles, vehicles to roadside facilities, vehicles to pedestrians, and vehicles to cloud. Owing to transmitting data through public channels, various security issues like identity leakage, man in the middle attack, key leakage and etc., are also introduced simultaneously and still challenging to be solved. Researches and practices have shown that authentication and key exchange protocols are effective methods to solve such security issues. However, most existing security protocols for Internet of Vehicles are established on the premise that the registration process is with a secure channel, which is usually not satisfied and deviates from practical applications. Accordingly, an authentication and key exchange protocol with an insecure channel has been proposed, in which the operations of symmetric encryption and XOR encryption are adopted for all interactive processes to improve protocol security. The theoretical analysis and formal verification demonstrate that the proposed protocol satisfies security properties including authentication and confidentiality, and reduces the costs of computation and communication compared with the method with public key encryption.https://doi.org/10.1007/s44196-025-00754-2Internet of vehiclesAuthentication and key exchange protocolInsecure channelFormal verificationReal-or-random model
spellingShingle Peng Xu
Xiuzhen Wang
Meirong Chen
A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
International Journal of Computational Intelligence Systems
Internet of vehicles
Authentication and key exchange protocol
Insecure channel
Formal verification
Real-or-random model
title A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
title_full A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
title_fullStr A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
title_full_unstemmed A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
title_short A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
title_sort secure authentication and key exchange protocol for vehicles to infrastructure network
topic Internet of vehicles
Authentication and key exchange protocol
Insecure channel
Formal verification
Real-or-random model
url https://doi.org/10.1007/s44196-025-00754-2
work_keys_str_mv AT pengxu asecureauthenticationandkeyexchangeprotocolforvehiclestoinfrastructurenetwork
AT xiuzhenwang asecureauthenticationandkeyexchangeprotocolforvehiclestoinfrastructurenetwork
AT meirongchen asecureauthenticationandkeyexchangeprotocolforvehiclestoinfrastructurenetwork
AT pengxu secureauthenticationandkeyexchangeprotocolforvehiclestoinfrastructurenetwork
AT xiuzhenwang secureauthenticationandkeyexchangeprotocolforvehiclestoinfrastructurenetwork
AT meirongchen secureauthenticationandkeyexchangeprotocolforvehiclestoinfrastructurenetwork