2019
DOI: 10.1155/2019/7871067
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks

Abstract: As an important part of smart cities, vehicle ad hoc networks (VANETs) have attracted much attention from both industry and academia. In a VANET, generating a secure session key to facilitate subsequent data-in-transit transfer between two or more vehicles is crucial, which can be achieved by using an authenticated key agreement protocol. However, most of the existing identity-based two-party authenticated key agreement protocols have significant computational requirements or are known to be insecure. Thus, in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 27 publications
0
19
0
Order By: Relevance
“…In order to mitigate the certificate management problem, many identity-based schemes were proposed such as [16][17][18][19][20][21]. Zhang et al [16] introduced an identity-based solution with batch verification called IBV.…”
Section: Related Workmentioning
confidence: 99%
“…In order to mitigate the certificate management problem, many identity-based schemes were proposed such as [16][17][18][19][20][21]. Zhang et al [16] introduced an identity-based solution with batch verification called IBV.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, if private key is not stored in , the adversary cannot compromise that node. Thus, the proposed protocol is secure against device compromise attack, while [6,7,8,9] are insecure against that. and , he can only gain access to the temporary, not permanent, IDs.…”
Section: Informal Security Analysismentioning
confidence: 99%
“…We analyzed protocols by Alzarani et al [6], Chaudhry et al [10], and Li et al [9] in terms of security issues. Then, we proposed a mutual key-agreement protocol that includes four phases: (i) initialization, (ii) registration and long secret key generation, (iii) authentication and key agreement, (iv) public and private keys updating.…”
Section: Contributionmentioning
confidence: 99%
See 2 more Smart Citations