An Improved Authentication Scheme for V2I Communication

In the rapid growth of automated transportation systems Vehicle to Infrastructure (V2I) communication is growing in significance to guarantee the effectiveness, security, and dependability of contemporary road networks. Sensitive data is exchanged during V2I communication, making strong authenticati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SN computer science 2024-06, Vol.5 (5), p.535, Article 535
Hauptverfasser: Suresh, D., Joshi, Prashant V., Parandkar, Parag, Sudharshan, K. M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In the rapid growth of automated transportation systems Vehicle to Infrastructure (V2I) communication is growing in significance to guarantee the effectiveness, security, and dependability of contemporary road networks. Sensitive data is exchanged during V2I communication, making strong authentication procedures essential to preventing fraudulent activity and potential security risks. This paper suggests an enhanced authentication technique in order to overcome the drawbacks of the current V2I communication security protocols. To improve the overall strength of the authentication procedure, proposed methodology combines cutting-edge cryptographic methods with creative security controls. To address the dynamic and resource-constrained nature of vehicle networks, the suggested approach focuses on striking a compromise between security, efficiency, and scalability. Large-scale deployment of cellular communications networks, such LTE-V2X and 5G NR, together with the Vehicle to Everything (V2X) architecture intended to facilitate vehicle communications. They could ensure adequate performance (latency, bandwidth, packet loss) and a stable geographic distribution. This paper suggests a safe authentication method for 5G-based V2X communication in this situation. In order to meet security needs, this paper proposes lightweight cryptography techniques to ensure an elevated level of security in the vehicle-to-vehicle infrastructure of mobile communication. Additionally it supports vehicles in obtaining all keys and data from RSU other cars or the network safely. It validates proposal utilizing the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to achieve the security goals. The EAP-IKEv2 protocol is used to establish a secure communication with the assistance of the HLPSL language and SPAN, a security protocol animator for AVISPA. By reusing IKEv2's encryption and payloads, EAP-IKEv2 is an adaptable EAP technique that allows for the facilitation of symmetric and asymmetric authentication as well as their combination. With the aim of establishing IPsec security associations, this EAP technique offers the security advantages associated with IKEv2 authentication and key agreement without requiring the exchange of messages in pairs using Diffie-Hellman. It assess the performance based on operational cost, time complexity, and space complexity, showing that proposed model has a lower computational cost.
ISSN:2661-8907
2662-995X
2661-8907
DOI:10.1007/s42979-024-02865-7