A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path d...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-01-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/15/1/25 |
_version_ | 1827625578331635712 |
---|---|
author | Qiang Li |
author_facet | Qiang Li |
author_sort | Qiang Li |
collection | DOAJ |
description | Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system. |
first_indexed | 2024-03-09T12:38:38Z |
format | Article |
id | doaj.art-2ea51a78e7b94be5a034f381f3f16aad |
institution | Directory Open Access Journal |
issn | 1999-5903 |
language | English |
last_indexed | 2024-03-09T12:38:38Z |
publishDate | 2023-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Future Internet |
spelling | doaj.art-2ea51a78e7b94be5a034f381f3f16aad2023-11-30T22:20:40ZengMDPI AGFuture Internet1999-59032023-01-011512510.3390/fi15010025A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based CryptographQiang Li0State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaCellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system.https://www.mdpi.com/1999-5903/15/1/25C-V2XV2Videntity authenticationkey agreementIBC |
spellingShingle | Qiang Li A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph Future Internet C-V2X V2V identity authentication key agreement IBC |
title | A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph |
title_full | A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph |
title_fullStr | A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph |
title_full_unstemmed | A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph |
title_short | A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph |
title_sort | v2v identity authentication and key agreement scheme based on identity based cryptograph |
topic | C-V2X V2V identity authentication key agreement IBC |
url | https://www.mdpi.com/1999-5903/15/1/25 |
work_keys_str_mv | AT qiangli av2videntityauthenticationandkeyagreementschemebasedonidentitybasedcryptograph AT qiangli v2videntityauthenticationandkeyagreementschemebasedonidentitybasedcryptograph |