A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs
Providing efficient anonymous authentication in vehicular ad hoc networks (VANETs) is a challenging issue. Identity-based signature schemes have been used to provide privacy-preserving authentication effectively for VANETs. In such scenario, mutual authentication between vehicles is critical to ensure only legitimate vehicles can involve in the inter-vehicle communication, and how to resist denial-of-service attack should be carefully addressed due to the regionally central signature verification in vehicle-road-side communications. In this paper, we propose a conditional privacy-preserving mutual authentication framework with denial-of-service attack resistance called MADAR. The authentication framework combines different identity-based signature schemes and distinguishes inner-region and cross-region authentications to increase efficiency. Beyond the privacy preservation and non-repudiation achieved by the existing framework, our authentication framework provides asymmetric inter-vehicle mutual authentication and strength-alterable computational DoS-attack resistance. We have formally proved the privacy preservation, unlinkability, mutual authenticity, and correctness of pseudonym with ProVerif, and analyzed other security objectives. The performance evaluations are conducted and the results demonstrate that our framework can achieve these security objectives with moderate computation and communication overheads.
- Research Article
18
- 10.1007/s11277-017-4923-7
- Aug 24, 2017
- Wireless Personal Communications
Vehicular ad hoc network (VANET) is a wireless ad hoc network which is created among vehicles, road side units (RSU) and regional trusted authorities. It provides inter-vehicle communications as well as communication between vehicles and RSUs. An authentication framework has been proposed in order to establish secure communication in VANET environment. Privacy of the vehicles has to be ensured in the network, which avoids misuse of private data. Self-generated public key cryptography based pseudo IDs are used instead of original IDs of vehicles for privacy preservation. The proposed scheme uses id-based signature (IBS) and ID-based online/offline signature (IBOOS) scheme for authentication purpose. Communication between vehicles and RSUs are authenticated using IBS scheme and IBOOS scheme authenticates communication between vehicles. By using these schemes, communication among vehicles under different RSUs and RTAs are also authenticated. Security attacks based on authentication like impersonation attack, Sybil attack are also resolved and the malicious nodes are isolated from the network. Vehicle-to-vehicle authentication without RSUs is also carried out by using RSA algorithm. Finally, the performance of the system is compared with recent schemes. Simulation results show that the proposed scheme provides secure communication among vehicles in the network with less communication and computation overhead.
- Research Article
246
- 10.1109/tpds.2014.2308215
- Apr 1, 2015
- IEEE Transactions on Parallel and Distributed Systems
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their private data and the attacks on their privacy, as well as to be capable of being investigated for accidents or liabilities from non-repudiation. In this paper, we investigate the authentication issues with privacy preservation and non-repudiation in VANETs. We propose a novel framework with preservation and repudiation (ACPN) for VANETs. In ACPN, we introduce the public-key cryptography (PKC) to the pseudonym generation, which ensures legitimate third parties to achieve the non-repudiation of vehicles by obtaining vehicles' real IDs. The self-generated PKCbased pseudonyms are also used as identifiers instead of vehicle IDs for the privacy-preserving authentication, while the update of the pseudonyms depends on vehicular demands. The existing ID-based signature (IBS) scheme and the ID-based online/offline signature (IBOOS) scheme are used, for the authentication between the road side units (RSUs) and vehicles, and the authentication among vehicles, respectively. Authentication, privacy preservation, non-repudiation and other objectives of ACPN have been analyzed for VANETs. Typical performance evaluation has been conducted using efficient IBS and IBOOS schemes. We show that the proposed ACPN is feasible and adequate to be used efficiently in the VANET environment.
- Research Article
6
- 10.3837/tiis.2019.12.018
- Dec 31, 2019
- KSII Transactions on Internet and Information Systems
Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads.In this paper, we proposed a robust conditional privacypreserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads.In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym.Therefore, OBU does not need to enlarge its storage.In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads.The proposed scheme has lightweight mutual authentication among all parties and just for once.Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks.We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes.The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.
- Conference Article
69
- 10.1109/comcomap.2012.6154869
- Jan 1, 2012
In Vehicular Ad hoc Networks (VANETs), authentication is a crucial security requirement to avoid attacks to both inter-vehicle and vehicle-roadside communication. Vehicles have to be prevented from the misuse of their private data and the attacks on their privacy. In this paper, we investigate the authentication and privacy issues in VANETs. We propose a novel ID-based authentication framework with adaptive privacy preservation for VANETs. In this framework, adaptive self-generated pseudonyms are used as identifiers instead of real-world IDs. The update of the pseudonyms depends on vehicular demands. The ID-Based Signature (IBS) scheme and the ID-Based Online/Offline Signature (IBOOS) scheme are used, for authentication between the Road Side Units (RSUs) and vehicles, as well as authentication among vehicles, respectively. System evaluation has been executed using efficient IBS and IBOOS schemes. It shows that, the proposed authentication framework with privacy preservation is suitable to the VANET environment.
- Research Article
31
- 10.1016/j.vehcom.2019.100200
- Oct 14, 2019
- Vehicular Communications
Secure mutual authentication with privacy preservation in vehicular ad hoc networks
- Book Chapter
1
- 10.1007/978-981-10-8575-8_10
- Jan 1, 2018
Authentication is one the important parameters in designing security for vehicular ad hoc network (VANET). Authentication protocols based on public key infrastructure (PKI), elliptical curve digital signature algorithm (ECDSA) suffer from overhead problem at the road side unit (RSU) and extracting of certificates from the trusted authority. Traditional identity-based signature scheme is used to provide the privacy and authenticate the vehicle-to-vehicle communication and vehicle-to-road side unit of the VANET. ID-based signature scheme employs elliptic curve cryptosystem form authentication process and also provides batch message verification mechanism. ECC-based traditional scheme requires 160-bit key size to encrypt the message transferred between RSU and vehicle. It requires large memory space as well as consumes more energy and leads to high communication and computational overhead. In order to overcome the above-mentioned limitation, a new lightweight privacy-aware secure authentication scheme is proposed for VANET. The proposed authentication scheme employs the advantage of hyperelliptic curve cryptosystem to sign the message transferred between RSU and vehicle. Since HECC requires lesser 80-bit key size than the traditional signature scheme, it provides greater level of security with less communication and computational overhead. It also traces the real identity of the vehicle using pseudo-identities which eliminates the process of extracting the certificates from the trusted authority. Finally, compare the performance analysis of both traditional and proposed ID-based signature scheme using the different simulation parameters.
- Research Article
31
- 10.1109/tits.2014.2302296
- Aug 1, 2014
- IEEE Transactions on Intelligent Transportation Systems
To support the high mobility of vehicles, the Internet Engineering Task Force (IETF) defines proxy mobile IPv6 (PMIPv6) to reduce the signaling overhead. However, the design of PMIPv6 does not thoroughly consider security issues, such as man-in-the-middle and impersonation attacks. Moreover, the traditional authentication/authorization/accounting (AAA) server architecture in PMIPv6 could impede the localized advantage because of the long-distance delivery between a mobile access gateway (MAG) and the AAA server. In practice, the billing is a crucial issue that is, unfortunately, rarely discussed in vehicular ad hoc networks (VANETs). In this paper, a local-based authentication and billing scheme is proposed to lessen the long-distance communication overhead. An incentive-aware multihop forwarding procedure is also offered to stimulate the help of forwarding others' messages in a vehicle-to-vehicle (V2V) environment. Therefore, the proposed billing scheme is designed for full VANETs, including the vehicle-to-infrastructure (V2I) and V2V environments. Lightweight keyed hash functions and batch verification are employed for efficient computation and concise communication overhead. Only a few signatures are used in the first message to ensure the nonrepudiation payment approval. Security analysis and performance evaluation show that the proposed scheme is secure and efficient, compared with a conventional public-key based scheme. The advantages of the proposed scheme include: 1) mutual authentication and session key agreement; 2) privacy preservation; 3) confidentiality, integrity, free-riding resistance, double-spending avoidance, and nonrepudiation properties; and 4) efficient billing and payment clearance.
- Research Article
46
- 10.1016/j.adhoc.2014.01.011
- Feb 4, 2014
- Ad Hoc Networks
S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks
- Research Article
10
- 10.1155/2021/3400558
- Jan 1, 2021
- Wireless Communications and Mobile Computing
The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle‐to‐vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect, and resultantly, the scheme does not provide mutual authentication between a vehicle and vehicle server when multiple vehicles are registered with the vehicle sever. Furthermore, this paper proposes a secure message transmission scheme for V2V in VANETs. The proposed scheme fulfills the security and performance requirements of VANETs. The security analysis of the proposed scheme using formal BAN and informal discussion on security features confirm that the proposed scheme fulfills the security requirements, and the performance comparisons show that the proposed scheme copes with the lightweightness requirements of VANETs.
- Research Article
19
- 10.1016/j.comnet.2019.106899
- Sep 9, 2019
- Computer Networks
ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks
- Research Article
10
- 10.7717/peerj-cs.519
- May 4, 2021
- PeerJ Computer Science
Vehicular ad-hoc networks (VANETs) play an essential role in the development of the intelligent transportation system (ITS). VANET supports many types of applications that have strict time constraints. The communication and computational overheads are minimal for these computations and there are many security requirements that should be maintained. We propose an efficient message authentication system with a privacy preservation protocol. This protocol reduces the overall communication and computational overheads. The proposed protocol consists of three main phases: the group registration phase, send/receive messages phase, and the leave/join phase. For cryptography algorithms, we combined symmetric and asymmetric key algorithms. The symmetric key was generated and exchanged without using the Diffie–Hellman (DH) protocol. Furthermore, we used an efficient version of the RSA algorithm called CRT-RSA. The experimental results showed that the computational overhead in the registration phase was significantly reduced by 91.7%. The computational overhead for sending and receiving the non-safety message phase was reduced by 41.2% compared to other existed protocols. Moreover, our results showed that the time required to broadcast a safety and non-safety group message was below 100 ms and 150 ms, respectively. The average computational time of sending and receiving a one-to-one message was also calculated. The proposed protocol was also evaluated with respect to performance and security and was shown to be invulnerable to many security attacks.
- Research Article
15
- 10.3390/s22114019
- May 26, 2022
- Sensors (Basel, Switzerland)
In recent decades, Vehicular Ad Hoc Networks (VANET) have emerged as a promising field that provides real-time communication between vehicles for comfortable driving and human safety. However, the Internet of Vehicles (IoV) platform faces some serious problems in the deployment of robust authentication mechanisms in resource-constrained environments and directly affects the efficiency of existing VANET schemes. Moreover, the security of the information becomes a critical issue over an open wireless access medium. In this paper, an efficient and secure lightweight anonymous mutual authentication and key establishment (SELWAK) for IoT-based VANETs is proposed. The proposed scheme requires two types of mutual authentication: V2V and V2R. In addition, SELWAK maintains secret keys for secure communication between Roadside Units (RSUs). The performance evaluation of SELWAK affirms that it is lightweight in terms of computational cost and communication overhead because SELWAK uses a bitwise Exclusive-OR operation and one-way hash functions. The formal and informal security analysis of SELWAK shows that it is robust against man-in-the-middle attacks, replay attacks, stolen verifier attacks, stolen OBU attacks, untraceability, impersonation attacks, and anonymity. Moreover, a formal security analysis is presented using the Real-or-Random (RoR) model.
- Research Article
10
- 10.1016/j.vehcom.2024.100727
- Jan 19, 2024
- Vehicular Communications
An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs
- Book Chapter
2
- 10.1007/978-3-642-35615-5_64
- Jan 1, 2012
To provide authentication in Vehicular Ad-Hoc Network (VANET), a cost effective and communication efficient distributed key management framework based on dynamic decentralized group key agreement is proposed. In VANET, the critical issue is exchanging the safety related information such as warning about curves, sharp turns, speed limit and other related information between the vehicles. The proposed Group Secret Key Protocol (GSKP) is a promising security scheme to provide privacy by offering authentication between vehicles in VANET. In this framework, each Road Side Unit (RSU) dynamically generates the GSK and securely distributes the key to the OBUs of Vehicle. By using this GSK, the vehicles can interactively exchanging the safety related information without doing authentication for each communication. GSK is generated dynamically based on the share taken from each vehicle, so the GSK is distributed to only the valid set of vehicles. This technology ensures the dynamic nature in the way that whenever new vehicle comes in to the group or existing member goes out of the group the new GSK is generated. In addition, cooperative verifiers are intelligently selected to significantly reduce the computation and communication overhead.
- Research Article
767
- 10.1109/tifs.2015.2473820
- Dec 1, 2015
- IEEE Transactions on Information Forensics and Security
By broadcasting messages about traffic status to vehicles wirelessly, a vehicular ad hoc network (VANET) can improve traffic safety and efficiency. To guarantee secure communication in VANETs, security and privacy issues must be addressed before their deployment. The conditional privacy-preserving authentication (CPPA) scheme is suitable for solving security and privacy-preserving problems in VANETs, because it supports both mutual authentication and privacy protection simultaneously. Many identity-based CPPA schemes for VANETs using bilinear pairings have been proposed over the last few years to enhance security or to improve performance. However, it is well known that the bilinear pairing operation is one of the most complex operations in modern cryptography. To achieve better performance and reduce computational complexity of information processing in VANET, the design of a CPPA scheme for the VANET environment that does not use bilinear paring becomes a challenge. To address this challenge, we propose a CPPA scheme for VANETs that does not use bilinear paring and we demonstrate that it could supports both the mutual authentication and the privacy protection simultaneously. Our proposed CPPA scheme retains most of the benefits obtained with the previously proposed CPPA schemes. Moreover, the proposed CPPA scheme yields a better performance in terms of computation cost and communication cost making it be suitable for use by the VANET safety-related applications.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.