信息安全研究 ›› 2025, Vol. 11 ›› Issue (5): 465-.

• 学术论文 • 上一篇    下一篇

 一种车联网V2V认证与密钥交换协议设计与验证

王秀珍1,4徐鹏1,4陈美荣1,2王丹琛1,3徐扬1,4   

  1. 1(系统可信性自动验证国家地方联合工程实验室成都611756)
    2(成都纺织高等专科学校成都611731)
    3(四川省数字经济研究中心成都610021)
    4(西南交通大学数学学院成都611756)
  • 出版日期:2025-06-03 发布日期:2025-06-03
  • 通讯作者: 王秀珍 硕士.主要研究方向为安全协议、形式化验证. 2921644498@qq.com
  • 作者简介:王秀珍 硕士.主要研究方向为安全协议、形式化验证. 2921644498@qq.com 徐鹏 博士,讲师.主要研究方向为网络空间安全、形式化验证、频谱与电磁环境管理. pengxup@swjtu.edu.cn 陈美荣 硕士,副教授.主要研究方向为电子商务及其安全、协议安全. meirong_chen@163.com 王丹琛 博士,高级工程师.主要研究方向为信息安全评估、软件系统可信性验证和大数据安全技术与应用. 61793698@qq.com 徐扬 博士,教授.主要研究方向为演绎逻辑、自动推理、定理机器证明. xuyang@home.swjtu.edu.cn

Design and Verification of V2V Authentication and Key Exchange Protocol  for Internet of Vehicles

Wang Xiuzhen1,4, Xu Peng1,4, Chen Meirong1,2, Wang Danchen1,3, and Xu Yang1,4   

  1. 1(NationalLocal Joint Engineering Laboratory of System Credibility Automatic Verification, Chengdu  611756)
    2(Chengdu Textile College, Chengdu  611731)
    3(Sichuan Digital Economy Research Center, Chengdu  610021)
    4(School of Mathematics, Southwest Jiaotong University, Chengdu  611756)
  • Online:2025-06-03 Published:2025-06-03

摘要: 车联网系统中,车辆行驶过程需与其他车辆通信以实现信息交换,要求必须具备高安全、低延迟、用户匿名性等安全特性.认证与密钥交换协议以密码算法为基础旨在完成会话密钥协商,用于通信双方后续信息交换,是保证车联网通信安全的重要手段.现有协议注册阶段需在线下安全信道中进行,与实际不符,且认证阶段多基于第三方并需多轮信息交互,增加了过程复杂度.因此设计了一种基于公共信道的V2V(vehicle to vehicle)协议,协议交互过程不需依赖第三方,仅需进行2轮信息交换,同时添加快速登录阶段以解决网络突然中断造成的信息交换延迟问题,理论分析与形式化验证结果表明协议满足认证性与保密性等安全性质.

关键词: 认证与密钥交换协议, 形式化分析, 快速登录, ROR模型, Proverif

Abstract: In the Internet of vehicles system, vehicles need to achieve communications of vehicle to vehicle(V2V), which needs strong security, low latency, user anonymity and other security characteristics. Authentication and key exchange protocol(AKE) is based on cryptographic algorithms, aiming to complete session key negotiation for subsequent information exchange between communication parties. It is an important means to ensure the security of vehicle networking. However, the existing protocol registration phase requires offline secure channels, which is inconsistent with reality. Also the authentication phase is mostly based on third parties and requires multiple rounds of information exchange, increasing the complexity of the protocol interactions. In this paper, a lightweight V2V protocol is designed for public channels, which does not rely on the third party and only requires two rounds of information exchange during login and authentication phases. At the same time, a fast login phase is added to solve the delay of information exchange caused by sudden network interruptions. Theoretical analysis and formal verification results show that the designed protocol satisfied security properties such as authentication and confidentiality.

Key words: authentication and key exchange protocol, formal analysis, fast login, ROR(real or random) model, Proverif

中图分类号: