A Privacy-Preserving V2I Fast Authentication Scheme in VANETs
Abstract
:1. Introduction
- In the route-planning phase, the RSU authentication key sent by the CA to the vehicle is based on the RSU private key with the vehicle’s public identity key added. In this way, the confidentiality of the RSU private key is guaranteed, in addition to ensuring that this authentication key can only be used by the vehicle that applies for it.
- When the vehicle requests the authentication key of an RSU from the CA, the improved OT algorithm is utilized to encrypt the driving path information of the vehicle so that the CA cannot infer the driving path of the vehicle from the request information of the vehicle. In this way, the route privacy of the vehicle is protected.
2. Related Works
3. Preliminaries
3.1. Elliptic Curve Cryptography
- Point addition: Let be two points on E. If P and Q are not the same, there exists a point, , where R is the intersection of straight lines on E connecting P and Q. If P and Q are the same, then . If , then .
- Scalar point multiplication: Scalar multiplication on E is the repeated addition of a point. Let , ; then, .
- Elliptic curve discrete logarithm problem (ECDLP): Given two random points (), compute , where . It is difficult to compute x from R in probabilistic polynomial time.
- Elliptic curve computational Diffie–Hellman problem (ECCDHP): Given three random points (), compute , where . It is difficult to compute in probabilistic polynomial time.
3.2. Oblivious Transfer
4. Models and Design Goals
4.1. System Model
- CA: The CA is the highest administrator within VANETs, with sufficient computing and storage capacity. The CA is mainly responsible for setting system parameters, vehicle registration, storage and distribution of RSU authentication keys, and assisting in vehicle identity authentication. Although the CA will strictly follow the predefined relevant protocols, it is also expected to infer private information such as the vehicle’s departure location, driving status, and trip destination from the vehicle’s request information.
- RSU: RSUs are roadside-installed infrastructure that are primarily responsible for collecting and processing data from vehicles to provide real-time information on traffic conditions and related services. In addition, they work with the CA to ensure the security of vehicle identities and communications. Through the deployment of RSUs, vehicles can effectively communicate and collaborate with road infrastructure and other vehicles.
- Vehicle: As mobile nodes in VANETs, vehicles with OBUs installed have communication and sensing capabilities. They communicate with RSUs, and other vehicles through their OBUs to obtain real-time traffic information and vehicle condition data. In addition, vehicles can share their own information with other vehicles, leading to collaborative operations between vehicles, thereby optimizing the ITS.
4.2. Attack Model
- An attacker can easily access the public channel and intercept, replay, modify, and forge the messages transmitted on that channel.
- No attacker is able to modify, read, or delete any information stored in the vehicles and RSUs.
- It is assumed that CA and RSUs will honestly implement the designed protocols, but these entities still wish to infer the vehicle’s privacy from the obtained information, such as private information about the vehicle’s travel path and departure time.
- Suppose a vehicle wants to infer the private key of an RSU from the RSU authentication key obtained by the CA to generate an authentication key suitable for use by any vehicle.
4.3. Design Goals
- RSU private key confidentiality: RSUs’ private keys should be confidential to other entities (except the CA). Other entities are prevented from misusing an RSU’s private key for attacks such as malicious access to the RSU.
- Route privacy: Protecting vehicle route privacy is critical during the route-planning phase when the CA assists a vehicle in requesting an RSU’s authentication key. If the system fails to meet this requirement, then the CA can easily access the traveling path of any vehicle.
- Traceability: Once the presence of a malicious vehicle is detected as a threat to the security of a VANET, the CA obtains the real identity of the vehicle and revokes its identity information, preventing it from jeopardizing the security of the VANET.
- Unlinkability: An attacker cannot determine whether two or more received messages originate from the same sender. In other words, the attacker cannot trace the real identity of a vehicle by analyzing the messages sent by the vehicle.
- Resistance to common security attacks: Our scheme is resistant to several common security attacks, such as Sybil attacks, modification attacks, replay attacks, and repudiation attacks.
5. Proposed Scheme
5.1. System Initialization Phase
- Symmetric encryption: , where c is the cipher text, is the private key, and m is the plain text.
- Symmetric decryption: .
- Asymmetric encryption: , where c is the cipher text, is the public key, and m is the plain text.
- Asymmetric decryption: , where is the private key.
5.2. Registration Phase
5.3. Route-Planning Phase
5.4. V2I Authentication Phase
6. Security Analysis
- RSU private key confidentiality: In the route-planning phase, the CA combines the private key () and the public identity key () to generate the authentication key (), which is only applicable to the vehicle, then sends it to the vehicle. If the vehicle wants to derive from the known and , it needs to solve the unidirectionality problem of the one-way hash function first. However, the unidirectionality problem of the hash function is very difficult to overcome. Therefore, the confidentiality of can be guaranteed.
- Route privacy: In the route-planning phase, encrypts the information of the k RSU numbers that the planned path needs to pass through to calculate and , then send to the CA. If the CA wants to derive , then it needs to obtain the correspondence between and . If the CA wants to obtain the correspondence between and , it needs to solve the ECDLP problem of ECC to obtain . However, the CA is well within the hard probabilistic polynomial time to solve the ECDLP problem of ECC to obtain . In addition, if the CA wishes to derive the travel path of by calculating , it needs to solve the unidirectionality problem of the one-way hash function first. However, the unidirectionality problem of the one-way hash function is difficult to overcome. In summary, the CA cannot infer from ’s message which RSUs will pass through, and ’s route privacy is protected.
- Traceability: Although the real identity of a vehicle is hidden in a pseudonym, when an anonymous vehicle in the system sends a message that is disputed, the CA can calculate its real identity based on its pseudonym. Since and s are stored in the CA’s database, the CA can obtain the real identity of the vehicle by calculating . Therefore, traceability can be guaranteed.
- Unlinkability: In this scheme, each is created using a different random number (), each pseudonym is updated periodically, and the pseudonyms contained within each message are indistinguishable. Therefore, an attacker cannot link any two or more messages to a particular vehicle.
- Resistance to common security attacks: The scheme proposed in this paper is able to resist several common security attacks, such as Sybil attacks, modification attacks, replay attacks, and repudiation attacks. The proof details are shown below.
- –
- Sybil attacks: Since the pseudonym of the vehicle is generated by the CA through the vehicle’s real identity (), the system private key (s), and vehicle private key (), n attacker cannot obtain this information to generate a valid pseudonym. In addition, the attacker cannot know the rules for generating pseudonyms. Therefore, the attacker cannot utilize a pseudonym to realize a Sybil attack.
- –
- Modification attacks: We resist modification attacks using secondary encryption of the message through a hash function. For example, sends a request message as when it applies for the authentication key of an RSU from the CA. When the CA receives the message, it calculates , and if , it proves that the message has not been modified. Thus, our scheme is resistant to modification attacks.
- –
- Replay attacks: We include a timestamp () in both the message and the content of the communication to resist replay attacks. Each entity generates a timestamp () when it receives a message, and if , the message is fresh. denotes a fixed value set by the system. Therefore, the receiver of a message can detect a replay attack by verifying the timestamp contained in the message.
- –
- Repudiation attacks: When a vehicle wants to deny a message that has been sent, the CA can hold the vehicle responsible by calculating to obtain the real identity of the corresponding vehicle based on the pseudonym information in the message. Therefore, our scheme is capable of low resistance to repudiation attacks.
7. Performance Evaluation
7.1. Computational Overhead Comparison
7.2. Communication Overhead Comparison
7.3. Packet Loss Rate Evaluation
8. Conclusions and Discussion
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zhang, H.; Lu, X. Vehicle communication network in intelligent transportation system based on Internet of Things. Comput. Commun. 2020, 160, 799–806. [Google Scholar] [CrossRef]
- Al-shareeda, M.A.; Alazzawi, M.A.; Anbar, M.; Manickam, S.; Al-Ani, A.K. A comprehensive survey on vehicular ad hoc networks (vanets). In Proceedings of the 2021 International Conference on Advanced Computer Applications (ACA), Maysan, Iraq, 25–26 July 2021; pp. 156–160. [Google Scholar]
- Chen, J.; Wang, Z.; Srivastava, G.; Alghamdi, T.A.; Khan, F.; Kumari, S.; Xiong, H. Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training. J. Ind. Inf. Integr. 2024, 39, 10593. [Google Scholar] [CrossRef]
- Ahmed, W.; Di, W.; Mukathe, D. Privacy-preserving blockchain-based authentication and trust management in VANETs. IET Netw. 2022, 11, 89–111. [Google Scholar] [CrossRef]
- Khan, A.R.; Jamlos, M.F.; Osman, N.; Ishak, M.I.; Dzaharudin, F.; Yeow, Y.K.; Khairi, K.A. DSRC technology in Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) IoT system for Intelligent Transportation System (ITS): A review. In Recent Trends in Mechatronics Towards Industry 4.0; Selected Articles from iM3F; Springer: Berlin/Heidelberg, Germany, 2020; pp. 97–106. [Google Scholar]
- Kenney, J.B. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 2011, 99, 1162–1182. [Google Scholar] [CrossRef]
- Abboud, K.; Omar, H.A.; Zhuang, W. Interworking of DSRC and cellular network technologies for V2X communications: A survey. IEEE Trans. Veh. Technol. 2016, 65, 9457–9470. [Google Scholar] [CrossRef]
- Xiong, H.; Chen, J.; Mei, Q.; Zhao, Y. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs. IEEE Trans. Dependable Secur. Comput. 2020, 10, 2089–2104. [Google Scholar] [CrossRef]
- Yu, H.; Liu, R.; Li, Z.; Ren, Y.; Jiang, H. An RSU deployment strategy based on traffic demand in vehicular ad hoc networks (VANETs). IEEE Internet Things J. 2021, 9, 6496–6505. [Google Scholar] [CrossRef]
- Ahmad, A.; Din, S.; Paul, A.; Jeon, G.; Aloqaily, M.; Ahmad, M. Real-time route planning and data dissemination for urban scenarios using the Internet of Things. IEEE Wirel. Commun. 2019, 26, 50–55. [Google Scholar] [CrossRef]
- Azees, M.; Vijayakumar, P.; Jegatha Deborah, L. Comprehensive survey on security services in vehicular ad-hoc networks. IET Intell. Transp. Syst. 2016, 10, 379–388. [Google Scholar] [CrossRef]
- Mansour, M.B.; Salama, C.; Mohamed, H.K.; Hammad, S.A. VANET security and privacy-an overview. IJNSA 2018, 10, 13–34. [Google Scholar] [CrossRef]
- Malhi, A.K.; Batra, S.; Pannu, H.S. Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur. 2020, 89, 101664. [Google Scholar] [CrossRef]
- Rao, B.T.; Patibandla, R.L.; Narayana, V.L. Comparative study on security and privacy issues in VANETs. Cloud IoT-Based Veh. Ad Hoc Netw. 2021, 145–162. [Google Scholar] [CrossRef]
- Rajeswari, R.M.; Rajesh, S. Enhance security and privacy in VANET based sensor monitoring and emergency services. Cybern. Syst. 2024, 55, 872–893. [Google Scholar] [CrossRef]
- Tan, H.; Chung, I. Secure authentication and key management with blockchain in VANETs. IEEE Access 2019, 8, 2482–2498. [Google Scholar] [CrossRef]
- Ma, Z.; Zhang, J.; Guo, Y.; Liu, Y.; Liu, X.; He, W. An efficient decentralized key management mechanism for VANET with blockchain. IEEE Trans. Veh. Technol. 2020, 69, 5836–5849. [Google Scholar] [CrossRef]
- Xu, G.; Li, X.; Jiao, L.; Wang, W.; Liu, A.; Su, C.; Zheng, X.; Liu, S.; Cheng, X. BAGKD: A batch authentication and group key distribution protocol for VANETs. IEEE Commun. Mag. 2020, 58, 35–41. [Google Scholar] [CrossRef]
- Mansour, A.; Malik, K.M.; Alkaff, A.; Kanaan, H. ALMS: Asymmetric lightweight centralized group key management protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2020, 22, 1663–1678. [Google Scholar] [CrossRef]
- Li, X.; Liu, J.; Obaidat, M.S.; Vijayakumar, P.; Jiang, Q.; Amin, R. An unlinkable authenticated key agreement with collusion resistant for VANETs. IEEE Trans. Veh. Technol. 2021, 70, 7992–8006. [Google Scholar] [CrossRef]
- Li, X.; Shang, S.; Liu, S.; Gu, K.; Jan, M.A.; Zhang, X.; Khan, F. An identity-based data integrity auditing scheme for cloud-based maritime transportation systems. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2556–2567. [Google Scholar] [CrossRef]
- Wei, L.; Cui, J.; Zhong, H.; Xu, Y.; Liu, L. Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs. IEEE Trans. Mob. Comput. 2021, 21, 3280–3297. [Google Scholar] [CrossRef]
- Yang, Q.; Zhu, X.; Wang, X.; Fu, J.; Zheng, J.; Liu, Y. A novel authentication and key agreement scheme for Internet of Vehicles. Future Gener. Comput. Syst. 2023, 145, 415–428. [Google Scholar] [CrossRef]
- Manvi, S.S.; Tangade, S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017, 9, 19–30. [Google Scholar] [CrossRef]
- Sampigethaya, K.; Huang, L.; Li, M.; Poovendran, R.; Matsuura, K.; Sezaki, K. CARAVAN: Providing Location Privacy for VANET; Technical Report; Department of Electrical Engineering, Washington University: Seattle, WA, USA, 2005. [Google Scholar]
- Zhu, H.; Liu, T.; Wei, G.; Li, H. PPAS: Privacy protection authentication scheme for VANET. Clust. Comput. 2013, 16, 873–886. [Google Scholar] [CrossRef]
- Cui, J.; Xu, W.; Sha, K.; Zhong, H. An efficient identity-based privacy-preserving authentication scheme for vanets. In Proceedings of the 13th International Conference, Edinburgh, UK, 11–13 December 2017; pp. 508–518. [Google Scholar]
- Wahid, A.; Yasmeen, H.; Shah, M.A.; Alam, M.; Shah, S.C. Holistic approach for coupling privacy with safety in VANETs. Comput. Netw. 2019, 148, 214–230. [Google Scholar] [CrossRef]
- Lv, S.; Liu, Y. PLVA: Privacy-preserving and lightweight V2I authentication protocol. IEEE Trans. Intell. Transp. Syst. 2021, 23, 6633–6639. [Google Scholar] [CrossRef]
- Liang, Y.; Liu, Y.; Gupta, B.B. PPRP: Preserving-privacy route planning scheme in VANETs. ACM Trans. Internet Technol. 2022, 22, 1–18. [Google Scholar] [CrossRef]
- Yan, Z.; Zhang, J. Path Privacy-Preserving Scheme Based on Oblivious Transfer Protocol. In Proceedings of the 2022 10th International Conference on Intelligent Computing and Wireless Optical Communications (ICWOC), Chongqing, China, 10–12 June 2022; pp. 6–10. [Google Scholar]
- Su, H.; Dong, S.; Wang, N.; Zhang, T. An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs. Veh. Commun. 2024, 45, 100727. [Google Scholar] [CrossRef]
- Rabin, M.O. How To Exchange Secrets with Oblivious Transfer. IACR Cryptol. ePrint Arch. 2005, 187. [Google Scholar]
- Chu, C.-K.; Tzeng, W.-G. Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. In Public Key Cryptography—PKC 2005; Springer: Berlin/Heidelberg, Germeny, 2005; Volume 3386. [Google Scholar]
- Sun, G.; Yu, M.; Liao, D.; Chang, V. Analytical exploration of energy savings for parked vehicles to enhance VANET connectivity. IEEE Trans. Intell. Transp. Syst. 2018, 5, 1749–1761. [Google Scholar] [CrossRef]
- Houston City, Texas—Census Bureau Profiles Results. Available online: https://data.census.gov/profile?q=Houston%20city,%20Texas&g=160XX00US4835000 (accessed on 1 April 2024).
- Fan, F.; Liu, L.; Dong, S.; Zhuang, L.; Qiu, J.; Cai, C.; Song, M. Network Performance Test and Analysis of LTE-V2X in Industrial Park Scenario. Wirel. Commun. Mob. Comput. 2020, 2020, 8849610. [Google Scholar] [CrossRef]
Notations | Description |
---|---|
G | Cyclic addition group of elliptic curves |
The order and generator of G | |
System master private and public key of the | |
Private key of | |
The public identity key of | |
The real identity and pseudonym of | |
Private key of | |
The authentication key of | |
Concatenation and XOR operations | |
Secure hash functions | |
The timestamp | |
Symmetric encryption and decryption | |
Asymmetric encryption and decryption |
NO | Private Key | Information |
---|---|---|
… | … | … |
… | … | … |
Common Security Attacks | ||||||||
---|---|---|---|---|---|---|---|---|
Scheme | RSU Private Key Confidentiality | Route Privacy | Traceability | Unlinkability | Sybil | Modification | Replay | Repudiation |
[29] | × | √ | × | × | √ | √ | × | × |
[30] | × | √ | √ | √ | √ | √ | √ | √ |
[31] | × | × | √ | √ | × | × | × | √ |
[32] | × | √ | √ | √ | √ | √ | √ | √ |
Our Scheme | √ | √ | √ | √ | √ | √ | √ | √ |
Notation | Description | Execution Time (ms) |
---|---|---|
One-way hash function operation | 0.016 | |
Hash-to-map hash function operation | 2.851 | |
Point addition operation on ECC | 0.024 | |
Scalar multiplication operation on ECC | 1.064 | |
Power operation | 0.190 | |
Bilinear pairing operation | 5.761 | |
BGN homomorphic addition | 0.283 | |
BGN homomorphic multiplication | 0.632 | |
AES symmetric encryption | 0.018 | |
AES symmetric decryption | 0.016 | |
RSA asymmetric encryption | 0.062 | |
RSA asymmetric decryption | 1.139 | |
ElGamal asymmetric encryption | 0.348 | |
ElGamal asymmetric decryption | 0.239 |
Parameter | Value |
---|---|
Area | 3000 m × 2500 m |
MAC Layer | 802.11 p |
Data Rate | 6 Mb/s |
Broadcast Interval | 1000 m |
Number of Vehicles | 20∼100 |
Vehicle Speed | 3 m/s∼30 m/s |
Simulation Time | 300 s |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gan, Y.; Xie, X.; Liu, Y. A Privacy-Preserving V2I Fast Authentication Scheme in VANETs. Electronics 2024, 13, 2369. https://doi.org/10.3390/electronics13122369
Gan Y, Xie X, Liu Y. A Privacy-Preserving V2I Fast Authentication Scheme in VANETs. Electronics. 2024; 13(12):2369. https://doi.org/10.3390/electronics13122369
Chicago/Turabian StyleGan, Yusheng, Xiaolan Xie, and Yining Liu. 2024. "A Privacy-Preserving V2I Fast Authentication Scheme in VANETs" Electronics 13, no. 12: 2369. https://doi.org/10.3390/electronics13122369
APA StyleGan, Y., Xie, X., & Liu, Y. (2024). A Privacy-Preserving V2I Fast Authentication Scheme in VANETs. Electronics, 13(12), 2369. https://doi.org/10.3390/electronics13122369