An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm
Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper,...
Uložené v:
| Vydané v: | Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki Ročník 25; číslo 4; s. 755 - 761 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
ITMO University
29.08.2025
|
| Predmet: | |
| ISSN: | 2226-1494, 2500-0373 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper, we propose a lightweight authentication protocol based on the Decisional Diffie–Hellman problem, specifically designed for Controller Area Network environments. The protocol employs lightweight cryptographic operations to verify vehicle authenticity and validate data messages, while also maintaining anonymity by regularly updating login identities. It also supports password changes without requiring a trusted third party. The protocol security is formally verified using Burrows-Abadi-Needham logic. Performance evaluation shows that our approach significantly reduces computational overhead, achieving an execution time of 0.90908 ms, outperforming existing solutions in the literature. By combining formal verification with practical efficiency, the proposed protocol offers a robust solution for secure and efficient authentication in resource-constrained vehicular networks. Its lightweight design and anonymity-preserving mechanisms make it particularly suitable for real-time autonomous vehicle applications. |
|---|---|
| AbstractList | Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper, we propose a lightweight authentication protocol based on the Decisional Diffie–Hellman problem, specifically designed for Controller Area Network environments. The protocol employs lightweight cryptographic operations to verify vehicle authenticity and validate data messages, while also maintaining anonymity by regularly updating login identities. It also supports password changes without requiring a trusted third party. The protocol security is formally verified using Burrows-Abadi-Needham logic. Performance evaluation shows that our approach significantly reduces computational overhead, achieving an execution time of 0.90908 ms, outperforming existing solutions in the literature. By combining formal verification with practical efficiency, the proposed protocol offers a robust solution for secure and efficient authentication in resource-constrained vehicular networks. Its lightweight design and anonymity-preserving mechanisms make it particularly suitable for real-time autonomous vehicle applications. Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper, we propose a lightweight authentication protocol based on the Decisional Diffie–Hellman problem, specifically designed for Controller Area Network environments. The protocol employs lightweight cryptographic operations to verify vehicle authenticity and validate data messages, while also maintaining anonymity by regularly updating login identities. It also supports password changes without requiring a trusted third party. The protocol security is formally verified using Burrows-Abadi-Needham logic. Performance evaluation shows that our approach significantly reduces computational overhead, achieving an execution time of 0.90908 ms, outperforming existing solutions in the literature. By combining formal verification with practical efficiency, the proposed protocol offers a robust solution for secure and efficient authentication in resource-constrained vehicular networks. Its lightweight design and anonymity-preserving mechanisms make it particularly suitable for real-time autonomous vehicle applications. |
| Author | Saeed, Muhammad Salman Bezzateev, S. V. |
| Author_xml | – sequence: 1 givenname: Muhammad Salman orcidid: 0009-0006-1425-4863 surname: Saeed fullname: Saeed, Muhammad Salman organization: ITMO University – sequence: 2 givenname: S. V. orcidid: 0000-0002-0924-6221 surname: Bezzateev fullname: Bezzateev, S. V. organization: Saint Petersburg State University of Aerospace Instrumentation (SUAI); ITMO University |
| BookMark | eNo9kM1KAzEQx4NUsNa-wx68RpNsssmCl1I_Wih40XOYzUebst2U7Frw5jv4hj6JqVVhmBn-zPyZ-V2iURc7h9A1JTdUClXdMsYqTHnNMSNM4BwcSyGwrOgZGjNBCCalLEe5_5u8QNO-3xJCqMyJsTGCWVeE3T7Fg7MFvA0b1w3BwBBiV2R1iCa2hY-p6F3rsU3hELp1cXCbYFrXFw30eS_P3gfvg_v6-Fy4tt1BV0C7jikMm90VOvfQ9m76Wyfo9fHhZb7Aq-en5Xy2woZxQXED0toSSld73gjlGqi9lF55KhSrG6BApJRGlQKUJ8xQTxpiXWOst5D_KydoefK1EbZ6n8IO0ruOEPSPENNaQxqOZ2vrMr-6kpAZcS45SKUsNVXVKMsqUNnr7uRlUuz75Py_HyX6h74-MtVHpvpIX-fgOtPXmX75DfkrfOE |
| Cites_doi | 10.1016/j.procs.2023.03.008 10.1109/TVT.2020.2986585 10.1155/2023/8676929 10.1145/77648.77649 10.1109/MNET.2011.5772059 10.1016/j.vehcom.2020.100247 10.1109/JSEN.2021.3097172 10.1007/s11277-014-1750-y 10.1109/TITS.2022.3227949 10.1109/TVT.2017.2744182 10.1109/ACCESS.2021.3125521 10.1109/Trustcom.2015.425 10.1109/TNSE.2021.3093435 10.1109/TITS.2015.2502322 10.1109/IVS.2008.4621301 10.1109/TITS.2014.2377074 10.1016/j.mcm.2011.04.036 10.1109/ACCESS.2020.2981397 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.17586/2226-1494-2025-25-4-755-761 |
| DatabaseName | CrossRef Directory of Open Access Journals (DOAJ) |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2500-0373 |
| EndPage | 761 |
| ExternalDocumentID | oai_doaj_org_article_de586967a5004474a788d1c66b8d26a8 10_17586_2226_1494_2025_25_4_755_761 |
| GroupedDBID | 642 AAYXX ADBBV AFKRA ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BPHCQ BYOGL CITATION GROUPED_DOAJ KQ8 PIMPY PQQKQ PROAC VCL VIT |
| ID | FETCH-LOGICAL-c2451-ba7dd3a3e9f4b58eba9f77f8f15829ba1a0777c835a8f02c1f0b0debcdfda2263 |
| IEDL.DBID | DOA |
| ISSN | 2226-1494 |
| IngestDate | Mon Nov 03 22:07:14 EST 2025 Sat Nov 29 07:32:50 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ntv.elpub.ru/jour/about/editorialPolicies#openAccessPolicy |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2451-ba7dd3a3e9f4b58eba9f77f8f15829ba1a0777c835a8f02c1f0b0debcdfda2263 |
| ORCID | 0000-0002-0924-6221 0009-0006-1425-4863 |
| OpenAccessLink | https://doaj.org/article/de586967a5004474a788d1c66b8d26a8 |
| PageCount | 7 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_de586967a5004474a788d1c66b8d26a8 crossref_primary_10_17586_2226_1494_2025_25_4_755_761 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-08-29 |
| PublicationDateYYYYMMDD | 2025-08-29 |
| PublicationDate_xml | – month: 08 year: 2025 text: 2025-08-29 day: 29 |
| PublicationDecade | 2020 |
| PublicationTitle | Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki |
| PublicationYear | 2025 |
| Publisher | ITMO University |
| Publisher_xml | – name: ITMO University |
| References | ref13 ref12 ref15 ref14 ref11 ref10 ref2 ref1 ref17 ref16 ref18 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref12 doi: 10.1016/j.procs.2023.03.008 – ident: ref13 doi: 10.1109/TVT.2020.2986585 – ident: ref11 doi: 10.1155/2023/8676929 – ident: ref15 doi: 10.1145/77648.77649 – ident: ref14 doi: 10.1109/MNET.2011.5772059 – ident: ref6 doi: 10.1016/j.vehcom.2020.100247 – ident: ref5 doi: 10.1109/JSEN.2021.3097172 – ident: ref17 doi: 10.1007/s11277-014-1750-y – ident: ref18 doi: 10.1109/TITS.2022.3227949 – ident: ref8 doi: 10.1109/TVT.2017.2744182 – ident: ref7 doi: 10.1109/ACCESS.2021.3125521 – ident: ref9 doi: 10.1109/Trustcom.2015.425 – ident: ref10 doi: 10.1109/TNSE.2021.3093435 – ident: ref4 doi: 10.1109/TITS.2015.2502322 – ident: ref1 doi: 10.1109/IVS.2008.4621301 – ident: ref3 doi: 10.1109/TITS.2014.2377074 – ident: ref16 doi: 10.1016/j.mcm.2011.04.036 – ident: ref2 doi: 10.1109/ACCESS.2020.2981397 |
| SSID | ssj0001700022 ssib026971427 |
| Score | 2.3016558 |
| Snippet | Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats.... Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing... |
| SourceID | doaj crossref |
| SourceType | Open Website Index Database |
| StartPage | 755 |
| SubjectTerms | автономные транспортные средства механизмы сохранения анонимности протокол аутентификации сети контроллеров эффективная аутентификация |
| Title | An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm |
| URI | https://doaj.org/article/de586967a5004474a788d1c66b8d26a8 |
| Volume | 25 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2500-0373 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001700022 issn: 2226-1494 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV27bhUxELVQhBAUEU-RBJCLtFb2YXvsMglEFCiiACmdNX6Ri272RjeX1PwDf8iXZGZ3iS4VDZIra71anTnaeWh8RojDWpC8hG0UZECltS6KzKxVzb6mpmrfx1HE9ROcn7uLC_95a9QX94RN8sATcEe5GGe9BVbu1xo0Us6W22RtdLmzOF7zbcBvJVPEpM56aPWsb_l9Eolhb8WT5ijeUJQW6EfikP8YFC_bo_tNIk1nFC2twBgFtv3LX23J-o_-5-yp2J0DR3k8ffAz8aAMz8WTLTnBFwKPB7kYiwQlS-TW9WEzl-Qk6zGsyOiSglR5U5ZV5fWCiwnytlyOrXGSHVqW9Ox7ruOU3z9_kU9aXuEgcflttV5sLq9eiq9nH76cflTzCAWVOm1aFRFy7rEvvupoXInoK0B1tTWu8xFbbAAgURiGrjZdamsTm1xiyjUjgdK_EjvDaiivhXSpgq0xdT06jZlsYnNpoZZco7He7wnzB6hwPSllBM4wGODAAAcGODDAgZYOBHAggPfECaN6f4b1rscNYkGYWRD-xYL9__GSA_F4NH_D91LeiJ3N-kd5Kx6m283iZv1uJNgdw3PQHw |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+improved+authentication+protocol+for+self-driving+vehicles+based+on+Diffie%E2%80%93Hellman+algorithm&rft.jtitle=Nauchno-tekhnicheski%C4%AD+vestnik+informat%CD%A1s%EF%B8%A1ionnykh+tekhnologi%C4%AD%2C+mekhaniki+i+optiki&rft.au=Saeed%2C+Muhammad+Salman&rft.au=Bezzateev%2C+S.+V.&rft.date=2025-08-29&rft.issn=2226-1494&rft.eissn=2500-0373&rft.volume=25&rft.issue=4&rft.spage=755&rft.epage=761&rft_id=info:doi/10.17586%2F2226-1494-2025-25-4-755-761&rft.externalDBID=n%2Fa&rft.externalDocID=10_17586_2226_1494_2025_25_4_755_761 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2226-1494&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2226-1494&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2226-1494&client=summon |