4.1. Formal Security Analysis
The stochastic oracular model, proposed by Bellare and Rogaway [
28] in 1993, offers a method for designing protocols that are highly effective. It can be considered the ideal state of the hash function, known as the random oracle model, which possesses three fundamental properties.
Consistency: If the input value is the same, the output must be the same;
Computability: The output will be calculated in polynomial time;
Uniform distribution: The output value space range is evenly distributed. The biggest advantage of this model is that it applies provable security methodology to practical applications.
The steps to verify the security of a scheme using a random oracle model are:
The security of the scheme is formally defined, assuming that an adversary can successfully steal the key with a nonnegligible probability in a probability polynomial of time;
An adversarial algorithm C is established to provide a simulation environment for the adversarial algorithm C. The adversarial algorithm C uses a unique attack method to ask the protocol, and the protocol answers all the questions asked by the opponent;
Try to solve mathematical puzzles with information obtained from your opponent. If the mathematical problem can be solved successfully, it proves that the protocol does not pass the random oracle model verification. If the mathematical problem is not solved successfully, it is proved that the protocol is successfully verified by the random oracle model.
We will choose the random oracle model as the simulation environment and the CK adversarial model as the adversarial algorithm to analyze the security of the whole scheme.
Theorem: Let
be an adversary against a probabilistic polynomial protocol. Adversary A can compromise the semantic security of the protocol through Send queries, Execute queries, and Hash queries. The probability of opponent
’s success is shown in Formula (2), where
represents a set of integers,
denotes the size of the hash function space,
indicates the number of hash queries executed by adversary
, and
represents the number of Send queries executed by adversary
.
Proof. Define a sequence of events, denoted as
through
, where the event
represents a genuine attack with opponent A having no advantage. In event
, opponent A is granted the ability to passively attack and launches passive attacks on both sides. Building upon event
, event
grants opponent A the capability to send queries and initiates active attacks on both sides. Event
enables adversary A to send a Hash query based on event
, which is then utilized by adversary A to make guesses about the values of
and
. Extending from event
, event
empowers adversary A with ESReveal queries and Corrupt queries. Finally, in event
, derived from event
, adversary A gains the ability to send a Test query. Subsequently, adversary A is presented with a mathematical problem related to the CMBDLP hypothesis and the CMBDHP hypothesis. The progression of these events is illustrated in
Figure 8. □
Theorem (differential theorem): R1, R2, R3 denote events in a certain probability distribution. If the equation exists. Then
The following is a detailed description of the to events:
Event
: This event is A simulation of a real attack by adversary A in a random language model. According to the above definition, Formula (3) is derived:
Event
: In this event, opponent A initiates a passive attack by using the Execute
) function to query the interaction information {
} from RC. However, opponent A is unable to obtain the parameter
that RC sends to
during the registration phase. Consequently, adversary A cannot derive the session key solely based on this information, Formula (4) is derived:
Event : First event simulates event and adversary A has the ability to Send an active attack using the SEND query. When peer A sends different Send queries, peer A receives different interaction messages. There are several cases:
For a Send,) query: when received , will select a random number beta and calculate the , , . Finally, , , } to opponent A.
For a Send query: RC calculates , using unlock , and calculate the , and then judge . Next, calculate , The parameter is obtained by unlocking , and calculate the , and then judge . If is equal to the calculated by . Finally, RC sends } to opponent A.
For a Send, query: decrypts with to obtain parameters , and judge . If so, unseal . Finally, sends to opponent A.
For a Send, query: with decryption get parameters , calculate , then judge . If this is true, then is calculated. Finally, sends to opponent A.
For a Send, query: computing , the final inspection .
In this scheme, the random numbers
and
come from the set of positive integers
. According to the birthday paradox theorem, the probability of a collision between two random numbers after sending a
query is
. If a hash query collision occurs, the event ends immediately, and the probability of a hash collision occurring is
, Formula (5) is derived: (the length of each hash value is
)
Event
: If opponent A cannot correctly guess the values of
and
without using the hash oracle query scenario. Then, the event
is the same as the previous event, and Formula (6) is derived:
Event : This event contains concerns about session key security. In addition to inheriting the ability of event , adversary A in event can also obtain and other information through ESReveal query and Corrupt query.
Case 1: Send ESReveal and ESReveal queries: When opponent A sends ESReveal and ESReveal queries, opponent A will get the information in and in . But this information is different in every conversation.
Case 2: Send ESReveal and Corrupt query: When opponent A sends ESReveal and Corrupt queries, opponent A will get in and in .
Case 3: Send Corrupt and ESReveal query: When opponent A sends Corrupt and ESReveal queries. Opponent A will have access to the information in and in .
Case 4: Sending Corrupt and Corrupt queries: When adversary A sends Corrupt and Corrupt queries, adversary A will get the information in and in .
But since the session key is associated with
. When opponent A does not get
or solve CMBDLP and CMBDHP assumptions, opponents will not be able to get A session key. That is, event
is the same as event
as long as the assumptions of CMBDLP and CMBDHP hold. Then we get:
Event
: Event
simulates event
. The opponent A issues a Test query, if your opponent A
query. Then, the Test query for event
terminates. Since the adversary A can obtain
by hash query. The probability that
is obtained by hash query is
. Then, Formula (7) is derived:
The adversary A issues a Test query and makes a guess about the value of b. Then, we get the probability that adversary A guessed correctly, Formula (8) is derived:
Combining the above formula, Formula (9) is derived:
Then the formula follows: there exists a number , such that the inequality holds. That is, in the CK model, the protocol scheme is considered secure.
4.2. Informal Security Analysis
OBU impersonation attack: OBU impersonation attack means that an attacker masquerades as a legitimate vehicle user to obtain information services illegally. First of all, the attacker can forge a login request , including and be RSU and RC validation through. Among them, and are the key information, but from the above introduction of this protocol, we know that they are secure, and the corresponding key is also secure. Therefore, vehicle impersonation attack is not possible in the proposed protocol.
RSU impersonation attack and RC impersonation attack: In order to launch an RSU impersonation attack, the attacker must forge a valid authentication reply information and successfully pass the verification process of vehicle . The keys used by each vehicle and RSU are unique and independently generated by the registration center, with no correlation between them. Without obtaining the key of the target RSU or the key of the vehicle communicating with it, the attacker will be unable to recover or calculate in , thus making it impossible to forge a legitimate reply that can be authenticated by vehicle . Consequently, our proposed protocol effectively mitigates against RSU impersonation attacks. Furthermore, an RC impersonation attack can only be launched if the attacker gains access to the system master key sr. However, this master key is exclusively stored and accessible by the registry center itself. The security of this master key directly determines overall security within our multiserver authentication system framework. It is assumed in this paper that proper measures are taken by the registry center to safeguard this system master key at all times; hence rendering any effective RC masquerading attacks unfeasible.
User privacy protection function: This scheme proposes the random generation of to replace the actual vehicle information identification in the login request information. The dynamic parameter is encrypted using the key . Only a trusted third-party registry RC can compute using the system master key. By utilizing parameters obtained from this calculation, recovery can be unlocked. However, there are only two ways for an attacker to recover the vehicle user key: illegal theft of the system master key or solving an NP problem. It is evident that successful retrieval by attackers is not possible; hence, ensuring anonymity in this proposed protocol. Furthermore, none of the fixed parameters are present in the vehicle login request information , as they are all randomized by parameter α. Therefore, tracing fixed parameters within login information cannot reveal any vehicle-related details. Consequently, this proposed scheme ensures nontraceability.
Offline password guessing attack: In this study, it is assumed that the attacker has obtained of the vehicle through unauthorized means, where . To recover the password in , the attacker must acquire both the vehicle’s ID and password. However, during registration services provided by the registration center (RC), vehicles are required to adhere to specific rules for selecting their identity and password. This inevitably enhances the difficulty for attackers attempting to crack these two crucial parameters. Consequently, our proposed scheme effectively withstands offline password-guessing attacks launched by potential adversaries.
Replay attack: A replay attack occurs when an attacker records or repeats information during network communication with the intention of deceiving the system. In our proposed scheme, we have integrated random numbers and timestamps into the interactive information exchanged between the on-board unit , roadside unit , and registration center (RC). This integration enables any recipient to determine whether a particular piece of information has been replayed or not, thereby effectively filtering out any illicitly replayed data.
Forward security: Forward security means that the leakage of a long-used master key does not lead to the leakage of past session keys. In the proposed scheme, the session key negotiated by the on-board unit and the roadside unit integrates the random numbers generated by them respectively. These two random numbers are generated independently by the on-board unit and the roadside unit , which cannot be obtained by anyone else. The attacker can only calculate SK by . In other words, the session key security of the proposed scheme can be reduced to the computational DH problem, so it satisfies forward security.
Interoperability: The protocol meticulously adheres to and integrates VANET standards, such as IEEE 802.11p [
29] and SAE J2735 [
30], ensuring coherence with industry benchmarks across vital elements like communication protocols, message formats, and data fields. This adherence to standards aims to facilitate the seamless integration of protocols into the existing VANET ecosystem, mitigate compatibility issues among diverse protocols, and enhance the overall system’s stability and maintainability. Simultaneously, to accommodate the resource constraints of the VANET environment, we opted for ECC with a focus on a concise key length. The rationale behind this choice lies in the ability of a short key length to alleviate computational burdens during communication, rendering the protocol more suitable for the resource-limited vehicle communication milieu in VANET while also maintaining compatibility with traditional encryption algorithms.