Abstract
Recently many security protocols have been proposed for road safety applications in Vehicle-to-everything (V2X) communications. Most of them, however, do not fully satisfy the requirements of light-weight and fast processing, which are special properties for V2X. Most of the previous authentication protocols assume that a Certificate Authority (CA) is present within the communication range from all the vehicles, which is not practical for moving vehicles. We propose a light-weight security protocol for authentication and privacy protection for V2X. It employs two security hardware devices, Biometric Device (BD) and Tamper Proof Device (TPD), which verifies the driver and securely keeps the keys, respectively. It decentralizes the CA's tasks by locally generating pseudo-identity and private keys to preserve privacy and provide authentication in Vehicle-to-Vehicle (V2V) communication. In addition, we propose an authentication signature protocol using a notion of hash-chain key generation. We implemented the proposed key generation and authentication protocol using NS-3 simulator. Our extensive simulations demonstrated that the proposed authentication protocol significantly enhances the security level while protecting the conditional privacy of vehicles by utilizing anonymous identities. The proposed protocol has a 20% ~ 85% less communication overhead compared with the previous protocols.
Highlights
Vehicle-to-everything (V2X) is receiving increasing attention due to the recent progress in autonomous driving technologies
Each vehicle is equipped with Onboard Unit (OBU) to communicate with other vehicles and with Road Side Units (RSUs) which are available on the road
ELLIPTIC CURVE AND HASH CHAIN PRELIMINARIES As our proposed solution is based on the elliptic curve cryptography and the Message Authentication Code (MAC) generation using hash chains, we describe the basic operations of them in this subsection
Summary
Vehicle-to-everything (V2X) is receiving increasing attention due to the recent progress in autonomous driving technologies. Kamat et al [13] adopted a new secure pseudonym and identity-based protocol for V2X to provide a high security and authentication level over traditional PKI and symmetric solutions. In [14], Xiaodong lin, et al introduced a privacypreserving and security solution for V2X (GSIS) This protocol is based on identity-based signature and group signatures techniques which provide anonymous and liability authentication but it suffers from a linear increase in the verification time while the number of revoked vehicles increases. The messages construction is based on Elliptic Curve Cryptographic (ECC) security which makes it more efficient and decreases computation rather than using bilinear pairing This protocol supports the installation of TPD devices in each vehicle, it still suffers from modification attacks and system key single point of failure. The use of distinct hash-based random keys for authentication and integrity check can increase the security level and avoid the attacks that compromise the key
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.