A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs
Abstract
:1. Introduction
2. VANET Security Concerns
2.1. Authentication
2.2. Privacy
2.3. Tracing
2.4. Sybil Resistance
2.5. Group Security
2.5.1. Forward Secrecy
2.5.2. Backward Secrecy
2.5.3. Revocation
3. Related Work
3.1. Protocols That Use ID-Based Signatures and Group Signatures for Authentication of Messages
3.2. Protocols That Use RSUs for Authentication and/or Key Distribution
3.3. Protocols Using Bilinear Pairing Based Cryptography
3.4. Protocols Based on Smart Cards and Tamper-Proof Devices
3.5. Protocols Minimizing the Overhead Involved in Public Key Infrastructure
3.6. Protocols That Use Cooperative Message Authentication or Batch Verification
3.7. Summary
4. Proposed Scheme
4.1. System Model
4.1.1. Trusted Authority (TA)
4.1.2. Regional Traffic Managers (RTMs)
4.1.3. On-Board Units (OBUs)
4.2. Preliminary Definitions
4.3. Process
4.3.1. System Initialization
- Step 1:
- For each RTM index j, TA generates the group keys. First, it randomly selects and and sets such that . Then it randomly selects the group master key and sets . The group master key will be saved for use later making the group private keys for the OBUs. The group public key, GPuKj, is now the tuple . The group tracing key, GTrKj, is .
- Step 2:
- The TA will also generate a symmetric key to be used by a members of group j for encrypting messages within the group. The shared symmetric key, SKj, is randomly chosen.
- Step 3:
- The tracing and symmetric keys for each group j will be sent to RTMj.
4.3.2. OBU Registration
- Step 1:
- When OBUi enters RTMj’s area it sends its public key certificate to the TA so that the TA can validate OBUi and provide it with group keys and pseudo-ID.
- Step 2:
- The TA calculates the private key for OBUi within RTMj’s group. OBUi’s group private key, GPrKji, will be computed by the TA using the group master key In order to do this, the TA randomly selects then it computes .
- Step 3:
- The TA sets GPrKji to be the tuple and sends it to OBUi encrypted with OBUi’s public key. RTMj has no knowledge of GPrKji.
4.3.3. Messaging
- Step 1:
- First, OBUi chooses two random values . Different random values should be chosen each time a message is signed so the other group members cannot link which messages were signed by the same vehicle, which could allow malicious nodes to track other group members.
- Step 2:
- Using the random numbers selected above, the group public key, and OBUi’s group private key, OBUi computes:
- Step 3:
- OBUi constructs the challenge. It selects random numbers and calculates
- Step 4:
- In order to make the signature, OBUi computes:
- Step 5:
- Receivers use the signature and group public key to compute
4.3.4. Pseudo-ID Tracing
4.3.5. Revocation and Group Key Updates
required key update rate = vehicles per second * number of lanes
5. Analysis
5.1. Authentication
5.2. Privacy
5.3. Tracing
5.4. Sybil Resistance
5.5. Backward Secrecy & Forward Secrecy
5.6. Revocation
5.7. Prevention of Other Insider Attacks
5.8. Comparison to Existing Schemes
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
References
- Lu, R.; Lin, X.; Liang, X.; Shen, X. A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs. IEEE Trans. Intell. Transp. Syst. 2012, 13, 127–138. [Google Scholar] [CrossRef] [Green Version]
- Vishwakarma, R.; Barskar, R.; Ahirwar, M. Secure Key Management in Vehicular Ad-Hoc Network: A Review. In Proceedings of the 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Odisha, India, 3–4 October 2016; pp. 1688–1694. [Google Scholar]
- Sheikh, M.S.; Liang, J.; Wang, W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Chauhan, K.K.; Kumar, S.; Kumar, S. The Design of a Secure Key Management System in Vehicular Ad hoc Networks. In Proceedings of the 2017 Conference on Information and Communication Technology (CICT’17), Gwalior, India, 3–5 November 2017. [Google Scholar]
- Lim, K.; Liu, W.; Wang, X.; Joung, J. SSKM: Scalable and Secure Key Management Scheme for Group Signature Based Authentication and CRL in VANET. Electronics 2019, 8, 1330. [Google Scholar] [CrossRef] [Green Version]
- Petit, J.; Dietzel, S.; Kargl, F. Privacy of Connected Vehicles. In Handbook of Mobile Data Privacy, 1st ed.; Gkoulalas-Divanis, A., Bettini, C., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2018; pp. 229–251. [Google Scholar]
- Zhou, T.; Choudhury, R.R.; Ning, P.; Chakrabarty, K. Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. In Proceedings of the 4th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Philadelphia, PA, USA, 6–10 August 2007; Cao, G., Kravets, R., Eds.; IEEE: Piscataway, NJ, USA, 2007. [Google Scholar]
- Parno, B.; Perrig, A. Challenges in Securing Vehicular Networks. In Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, USA, 14–15 November 2005. [Google Scholar]
- Raya, M.; Hubaux, J.-P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef] [Green Version]
- Mejri, M.N.; Ben-Othman, J.; Hamdi, M. Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 2014, 1, 53–66. [Google Scholar] [CrossRef]
- Douriez, M.; Doraiswamy, H.; Freire, J.; Silva, C.T. Anonymizing NYC Taxi Data: Does It Matter? In Proceedings of the 3rd IEEE International Conference on Data Science and Advanced Analytics (DSAA 2016), Montreal, QC, Canada, 17–19 October 2016; pp. 140–148. [Google Scholar]
- Alzaid, H.; Park, D.; Nieto, J.G.; Boyd, C.; Foo, E. A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Proceedings of the International Conference on Sensor Systems and Software (S-CUBE 2009), Pisa, Italy, 7–9 September 2009; Hailes, S., Sicari, S., Roussos, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 24, pp. 66–82. [Google Scholar]
- Manivannan, D.; Moni, S.S.; Zeadally, S. Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Veh. Commun. 2020, 25, 100247. [Google Scholar] [CrossRef]
- Gao, T.; Qi, J. An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature. In Lecture Notes on Data Engineering and Communications Technologies, Proceedings of the 13th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2018), Taichung, Taiwan, 27–29 October 2018; Barolli, L., Leu, F.Y., Enokido, T., Chen, H.C., Eds.; Springer: Cham, Switzerland, 2019; Volume 25, pp. 490–497. [Google Scholar]
- Zhang, Y.; Wen, F. A Lightweight Secure and Efficient Authentication and Key Agreement Protocol for VANET. In IOP Conference Series: Earth and Environmental Science, Proceedings of the 6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence (GSKI 2018), Wuhan, Hubei, China, 14–16 December 2018; Bian, F., Liu, X., Hsu, H.-M., Eds.; IOP Publishing Ltd.: Bristol, UK, 2019; Volume 234. [Google Scholar]
- Xiong, W.; Tang, B. A Cloud Based Three Layer Key Management Scheme for VANET. In Communications in Computer and Information Science, Proceedings of the 5th International Conference of Geo-Spatial Knowledge and Intelligence (GSKI 2017), Chiang Mai, Thailand, 8–10 December 2017; Yuan, H., Geng, J., Liu, C., Bian, F., Surapunt, T., Eds.; Springer: Singapore, 2018; Volume 849, pp. 574–587. [Google Scholar]
- Alimohammadi, M.; Pouyan, A.A. Sybil Attack Detection Using a Low Cost Short Group Signature in VANET. In Proceedings of the 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC 2015), Rasht, Iran, 2–3 September 2015; pp. 23–28. [Google Scholar]
- De Sales, T.B.M.; Perkusich, A.; De Sales, L.M.; De Almeida, H.O.; Soares, G.; De Sales, M. ASAP-V: A privacy-preserving authentication and sybil detection protocol for VANETs. Inf. Sci. 2016, 372, 208–224. [Google Scholar] [CrossRef]
- Mansour, A.; Malik, K.M.; Alkaff, A.; Kanaan, H. ALMS: Asymmetric Lightweight Centralized Group Key Management Protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2020, 1–16. [Google Scholar] [CrossRef]
- Hao, Y.; Cheng, Y.; Zhou, C.; Song, W. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs. IEEE J. Sel. Areas Commun. 2011, 29, 616–629. [Google Scholar] [CrossRef]
- Ali, I.; Lawrence, T.; Omala, A.A.; Li, F. An Efficient Hybrid Signcryption Scheme with Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs. IEEE Trans. Veh. Technol. 2020, 69, 11266–11280. [Google Scholar] [CrossRef]
- Boneh, D.; Boyen, X.; Shacham, H. Short Group Signatures. In Proceedings of the 24th Annual International Cryptology Conference (CRYPTO 2004), Santa Barbara, CA, USA, 15–19 August 2004; pp. 41–55. [Google Scholar]
- Cronin, B. Vehicle Based Data and Availability. Available online: https://www.its.dot.gov/itspac/october2012/PDF/data_availability.pdf (accessed on 4 February 2021).
- Afzal, H.; Kumar, M. Security of Vehicular Ad-Hoc Networks (VANET): A survey. In Journal of Physics: Conference Series, Proceedings of the 3rd National Conference on Computational Intelligence (NCCI 2019), Bangalore, Karnataka, India, 5–6 December 2019; IOP Publishing Ltd.: Bristol, UK, 2020; Volume 1427. [Google Scholar]
- Sandhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Youman, C.E. Role-Based Access Control Models. IEEE Comput. 1996, 29, 38–47. [Google Scholar] [CrossRef] [Green Version]
- Kayes, A.S.M.; Rahayu, W.; Dillon, T.; Chang, E. Accessing Data from Multiple Sources Through Context-Aware Access Control. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018), New York, NY, USA, 1–3 August 2018; O’Conner, L., Ed.; IEEE: Piscataway, NJ, USA, 2018. [Google Scholar]
- Kayes, A.S.M.; Rahayu, W.; Watters, P.; Alazab, M.; Dillon, T.; Chang, E. Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control. Future Gener. Comput. Syst. 2020, 107, 307–323. [Google Scholar] [CrossRef]
Symbol | Definition |
---|---|
i | Index of OBU |
j | Index of Regional Traffic Manager (RTM) |
PuKi | Public key for OBU index i, obtained from PKI certificate |
PuKj | Public key for RTM index j, obtained prior to initialization |
Aji | Pseudo-ID of OBU index i in the coverage area of RTM index j |
ɣj | Master key for RTM index j |
GPuKj | Group public key for RTM index j |
GTrKj | Group tracing key for RTM index j |
GPrKji | Private key of OBU index i within the group for RTM index j |
SKj | Symmetric key for all members of the group for RTM index j |
c | Message challenge value |
σ | Message signature |
Feature | [20] | [1] | [17] | [4] | [14] | [5] | [19] | Proposed |
---|---|---|---|---|---|---|---|---|
Forward Secrecy | No | /(Timed) | /(Once per Day) | Y (Always update) | No | No | Y (Always update) | /(Timed) |
Backward Secrecy | No | Y (Leave updates) | /(Once per Day) | Y (Always update) | No | No | Y (Always update) | /(Timed & revoked) |
Sybil Resistance | No | Y (Unique signature) | Y (Signatr. matching) | No | Y (1:1 sym. keys) | No | No | Y (RTM checking) |
Real ID Exposure Level | RSU | TA | RSU | KMS | TA | L-RSU | No ID Check | TA |
Tracking Prevention | Y (Group signature) | Y (Group key) | No | Y (Group key) | No | Y (Group signature) | Y (Group key) | Y (Group signature) |
Message Authentication | Y (Group signature) | Y (Group key) | Y (Group signature) | Y (Group key) | Y (Group signature) | Y (Group signature) | Y (Group key) | Y (Group signature) |
Tracing | Y (Private key) | No | No | No | No | Y (Private key) | No | Y (Private key) |
Member Revocation | Y (RSU) | Y (RSU) | No | No | No | /(Can’t join new) | No | Y (TA) |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Funderburg, L.E.; Lee, I.-Y. A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs. Sensors 2021, 21, 1063. https://doi.org/10.3390/s21041063
Funderburg LE, Lee I-Y. A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs. Sensors. 2021; 21(4):1063. https://doi.org/10.3390/s21041063
Chicago/Turabian StyleFunderburg, L. Ellen, and Im-Yeong Lee. 2021. "A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs" Sensors 21, no. 4: 1063. https://doi.org/10.3390/s21041063
APA StyleFunderburg, L. E., & Lee, I. -Y. (2021). A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs. Sensors, 21(4), 1063. https://doi.org/10.3390/s21041063