A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph

Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path d...

Full description

Bibliographic Details
Main Author: Qiang Li
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/15/1/25
_version_ 1827625578331635712
author Qiang Li
author_facet Qiang Li
author_sort Qiang Li
collection DOAJ
description Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system.
first_indexed 2024-03-09T12:38:38Z
format Article
id doaj.art-2ea51a78e7b94be5a034f381f3f16aad
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-03-09T12:38:38Z
publishDate 2023-01-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-2ea51a78e7b94be5a034f381f3f16aad2023-11-30T22:20:40ZengMDPI AGFuture Internet1999-59032023-01-011512510.3390/fi15010025A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based CryptographQiang Li0State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaCellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system.https://www.mdpi.com/1999-5903/15/1/25C-V2XV2Videntity authenticationkey agreementIBC
spellingShingle Qiang Li
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
Future Internet
C-V2X
V2V
identity authentication
key agreement
IBC
title A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
title_full A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
title_fullStr A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
title_full_unstemmed A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
title_short A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
title_sort v2v identity authentication and key agreement scheme based on identity based cryptograph
topic C-V2X
V2V
identity authentication
key agreement
IBC
url https://www.mdpi.com/1999-5903/15/1/25
work_keys_str_mv AT qiangli av2videntityauthenticationandkeyagreementschemebasedonidentitybasedcryptograph
AT qiangli v2videntityauthenticationandkeyagreementschemebasedonidentitybasedcryptograph