Loading…
Practical and secure multifactor authentication protocol for autonomous vehicles in 5G
Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high...
Saved in:
Published in: | Software, practice & experience practice & experience, 2024-10, Vol.54 (10), p.1852-1869 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3 |
---|---|
cites | cdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3 |
container_end_page | 1869 |
container_issue | 10 |
container_start_page | 1852 |
container_title | Software, practice & experience |
container_volume | 54 |
creator | Miao, Junfeng Wang, Zhaoshun Ning, Xin Xiao, Nan Cai, Weiwei Liu, Ruimin |
description | Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance. |
doi_str_mv | 10.1002/spe.3087 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3099901811</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3099901811</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</originalsourceid><addsrcrecordid>eNp10E1LAzEQBuAgCtYq-BMCXrxsnXzsbnKUUqtQsOAH3kI2ydKU7aYmu0r_vVvXq6c5vA8zw4vQNYEZAaB3ae9mDER5giYEZJkB5R-naALARAYF5-foIqUtACE5LSbofR216bzRDdatxcmZPjq865vO10MQItZ9t3HtkXQ-tHgfQxdMaHA9ZqENu9An_OU23jQuYd_ifHmJzmrdJHf1N6fo7WHxOn_MVs_Lp_n9KjOUsjLTWtAirwzhsrI5ZbZwjGnjLAVRWFnlVAvGC8YFL7WTwkrO60pXkoOQQlg2RTfj3uGtz96lTm1DH9vhpGIgpQQiCBnU7ahMDClFV6t99DsdD4qAOramhtbUsbWBZiP99o07_OvUy3rx638AmhVuew</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3099901811</pqid></control><display><type>article</type><title>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</title><source>Wiley-Blackwell Read & Publish Collection</source><creator>Miao, Junfeng ; Wang, Zhaoshun ; Ning, Xin ; Xiao, Nan ; Cai, Weiwei ; Liu, Ruimin</creator><creatorcontrib>Miao, Junfeng ; Wang, Zhaoshun ; Ning, Xin ; Xiao, Nan ; Cai, Weiwei ; Liu, Ruimin</creatorcontrib><description>Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.</description><identifier>ISSN: 0038-0644</identifier><identifier>EISSN: 1097-024X</identifier><identifier>DOI: 10.1002/spe.3087</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley & Sons, Inc</publisher><subject>5G mobile communication ; Artificial intelligence ; Authentication ; Authentication protocols ; Autonomous vehicles ; Industrial development ; Interactive control ; Internet of Vehicles ; Network latency ; Protocol ; Security ; Traffic congestion ; Transportation industry ; Transportation networks ; Wireless networks</subject><ispartof>Software, practice & experience, 2024-10, Vol.54 (10), p.1852-1869</ispartof><rights>2022 John Wiley & Sons Ltd.</rights><rights>2024 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</citedby><cites>FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</cites><orcidid>0000-0001-6795-6152 ; 0000-0002-2736-9970 ; 0000-0001-7897-1673</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Miao, Junfeng</creatorcontrib><creatorcontrib>Wang, Zhaoshun</creatorcontrib><creatorcontrib>Ning, Xin</creatorcontrib><creatorcontrib>Xiao, Nan</creatorcontrib><creatorcontrib>Cai, Weiwei</creatorcontrib><creatorcontrib>Liu, Ruimin</creatorcontrib><title>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</title><title>Software, practice & experience</title><description>Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.</description><subject>5G mobile communication</subject><subject>Artificial intelligence</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Autonomous vehicles</subject><subject>Industrial development</subject><subject>Interactive control</subject><subject>Internet of Vehicles</subject><subject>Network latency</subject><subject>Protocol</subject><subject>Security</subject><subject>Traffic congestion</subject><subject>Transportation industry</subject><subject>Transportation networks</subject><subject>Wireless networks</subject><issn>0038-0644</issn><issn>1097-024X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp10E1LAzEQBuAgCtYq-BMCXrxsnXzsbnKUUqtQsOAH3kI2ydKU7aYmu0r_vVvXq6c5vA8zw4vQNYEZAaB3ae9mDER5giYEZJkB5R-naALARAYF5-foIqUtACE5LSbofR216bzRDdatxcmZPjq865vO10MQItZ9t3HtkXQ-tHgfQxdMaHA9ZqENu9An_OU23jQuYd_ifHmJzmrdJHf1N6fo7WHxOn_MVs_Lp_n9KjOUsjLTWtAirwzhsrI5ZbZwjGnjLAVRWFnlVAvGC8YFL7WTwkrO60pXkoOQQlg2RTfj3uGtz96lTm1DH9vhpGIgpQQiCBnU7ahMDClFV6t99DsdD4qAOramhtbUsbWBZiP99o07_OvUy3rx638AmhVuew</recordid><startdate>202410</startdate><enddate>202410</enddate><creator>Miao, Junfeng</creator><creator>Wang, Zhaoshun</creator><creator>Ning, Xin</creator><creator>Xiao, Nan</creator><creator>Cai, Weiwei</creator><creator>Liu, Ruimin</creator><general>John Wiley & Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-6795-6152</orcidid><orcidid>https://orcid.org/0000-0002-2736-9970</orcidid><orcidid>https://orcid.org/0000-0001-7897-1673</orcidid></search><sort><creationdate>202410</creationdate><title>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</title><author>Miao, Junfeng ; Wang, Zhaoshun ; Ning, Xin ; Xiao, Nan ; Cai, Weiwei ; Liu, Ruimin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>5G mobile communication</topic><topic>Artificial intelligence</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Autonomous vehicles</topic><topic>Industrial development</topic><topic>Interactive control</topic><topic>Internet of Vehicles</topic><topic>Network latency</topic><topic>Protocol</topic><topic>Security</topic><topic>Traffic congestion</topic><topic>Transportation industry</topic><topic>Transportation networks</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Miao, Junfeng</creatorcontrib><creatorcontrib>Wang, Zhaoshun</creatorcontrib><creatorcontrib>Ning, Xin</creatorcontrib><creatorcontrib>Xiao, Nan</creatorcontrib><creatorcontrib>Cai, Weiwei</creatorcontrib><creatorcontrib>Liu, Ruimin</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Software, practice & experience</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Miao, Junfeng</au><au>Wang, Zhaoshun</au><au>Ning, Xin</au><au>Xiao, Nan</au><au>Cai, Weiwei</au><au>Liu, Ruimin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</atitle><jtitle>Software, practice & experience</jtitle><date>2024-10</date><risdate>2024</risdate><volume>54</volume><issue>10</issue><spage>1852</spage><epage>1869</epage><pages>1852-1869</pages><issn>0038-0644</issn><eissn>1097-024X</eissn><abstract>Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.</abstract><cop>Hoboken, USA</cop><pub>John Wiley & Sons, Inc</pub><doi>10.1002/spe.3087</doi><tpages>18</tpages><orcidid>https://orcid.org/0000-0001-6795-6152</orcidid><orcidid>https://orcid.org/0000-0002-2736-9970</orcidid><orcidid>https://orcid.org/0000-0001-7897-1673</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0038-0644 |
ispartof | Software, practice & experience, 2024-10, Vol.54 (10), p.1852-1869 |
issn | 0038-0644 1097-024X |
language | eng |
recordid | cdi_proquest_journals_3099901811 |
source | Wiley-Blackwell Read & Publish Collection |
subjects | 5G mobile communication Artificial intelligence Authentication Authentication protocols Autonomous vehicles Industrial development Interactive control Internet of Vehicles Network latency Protocol Security Traffic congestion Transportation industry Transportation networks Wireless networks |
title | Practical and secure multifactor authentication protocol for autonomous vehicles in 5G |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T16%3A59%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Practical%20and%20secure%20multifactor%20authentication%20protocol%20for%20autonomous%20vehicles%20in%205G&rft.jtitle=Software,%20practice%20&%20experience&rft.au=Miao,%20Junfeng&rft.date=2024-10&rft.volume=54&rft.issue=10&rft.spage=1852&rft.epage=1869&rft.pages=1852-1869&rft.issn=0038-0644&rft.eissn=1097-024X&rft_id=info:doi/10.1002/spe.3087&rft_dat=%3Cproquest_cross%3E3099901811%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3099901811&rft_id=info:pmid/&rfr_iscdi=true |