Javascript must be enabled to continue!
A Lightweight V2R Authentication Protocol Based on PUF and Chebyshev Chaotic Map
View through CrossRef
<p>Internet of Vehicles (IoV) plays an important role in enhancing the intelligence of social transportation services. However, there are existing such as privacy leakage, computational complexity and low efficiency on V2R authentication protocols. To solve these problems, a lightweight V2R authentication protocol according to physical unclonable function (PUF) and Chebyshev chaotic map is proposed. The lightweight property of PUF in this scheme can solve the resource constraint problem of the On-Board Unit (OBU) effectively. The fuzzy extractor can correct for small variations in PUF response and improve the accuracy of data transmission. Besides, Chebyshev chaotic map with good cryptographic properties establishes a secure session key while achieving mutual authentication of V2R. Finally, simulation results show that the scheme combining PUF, chaotic map, and fuzzy extractor in this paper saves 4.7% to 49% in communication and calculation overhead comparing with existing protocols. In terms of security, our scheme can also meet the requirements well in the V2R authentication protocol for IoV.</p>
<p> </p>
Title: A Lightweight V2R Authentication Protocol Based on PUF and Chebyshev Chaotic Map
Description:
<p>Internet of Vehicles (IoV) plays an important role in enhancing the intelligence of social transportation services.
However, there are existing such as privacy leakage, computational complexity and low efficiency on V2R authentication protocols.
To solve these problems, a lightweight V2R authentication protocol according to physical unclonable function (PUF) and Chebyshev chaotic map is proposed.
The lightweight property of PUF in this scheme can solve the resource constraint problem of the On-Board Unit (OBU) effectively.
The fuzzy extractor can correct for small variations in PUF response and improve the accuracy of data transmission.
Besides, Chebyshev chaotic map with good cryptographic properties establishes a secure session key while achieving mutual authentication of V2R.
Finally, simulation results show that the scheme combining PUF, chaotic map, and fuzzy extractor in this paper saves 4.
7% to 49% in communication and calculation overhead comparing with existing protocols.
In terms of security, our scheme can also meet the requirements well in the V2R authentication protocol for IoV.
</p>
<p> </p>.
Related Results
An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
Computation offloading is a key technology in mobile edge computing (MEC) that addresses the performance and energy constraints faced by mobile devices when handling computationall...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
<p>In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (PUF) are discussed individually but only a few of them include unified ...
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
<p>In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (PUF) are discussed individually but only a few of them include unified ...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...

