• Overview of Chinese core journals
  • Chinese Science Citation Database(CSCD)
  • Chinese Scientific and Technological Paper and Citation Database (CSTPCD)
  • China National Knowledge Infrastructure(CNKI)
  • Chinese Science Abstracts Database(CSAD)
  • JST China
  • SCOPUS
GONG Cheng, NIU Xianhua, XIONG Ling, et al. Conditional Privacy-Preserving Authentication Scheme Based on Key Agreement for Vehicle Ad Hoc Networks[J]. Journal of Xihua University(Natural Science Edition), 2022, 41(5): 73 − 83. . DOI: 10.12198/j.issn.1673-159X.4359
Citation: GONG Cheng, NIU Xianhua, XIONG Ling, et al. Conditional Privacy-Preserving Authentication Scheme Based on Key Agreement for Vehicle Ad Hoc Networks[J]. Journal of Xihua University(Natural Science Edition), 2022, 41(5): 73 − 83. . DOI: 10.12198/j.issn.1673-159X.4359

Conditional Privacy-Preserving Authentication Scheme Based on Key Agreement for Vehicle Ad Hoc Networks

  • Vehicular ad hoc network is an important part of intelligent transportation, and the security and privacy of vehicular ad hoc network are two challenging issues which concerned by academia and industry. Especially in the decentralized trend of computing resources and storage resources moving to the edge, distributed authentication clusters begin to replace a single authentication center, but the stability of authentication service clusters is seldom considered in the existing authentication schemes. This paper proposes a conditional privacy protection authentication scheme based on key agreement for vehicular ad hoc networks. This scheme uses the tree to realize the key generation and update in the key agreement protocol, and ensures the information synchronization between each service node in the authentication service cluster. At the same time, anonymous authentication technology and distributed authentication cluster are combined to ensure the privacy and security of the authentication process among vehicles, authentication service clusters and trusted authorities. This scheme not only protects the security and privacy in vehicular ad hoc networks, but also maintains the robustness of authentication clusters.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return