Paper
28 November 2022 A novel PUF-based protocol to improve the reliability of RSU for anonymous authentication in VANET
Zhibin Feng, Yanfei Liu, Qi Li, Dong-dong Yang, Chen Cheng
Author Affiliations +
Proceedings Volume 12503, International Conference on Network Communication and Information Security (ICNCIS 2022); 125030A (2022) https://doi.org/10.1117/12.2657230
Event: International Conference on Network Communication and Information Security (ICNCIS 2022), 2022, Qingdao, China
Abstract
The PUF-based VANET protocol has been widely studied for its ability to provide additional anti-counterfeiting features to devices. However, most PUF-based VANET protocols only protect the vehicle without considering the risk of copying secrets for the Roadside Unit (RSU), and do not consider the huge computational cost of error correction algorithms on embedded devices. Therefore, in this paper, we design a lightweight multi-PUF-based VANET protocol. In the proposed protocol, PUF is designed to be placed on both the vehicle and RSU to avoid the security threat posed by fake nodes, providing higher security of the system. Combined with the algorithms of reverse fuzzy extractor and fuzzy extractor, the computing resources can be reasonably allocated, and the delay can be reduced to the maximum extent. Experiments show that the proposed protocol has lower computational cost and higher security than the traditional PUF protocol.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhibin Feng, Yanfei Liu, Qi Li, Dong-dong Yang, and Chen Cheng "A novel PUF-based protocol to improve the reliability of RSU for anonymous authentication in VANET", Proc. SPIE 12503, International Conference on Network Communication and Information Security (ICNCIS 2022), 125030A (28 November 2022); https://doi.org/10.1117/12.2657230
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Network security

Reliability

Information technology

Mobile communications

Systems modeling

Intelligence systems

RELATED CONTENT


Back to Top