|
|
空地协同场景下具有隐私保护的高效异构认证方案 |
刘雪娇1( ),赵祥1,夏莹杰2,3,*( ),曹天聪1 |
1. 杭州师范大学 信息科学与技术学院,浙江 杭州 311121 2. 杭州电子科技大学 微电子研究院,浙江 杭州 310018 3. 浙江大学 计算机科学与技术学院,浙江 杭州 310027 |
|
Efficient heterogeneous authentication scheme with privacy protection in air-ground collaboration scenario |
Xuejiao LIU1( ),Xiang ZHAO1,Yingjie XIA2,3,*( ),Tiancong CAO1 |
1. School of Information Science and Technology, Hangzhou Normal University, Hangzhou 311121, China 2. Microelectronics Research Institute, Hangzhou Dianzi University, Hangzhou 310018, China 3. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China |
引用本文:
刘雪娇,赵祥,夏莹杰,曹天聪. 空地协同场景下具有隐私保护的高效异构认证方案[J]. 浙江大学学报(工学版), 2024, 58(10): 1981-1991.
Xuejiao LIU,Xiang ZHAO,Yingjie XIA,Tiancong CAO. Efficient heterogeneous authentication scheme with privacy protection in air-ground collaboration scenario. Journal of ZheJiang University (Engineering Science), 2024, 58(10): 1981-1991.
链接本文:
https://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2024.10.001
或
https://www.zjujournals.com/eng/CN/Y2024/V58/I10/1981
|
1 |
范茜莹, 黄传河, 朱钧宇, 等 无人机辅助车联网环境下干扰感知的节点接入机制[J]. 通信学报, 2019, 40 (6): 90- 101 FAN Xiying, HUANG Chuanhe, ZHU Junyu, et al Interference-aware node access scheme in UAV-aided VANET[J]. Journal of Communications, 2019, 40 (6): 90- 101
doi: 10.11959/j.issn.1000-436x.2019081
|
2 |
张海波, 兰凯, 陈舟, 等 车联网中基于环的匿名高效批量认证与组密钥协商协议[J]. 通信学报, 2023, 44 (6): 103- 116 ZHANG Haibo, LAN Kai, CHEN Zhou, et al Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles[J]. Journal of Communications, 2023, 44 (6): 103- 116
doi: 10.11959/j.issn.1000-436x.2023055
|
3 |
况博裕, 李雨泽, 顾芳铭, 等 车联网安全研究综述: 威胁、对策与未来展望[J]. 计算机研究与发展, 2023, 60 (10): 2304- 2321 KUANG Boyu, LI Yuze, GU Fangming, et al Review of Internet of vehicle security research: threats, countermeasures, and future prospects[J]. Journal of Computer Research and Development, 2023, 60 (10): 2304- 2321
doi: 10.7544/issn1000-1239.202330464
|
4 |
FENG C, LIU B, GUO Z, et al Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones[J]. IEEE Internet of Things Journal, 2022, 9 (8): 6224- 6238
doi: 10.1109/JIOT.2021.3113321
|
5 |
ZHOU Y, LONG X, CHEN L, et al Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs[J]. Journal of Information Security and Applications, 2019, 47: 295- 301
doi: 10.1016/j.jisa.2019.05.018
|
6 |
WANG Z, ZHOU Y, QIAO Z, et al An anonymous and revocable authentication protocol for vehicle-to-vehicle communications[J]. IEEE Internet of Things Journal, 2023, 10 (6): 5114- 5127
doi: 10.1109/JIOT.2022.3222469
|
7 |
ABEYWICKRAMA H V, JAYAWICKRAMA B A, HE Y, et al Comprehensive energy consumption model for unmanned aerial vehicles, based on empirical studies of battery performance[J]. IEEE Access, 2018, 6: 58383- 58394
doi: 10.1109/ACCESS.2018.2875040
|
8 |
HEMMATI A, ZAREI M, SOURI A UAV-based Internet of vehicles: a systematic literature review[J]. Intelligent Systems with Applications, 2023, 18: 200226
doi: 10.1016/j.iswa.2023.200226
|
9 |
EL-ZAWAWY M A, BRIGHENTE A, CONTI M Authenticating drone-assisted Internet of vehicles using elliptic curve cryptography and blockchain[J]. IEEE Transactions on Network and Service Management, 2023, 20 (2): 1775- 1789
doi: 10.1109/TNSM.2022.3217320
|
10 |
ZHANG J, CUI J, ZHONG H, et al Intelligent drone-assisted anonymous authentication and key agreement for 5G/B5G vehicular ad-hoc networks[J]. IEEE Transactions on Network Science and Engineering, 2021, 8 (4): 2982- 2994
doi: 10.1109/TNSE.2020.3029784
|
11 |
TAN H, ZHENG W, VIJAYAKUMAR P Secure and efficient authenticated key management scheme for UAV-assisted infrastructure-less IoVs[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24 (6): 6389- 6400
doi: 10.1109/TITS.2023.3252082
|
12 |
SON S, KWON D, LEE S, et al Design of secure and lightweight authentication scheme for UAV-enabled intelligent transportation systems using blockchain and PUF[J]. IEEE Access, 2023, 11: 60240- 60253
doi: 10.1109/ACCESS.2023.3286016
|
13 |
KHAN M A, ULLAH I, ALKHALIFAH A, et al A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems[J]. IEEE Transactions on Industrial Informatics, 2022, 18 (5): 3416- 3425
doi: 10.1109/TII.2021.3101651
|
14 |
XIONG H, ZHAO Y, HOU Y, et al Heterogeneous signcryption with equality test for IIoT environment[J]. IEEE Internet of Things Journal, 2021, 8 (21): 16142- 16152
doi: 10.1109/JIOT.2020.3008955
|
15 |
ALI I, CHEN Y, ULLAH N, et al Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2021, 70 (6): 5974- 5989
doi: 10.1109/TVT.2021.3078806
|
16 |
XIONG H, WU Y, JIN C, et al Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT[J]. IEEE Internet of Things Journal, 2020, 7 (12): 11713- 11724
doi: 10.1109/JIOT.2020.2999510
|
17 |
PAN X, JIN Y, LI F An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles[J]. Journal of Systems Architecture, 2023, 136: 102821
doi: 10.1016/j.sysarc.2022.102821
|
18 |
DIFFIE W, HELLMAN M New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22 (6): 644- 654
doi: 10.1109/TIT.1976.1055638
|
19 |
LI F, WANG J, ZHOU Y, et al A heterogeneous user authentication and key establishment for mobile client-server environment[J]. Wireless Networks, 2020, 26: 913- 924
doi: 10.1007/s11276-018-1839-4
|
20 |
DODIS Y, OSTROVSKY R, REYZIN L, et al Fuzzy extractors: how to generate strong keys from biometrics and other noisy data[J]. SIAM Journal on Computing, 2008, 38 (1): 97- 139
doi: 10.1137/060651380
|
21 |
BURROWS M, ABADI M, NEEDHAM R A logic of authentication[J]. ACM Transactions on Computer System, 1990, 8 (1): 18- 36
doi: 10.1145/77648.77649
|
22 |
SCHNORR C P. Efficient identification and signatures for smart cards [C]// Advances in Cryptology-CRYPTO’89 Proceedings . New York: Springer, 1990: 239–252.
|
23 |
SON S, LEE J, PARK Y, et al Design of blockchain-based lightweight V2I handover authentication protocol for VANET[J]. IEEE Transactions on Network Science and Engineering, 2022, 9 (3): 1346- 1358
doi: 10.1109/TNSE.2022.3142287
|
24 |
WANG C, SHEN J, LAI J F, et al B-TSCA: blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9 (3): 1386- 1396
doi: 10.1109/TETC.2020.2978866
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|