Abstract

In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in vehicular ad hoc networks. Among the existing identity-based two-party authenticated key agreement protocols without pairings, there are only a few protocols that provide provable security in strong security models such as the extended Canetti–Krawczyk model. This article presents an efficient pairing-free identity-based one-round two-party authenticated key agreement protocol with provable security, which is more suitable for real-time application environments with highly dynamic topology such as vehicular ad hoc networks than the existing identity-based two-party authenticated key agreement protocols. The proposed protocol is proven secure under the passive and active adversaries in the extended Canetti–Krawczyk model based on the Gap Diffie–Hellman assumption. The proposed protocol can capture all essential security attributes including known-session key security, perfect forward secrecy, basic impersonation resistance, key compromise impersonation resistance, unknown key share resistance, no key control, and ephemeral secrets reveal resistance. Compared with the existing identity-based two-party authenticated key agreement protocols, the proposed protocol is superior in terms of computational cost and running time while providing higher security.

Highlights

  • The significant advances in the embedded technology and wireless communication drive the evolution of vehicular ad hoc networks (VANETs)

  • It is a challenge to design a provably secure and efficient pairing-free ID-based one-round 2PAKA protocol that is more suitable for VANETs

  • Assume that Gap Diffie–Hellman (GDH) problem is intractable and H1 and H2 are random oracles, the protocol S proposed in section ‘‘Proposed pairing-free ID-based 2PAKA protocol’’ is said to be secure in the extended CK (eCK) model

Read more

Summary

Introduction

The significant advances in the embedded technology and wireless communication drive the evolution of vehicular ad hoc networks (VANETs). To eliminate the certificate management problem, many research works[15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33] employed ID-based cryptography (IBC) first introduced by Shamir,[34] in which a user’s public key is the user’s identities (e.g. telephone number, e-mail address, etc.) and the user’s private key is extracted based on his or her ID and a key generation center (KGC) master key These ID-based 2PAKA protocols[15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33] have improved the efficiency by removing the use of public key certificates. It is a challenge to design a provably secure and efficient pairing-free ID-based one-round 2PAKA protocol that is more suitable for VANETs

Related works
MasterPrivateKeyReveal
Chooses two cryptographic hash functions
Forging attack
Findings
Discussion
Conclusions and future works

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.