Abstract

When mobile network enters 5G era, 5G networks have a series of unparalleled advantages. Therefore, the application of 5G network technology in the Internet of Vehicles (IoV) can promote more intelligently vehicular networks and more efficiently vehicular information transmission. However, with the combination of 5G networks and vehicular networks technology, it requires safe and reliable authentication and low computation overhead. Therefore, it is a challenge to achieve such low latency, security, and high mobility. In this paper, we propose a secure and efficient lightweight authentication protocol for vehicle group. The scheme is based on the extended chaotic map to achieve authentication, and the Chinese remainder theorem distributes group keys. Scyther is used to verify the security of the scheme, and the verification results show that the security of the scheme can be guaranteed. In addition, through security analysis, the scheme can not only effectively resist various attacks but also guarantee security requirements such as anonymity and unlinkability. Finally, by performance analysis and comparison, our scheme has less computation and communication overhead.

Highlights

  • It is an inevitable trend that all things are connected

  • This paper proposes a vehicle group authentication protocol based on extended chaotic mapping in 5G networks

  • In order to protect the security of Roadside unit (RSU), the shared key will be updated

Read more

Summary

Introduction

It is an inevitable trend that all things are connected. With the development of the IoV, vehicular networks are becoming more and more important in modern life [1]. It can obtain various state information of the road timely and accurately, interact with each other in real time, and complete the driving task better It is the key technology of the future of the Internet of vehicles application, especially the autonomous driving and overtake, which require very low network latency [10]. In order to protect the security of RSU, the shared key will be updated This scheme is a lightweight authentication scheme based on extended chaotic mapping and distributes group key through Chinese remainder theorem (2) This paper verifies the security of the scheme by using the Scyther tool (3) By comparing the existing schemes, this scheme can effectively reduce the computation and communication overhead.

Related Work
Preliminaries
Proposed Scheme
Security Evaluation
Performance Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call