Loading…

Practical and secure multifactor authentication protocol for autonomous vehicles in 5G

Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high...

Full description

Saved in:
Bibliographic Details
Published in:Software, practice & experience practice & experience, 2024-10, Vol.54 (10), p.1852-1869
Main Authors: Miao, Junfeng, Wang, Zhaoshun, Ning, Xin, Xiao, Nan, Cai, Weiwei, Liu, Ruimin
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3
cites cdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3
container_end_page 1869
container_issue 10
container_start_page 1852
container_title Software, practice & experience
container_volume 54
creator Miao, Junfeng
Wang, Zhaoshun
Ning, Xin
Xiao, Nan
Cai, Weiwei
Liu, Ruimin
description Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.
doi_str_mv 10.1002/spe.3087
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3099901811</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3099901811</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</originalsourceid><addsrcrecordid>eNp10E1LAzEQBuAgCtYq-BMCXrxsnXzsbnKUUqtQsOAH3kI2ydKU7aYmu0r_vVvXq6c5vA8zw4vQNYEZAaB3ae9mDER5giYEZJkB5R-naALARAYF5-foIqUtACE5LSbofR216bzRDdatxcmZPjq865vO10MQItZ9t3HtkXQ-tHgfQxdMaHA9ZqENu9An_OU23jQuYd_ifHmJzmrdJHf1N6fo7WHxOn_MVs_Lp_n9KjOUsjLTWtAirwzhsrI5ZbZwjGnjLAVRWFnlVAvGC8YFL7WTwkrO60pXkoOQQlg2RTfj3uGtz96lTm1DH9vhpGIgpQQiCBnU7ahMDClFV6t99DsdD4qAOramhtbUsbWBZiP99o07_OvUy3rx638AmhVuew</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3099901811</pqid></control><display><type>article</type><title>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</title><source>Wiley-Blackwell Read &amp; Publish Collection</source><creator>Miao, Junfeng ; Wang, Zhaoshun ; Ning, Xin ; Xiao, Nan ; Cai, Weiwei ; Liu, Ruimin</creator><creatorcontrib>Miao, Junfeng ; Wang, Zhaoshun ; Ning, Xin ; Xiao, Nan ; Cai, Weiwei ; Liu, Ruimin</creatorcontrib><description>Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.</description><identifier>ISSN: 0038-0644</identifier><identifier>EISSN: 1097-024X</identifier><identifier>DOI: 10.1002/spe.3087</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley &amp; Sons, Inc</publisher><subject>5G mobile communication ; Artificial intelligence ; Authentication ; Authentication protocols ; Autonomous vehicles ; Industrial development ; Interactive control ; Internet of Vehicles ; Network latency ; Protocol ; Security ; Traffic congestion ; Transportation industry ; Transportation networks ; Wireless networks</subject><ispartof>Software, practice &amp; experience, 2024-10, Vol.54 (10), p.1852-1869</ispartof><rights>2022 John Wiley &amp; Sons Ltd.</rights><rights>2024 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</citedby><cites>FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</cites><orcidid>0000-0001-6795-6152 ; 0000-0002-2736-9970 ; 0000-0001-7897-1673</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Miao, Junfeng</creatorcontrib><creatorcontrib>Wang, Zhaoshun</creatorcontrib><creatorcontrib>Ning, Xin</creatorcontrib><creatorcontrib>Xiao, Nan</creatorcontrib><creatorcontrib>Cai, Weiwei</creatorcontrib><creatorcontrib>Liu, Ruimin</creatorcontrib><title>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</title><title>Software, practice &amp; experience</title><description>Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.</description><subject>5G mobile communication</subject><subject>Artificial intelligence</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Autonomous vehicles</subject><subject>Industrial development</subject><subject>Interactive control</subject><subject>Internet of Vehicles</subject><subject>Network latency</subject><subject>Protocol</subject><subject>Security</subject><subject>Traffic congestion</subject><subject>Transportation industry</subject><subject>Transportation networks</subject><subject>Wireless networks</subject><issn>0038-0644</issn><issn>1097-024X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp10E1LAzEQBuAgCtYq-BMCXrxsnXzsbnKUUqtQsOAH3kI2ydKU7aYmu0r_vVvXq6c5vA8zw4vQNYEZAaB3ae9mDER5giYEZJkB5R-naALARAYF5-foIqUtACE5LSbofR216bzRDdatxcmZPjq865vO10MQItZ9t3HtkXQ-tHgfQxdMaHA9ZqENu9An_OU23jQuYd_ifHmJzmrdJHf1N6fo7WHxOn_MVs_Lp_n9KjOUsjLTWtAirwzhsrI5ZbZwjGnjLAVRWFnlVAvGC8YFL7WTwkrO60pXkoOQQlg2RTfj3uGtz96lTm1DH9vhpGIgpQQiCBnU7ahMDClFV6t99DsdD4qAOramhtbUsbWBZiP99o07_OvUy3rx638AmhVuew</recordid><startdate>202410</startdate><enddate>202410</enddate><creator>Miao, Junfeng</creator><creator>Wang, Zhaoshun</creator><creator>Ning, Xin</creator><creator>Xiao, Nan</creator><creator>Cai, Weiwei</creator><creator>Liu, Ruimin</creator><general>John Wiley &amp; Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-6795-6152</orcidid><orcidid>https://orcid.org/0000-0002-2736-9970</orcidid><orcidid>https://orcid.org/0000-0001-7897-1673</orcidid></search><sort><creationdate>202410</creationdate><title>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</title><author>Miao, Junfeng ; Wang, Zhaoshun ; Ning, Xin ; Xiao, Nan ; Cai, Weiwei ; Liu, Ruimin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>5G mobile communication</topic><topic>Artificial intelligence</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Autonomous vehicles</topic><topic>Industrial development</topic><topic>Interactive control</topic><topic>Internet of Vehicles</topic><topic>Network latency</topic><topic>Protocol</topic><topic>Security</topic><topic>Traffic congestion</topic><topic>Transportation industry</topic><topic>Transportation networks</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Miao, Junfeng</creatorcontrib><creatorcontrib>Wang, Zhaoshun</creatorcontrib><creatorcontrib>Ning, Xin</creatorcontrib><creatorcontrib>Xiao, Nan</creatorcontrib><creatorcontrib>Cai, Weiwei</creatorcontrib><creatorcontrib>Liu, Ruimin</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Software, practice &amp; experience</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Miao, Junfeng</au><au>Wang, Zhaoshun</au><au>Ning, Xin</au><au>Xiao, Nan</au><au>Cai, Weiwei</au><au>Liu, Ruimin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Practical and secure multifactor authentication protocol for autonomous vehicles in 5G</atitle><jtitle>Software, practice &amp; experience</jtitle><date>2024-10</date><risdate>2024</risdate><volume>54</volume><issue>10</issue><spage>1852</spage><epage>1869</epage><pages>1852-1869</pages><issn>0038-0644</issn><eissn>1097-024X</eissn><abstract>Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.</abstract><cop>Hoboken, USA</cop><pub>John Wiley &amp; Sons, Inc</pub><doi>10.1002/spe.3087</doi><tpages>18</tpages><orcidid>https://orcid.org/0000-0001-6795-6152</orcidid><orcidid>https://orcid.org/0000-0002-2736-9970</orcidid><orcidid>https://orcid.org/0000-0001-7897-1673</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0038-0644
ispartof Software, practice & experience, 2024-10, Vol.54 (10), p.1852-1869
issn 0038-0644
1097-024X
language eng
recordid cdi_proquest_journals_3099901811
source Wiley-Blackwell Read & Publish Collection
subjects 5G mobile communication
Artificial intelligence
Authentication
Authentication protocols
Autonomous vehicles
Industrial development
Interactive control
Internet of Vehicles
Network latency
Protocol
Security
Traffic congestion
Transportation industry
Transportation networks
Wireless networks
title Practical and secure multifactor authentication protocol for autonomous vehicles in 5G
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T16%3A59%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Practical%20and%20secure%20multifactor%20authentication%20protocol%20for%20autonomous%20vehicles%20in%205G&rft.jtitle=Software,%20practice%20&%20experience&rft.au=Miao,%20Junfeng&rft.date=2024-10&rft.volume=54&rft.issue=10&rft.spage=1852&rft.epage=1869&rft.pages=1852-1869&rft.issn=0038-0644&rft.eissn=1097-024X&rft_id=info:doi/10.1002/spe.3087&rft_dat=%3Cproquest_cross%3E3099901811%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2237-aa8265bc149bd523d6e33aced2086d9b52a834634847ae98d944fbab9408988d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3099901811&rft_id=info:pmid/&rfr_iscdi=true