张豪, 胡荣磊, 张浩. 基于中国剩余定理的车联网批量切换认证协议[J]. 北京电子科技学院学报, 2025, 33(2): 63-75.
    引用本文: 张豪, 胡荣磊, 张浩. 基于中国剩余定理的车联网批量切换认证协议[J]. 北京电子科技学院学报, 2025, 33(2): 63-75.
    ZHANG Hao, HU Ronglei, ZHANG Hao. A Batch Handover Authentication Protocol for Vehicle Ad Hoc Networks Based on the Chinese Remainder Theorem[J]. Journal of Beijing Electronic Science and Technology Institute, 2025, 33(2): 63-75.
    Citation: ZHANG Hao, HU Ronglei, ZHANG Hao. A Batch Handover Authentication Protocol for Vehicle Ad Hoc Networks Based on the Chinese Remainder Theorem[J]. Journal of Beijing Electronic Science and Technology Institute, 2025, 33(2): 63-75.

    基于中国剩余定理的车联网批量切换认证协议

    A Batch Handover Authentication Protocol for Vehicle Ad Hoc Networks Based on the Chinese Remainder Theorem

    • 摘要: 在车联网的安全架构中,身份认证协议扮演着至关重要的角色。然而,现有认证协议多数没有关注车辆在不同路侧单元间频繁切换带来的认证挑战。针对上述问题,本文提出了一种基于中国剩余定理的车对路批量切换认证协议。所提协议利用椭圆曲线密码学构建无证书的匿名身份认证机制,实现了车辆与路侧单元间的轻量级相互认证。同时,采用中国剩余定理分发切换认证凭证,并通过预批量认证优化切换过程,从而提高认证效率。通过非形式化安全性分析和随机预言机模型证明了协议的安全性。与现有协议的性能对比分析,结果表明,所提协议能够有效降低计算和通信开销。

       

      Abstract: Identity authentication protocols serve as a critical component in the security architecture of vehicular ad hoc networks(VANETs). However, the majority of existing authentication protocols have overlooked the security challenges posed by frequent vehicle handovers across different roadside units(RSUs). To address these issues, this paper proposes a vehicle-to-roadside batch handover authentication protocol based on the Chinese Remainder Theorem. The proposed protocol leverages elliptic curve cryptography to establish a certificateless anonymous authentication mechanism, enabling lightweight mutual authentication between vehicles and roadside units. Additionally, the Chinese Remainder Theorem is used to distribute handover authentication credentials, and the switching process is optimized through pre-batch authentication, thereby enhancing overall authentication efficiency. The security of the proposed protocol is formally analyzed within the random oracle model and further validated through comprehensive informal security assessments. Performance comparison with existing protocols demonstrates that the proposed protocol effectively reduces both computational and communication overhead.

       

    /

    返回文章
    返回