An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm

   Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper,...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki Ročník 25; číslo 4; s. 755 - 761
Hlavní autori: Saeed, Muhammad Salman, Bezzateev, S. V.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: ITMO University 29.08.2025
Predmet:
ISSN:2226-1494, 2500-0373
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract    Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper, we propose a lightweight authentication protocol based on the Decisional Diffie–Hellman problem, specifically designed for Controller Area Network environments. The protocol employs lightweight cryptographic operations to verify vehicle authenticity and validate data messages, while also maintaining anonymity by regularly updating login identities. It also supports password changes without requiring a trusted third party. The protocol security is formally verified using Burrows-Abadi-Needham logic. Performance evaluation shows that our approach significantly reduces computational overhead, achieving an execution time of 0.90908 ms, outperforming existing solutions in the literature. By combining formal verification with practical efficiency, the proposed protocol offers a robust solution for secure and efficient authentication in resource-constrained vehicular networks. Its lightweight design and anonymity-preserving mechanisms make it particularly suitable for real-time autonomous vehicle applications.
AbstractList    Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper, we propose a lightweight authentication protocol based on the Decisional Diffie–Hellman problem, specifically designed for Controller Area Network environments. The protocol employs lightweight cryptographic operations to verify vehicle authenticity and validate data messages, while also maintaining anonymity by regularly updating login identities. It also supports password changes without requiring a trusted third party. The protocol security is formally verified using Burrows-Abadi-Needham logic. Performance evaluation shows that our approach significantly reduces computational overhead, achieving an execution time of 0.90908 ms, outperforming existing solutions in the literature. By combining formal verification with practical efficiency, the proposed protocol offers a robust solution for secure and efficient authentication in resource-constrained vehicular networks. Its lightweight design and anonymity-preserving mechanisms make it particularly suitable for real-time autonomous vehicle applications.
Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper, we propose a lightweight authentication protocol based on the Decisional Diffie–Hellman problem, specifically designed for Controller Area Network environments. The protocol employs lightweight cryptographic operations to verify vehicle authenticity and validate data messages, while also maintaining anonymity by regularly updating login identities. It also supports password changes without requiring a trusted third party. The protocol security is formally verified using Burrows-Abadi-Needham logic. Performance evaluation shows that our approach significantly reduces computational overhead, achieving an execution time of 0.90908 ms, outperforming existing solutions in the literature. By combining formal verification with practical efficiency, the proposed protocol offers a robust solution for secure and efficient authentication in resource-constrained vehicular networks. Its lightweight design and anonymity-preserving mechanisms make it particularly suitable for real-time autonomous vehicle applications.
Author Saeed, Muhammad Salman
Bezzateev, S. V.
Author_xml – sequence: 1
  givenname: Muhammad Salman
  orcidid: 0009-0006-1425-4863
  surname: Saeed
  fullname: Saeed, Muhammad Salman
  organization: ITMO University
– sequence: 2
  givenname: S. V.
  orcidid: 0000-0002-0924-6221
  surname: Bezzateev
  fullname: Bezzateev, S. V.
  organization: Saint Petersburg State University of Aerospace Instrumentation (SUAI); ITMO University
BookMark eNo9kM1KAzEQx4NUsNa-wx68RpNsssmCl1I_Wih40XOYzUebst2U7Frw5jv4hj6JqVVhmBn-zPyZ-V2iURc7h9A1JTdUClXdMsYqTHnNMSNM4BwcSyGwrOgZGjNBCCalLEe5_5u8QNO-3xJCqMyJsTGCWVeE3T7Fg7MFvA0b1w3BwBBiV2R1iCa2hY-p6F3rsU3hELp1cXCbYFrXFw30eS_P3gfvg_v6-Fy4tt1BV0C7jikMm90VOvfQ9m76Wyfo9fHhZb7Aq-en5Xy2woZxQXED0toSSld73gjlGqi9lF55KhSrG6BApJRGlQKUJ8xQTxpiXWOst5D_KydoefK1EbZ6n8IO0ruOEPSPENNaQxqOZ2vrMr-6kpAZcS45SKUsNVXVKMsqUNnr7uRlUuz75Py_HyX6h74-MtVHpvpIX-fgOtPXmX75DfkrfOE
Cites_doi 10.1016/j.procs.2023.03.008
10.1109/TVT.2020.2986585
10.1155/2023/8676929
10.1145/77648.77649
10.1109/MNET.2011.5772059
10.1016/j.vehcom.2020.100247
10.1109/JSEN.2021.3097172
10.1007/s11277-014-1750-y
10.1109/TITS.2022.3227949
10.1109/TVT.2017.2744182
10.1109/ACCESS.2021.3125521
10.1109/Trustcom.2015.425
10.1109/TNSE.2021.3093435
10.1109/TITS.2015.2502322
10.1109/IVS.2008.4621301
10.1109/TITS.2014.2377074
10.1016/j.mcm.2011.04.036
10.1109/ACCESS.2020.2981397
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.17586/2226-1494-2025-25-4-755-761
DatabaseName CrossRef
Directory of Open Access Journals (DOAJ)
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2500-0373
EndPage 761
ExternalDocumentID oai_doaj_org_article_de586967a5004474a788d1c66b8d26a8
10_17586_2226_1494_2025_25_4_755_761
GroupedDBID 642
AAYXX
ADBBV
AFKRA
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BPHCQ
BYOGL
CITATION
GROUPED_DOAJ
KQ8
PIMPY
PQQKQ
PROAC
VCL
VIT
ID FETCH-LOGICAL-c2451-ba7dd3a3e9f4b58eba9f77f8f15829ba1a0777c835a8f02c1f0b0debcdfda2263
IEDL.DBID DOA
ISSN 2226-1494
IngestDate Mon Nov 03 22:07:14 EST 2025
Sat Nov 29 07:32:50 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ntv.elpub.ru/jour/about/editorialPolicies#openAccessPolicy
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2451-ba7dd3a3e9f4b58eba9f77f8f15829ba1a0777c835a8f02c1f0b0debcdfda2263
ORCID 0000-0002-0924-6221
0009-0006-1425-4863
OpenAccessLink https://doaj.org/article/de586967a5004474a788d1c66b8d26a8
PageCount 7
ParticipantIDs doaj_primary_oai_doaj_org_article_de586967a5004474a788d1c66b8d26a8
crossref_primary_10_17586_2226_1494_2025_25_4_755_761
PublicationCentury 2000
PublicationDate 2025-08-29
PublicationDateYYYYMMDD 2025-08-29
PublicationDate_xml – month: 08
  year: 2025
  text: 2025-08-29
  day: 29
PublicationDecade 2020
PublicationTitle Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki
PublicationYear 2025
Publisher ITMO University
Publisher_xml – name: ITMO University
References ref13
ref12
ref15
ref14
ref11
ref10
ref2
ref1
ref17
ref16
ref18
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref12
  doi: 10.1016/j.procs.2023.03.008
– ident: ref13
  doi: 10.1109/TVT.2020.2986585
– ident: ref11
  doi: 10.1155/2023/8676929
– ident: ref15
  doi: 10.1145/77648.77649
– ident: ref14
  doi: 10.1109/MNET.2011.5772059
– ident: ref6
  doi: 10.1016/j.vehcom.2020.100247
– ident: ref5
  doi: 10.1109/JSEN.2021.3097172
– ident: ref17
  doi: 10.1007/s11277-014-1750-y
– ident: ref18
  doi: 10.1109/TITS.2022.3227949
– ident: ref8
  doi: 10.1109/TVT.2017.2744182
– ident: ref7
  doi: 10.1109/ACCESS.2021.3125521
– ident: ref9
  doi: 10.1109/Trustcom.2015.425
– ident: ref10
  doi: 10.1109/TNSE.2021.3093435
– ident: ref4
  doi: 10.1109/TITS.2015.2502322
– ident: ref1
  doi: 10.1109/IVS.2008.4621301
– ident: ref3
  doi: 10.1109/TITS.2014.2377074
– ident: ref16
  doi: 10.1016/j.mcm.2011.04.036
– ident: ref2
  doi: 10.1109/ACCESS.2020.2981397
SSID ssj0001700022
ssib026971427
Score 2.3016558
Snippet    Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats....
Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 755
SubjectTerms автономные транспортные средства
механизмы сохранения анонимности
протокол аутентификации
сети контроллеров
эффективная аутентификация
Title An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm
URI https://doaj.org/article/de586967a5004474a788d1c66b8d26a8
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2500-0373
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001700022
  issn: 2226-1494
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV27bhUxELVQhBAUEU-RBJCLtFb2YXvsMglEFCiiACmdNX6Ri272RjeX1PwDf8iXZGZ3iS4VDZIra71anTnaeWh8RojDWpC8hG0UZECltS6KzKxVzb6mpmrfx1HE9ROcn7uLC_95a9QX94RN8sATcEe5GGe9BVbu1xo0Us6W22RtdLmzOF7zbcBvJVPEpM56aPWsb_l9Eolhb8WT5ijeUJQW6EfikP8YFC_bo_tNIk1nFC2twBgFtv3LX23J-o_-5-yp2J0DR3k8ffAz8aAMz8WTLTnBFwKPB7kYiwQlS-TW9WEzl-Qk6zGsyOiSglR5U5ZV5fWCiwnytlyOrXGSHVqW9Ox7ruOU3z9_kU9aXuEgcflttV5sLq9eiq9nH76cflTzCAWVOm1aFRFy7rEvvupoXInoK0B1tTWu8xFbbAAgURiGrjZdamsTm1xiyjUjgdK_EjvDaiivhXSpgq0xdT06jZlsYnNpoZZco7He7wnzB6hwPSllBM4wGODAAAcGODDAgZYOBHAggPfECaN6f4b1rscNYkGYWRD-xYL9__GSA_F4NH_D91LeiJ3N-kd5Kx6m283iZv1uJNgdw3PQHw
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+improved+authentication+protocol+for+self-driving+vehicles+based+on+Diffie%E2%80%93Hellman+algorithm&rft.jtitle=Nauchno-tekhnicheski%C4%AD+vestnik+informat%CD%A1s%EF%B8%A1ionnykh+tekhnologi%C4%AD%2C+mekhaniki+i+optiki&rft.au=Saeed%2C+Muhammad+Salman&rft.au=Bezzateev%2C+S.+V.&rft.date=2025-08-29&rft.issn=2226-1494&rft.eissn=2500-0373&rft.volume=25&rft.issue=4&rft.spage=755&rft.epage=761&rft_id=info:doi/10.17586%2F2226-1494-2025-25-4-755-761&rft.externalDBID=n%2Fa&rft.externalDocID=10_17586_2226_1494_2025_25_4_755_761
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2226-1494&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2226-1494&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2226-1494&client=summon