Abstract

Recently many security protocols have been proposed for road safety applications in Vehicle-to-everything (V2X) communications. Most of them, however, do not fully satisfy the requirements of light-weight and fast processing, which are special properties for V2X. Most of the previous authentication protocols assume that a Certificate Authority (CA) is present within the communication range from all the vehicles, which is not practical for moving vehicles. We propose a light-weight security protocol for authentication and privacy protection for V2X. It employs two security hardware devices, Biometric Device (BD) and Tamper Proof Device (TPD), which verifies the driver and securely keeps the keys, respectively. It decentralizes the CA's tasks by locally generating pseudo-identity and private keys to preserve privacy and provide authentication in Vehicle-to-Vehicle (V2V) communication. In addition, we propose an authentication signature protocol using a notion of hash-chain key generation. We implemented the proposed key generation and authentication protocol using NS-3 simulator. Our extensive simulations demonstrated that the proposed authentication protocol significantly enhances the security level while protecting the conditional privacy of vehicles by utilizing anonymous identities. The proposed protocol has a 20% ~ 85% less communication overhead compared with the previous protocols.

Highlights

  • Vehicle-to-everything (V2X) is receiving increasing attention due to the recent progress in autonomous driving technologies

  • Each vehicle is equipped with Onboard Unit (OBU) to communicate with other vehicles and with Road Side Units (RSUs) which are available on the road

  • ELLIPTIC CURVE AND HASH CHAIN PRELIMINARIES As our proposed solution is based on the elliptic curve cryptography and the Message Authentication Code (MAC) generation using hash chains, we describe the basic operations of them in this subsection

Read more

Summary

INTRODUCTION

Vehicle-to-everything (V2X) is receiving increasing attention due to the recent progress in autonomous driving technologies. Kamat et al [13] adopted a new secure pseudonym and identity-based protocol for V2X to provide a high security and authentication level over traditional PKI and symmetric solutions. In [14], Xiaodong lin, et al introduced a privacypreserving and security solution for V2X (GSIS) This protocol is based on identity-based signature and group signatures techniques which provide anonymous and liability authentication but it suffers from a linear increase in the verification time while the number of revoked vehicles increases. The messages construction is based on Elliptic Curve Cryptographic (ECC) security which makes it more efficient and decreases computation rather than using bilinear pairing This protocol supports the installation of TPD devices in each vehicle, it still suffers from modification attacks and system key single point of failure. The use of distinct hash-based random keys for authentication and integrity check can increase the security level and avoid the attacks that compromise the key

Practical Revocation of Misbehavior’s Certificate
Strong Message Integrity
Non-repudiation and Privacy Preservation
Traceability
Periodic Hash Chain Updates
THE PROPOSED PROTOCOL
THE PERIODIC UPDATING OF THE SYSTEM KEY
EFFICIENT VEHICLE REVOCATION PROCESS
SECURITY ANALYSIS OF THE PROPOSED PROTOCOL
COMPUTATION OVERHEAD OF TPD BASED PROTOCOLS
COMMUNICATION OVERHEAD OF TPD BASED PROTOCOLS
OVERHEAD OF BD BASED PROTOCOLS
Findings
VIII. CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.