A Model of Dual Fabry-Perot Etalon-Based External-Cavity Tunable Laser Us...
Internal motion within pulsating pure-quartic soliton molecules in a fibe...
Enhanced light emission of germanium light-emitting-diode on 150 mm germa...
The Fabrication of GaN Nanostructures Using Cost-Effective Methods for Ap...
Negative-to-Positive Tunnel Magnetoresistance in van der Waals Fe3GeTe2/C...
Quantum Light Source Based on Semiconductor Quantum Dots: A Review
A High-Reliability RF MEMS Metal-Contact Switch Based on Al-Sc Alloy
Development of a Mode-Locked Fiber Laser Utilizing a Niobium Diselenide S...
Development of Multiple Fano-Resonance-Based All-Dielectric Metastructure...
Traffic Vibration Signal Analysis of DAS Fiber Optic Cables with Differen...
官方微信
友情链接

Practical and secure multifactor authentication protocol for autonomous vehicles in 5G

2022-04-22

 

Author(s): Miao, JF (Miao, Junfeng); Wang, ZS (Wang, Zhaoshun); Ning, X (Ning, Xin); Xiao, N (Xiao, Nan); Cai, WW (Cai, Weiwei); Liu, RM (Liu, Ruimin)

Source: SOFTWARE-PRACTICE & EXPERIENCE DOI: 10.1002/spe.3087 Early Access Date: APR 2022

Abstract: Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high-precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra-large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real-time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non-interactive zero-knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.

Accession Number: WOS:000781477400001

Author Identifiers:

Author        Web of Science ResearcherID        ORCID Number

Cai, Weiwei         AAH-5456-2020         0000-0001-6795-6152

ISSN: 0038-0644

eISSN: 1097-024X

Full Text: https://onlinelibrary.wiley.com/doi/10.1002/spe.3087



关于我们
下载视频观看
联系方式
通信地址

北京市海淀区清华东路甲35号(林大北路中段) 北京912信箱 (100083)

电话

010-82304210/010-82305052(传真)

E-mail

semi@semi.ac.cn

交通地图
版权所有 中国科学院半导体研究所

备案号:京ICP备05085259-1号 京公网安备110402500052 中国科学院半导体所声明