PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET

被引:8
作者
Awais, Syed Muhammad [1 ]
Yucheng, Wu [1 ]
Mahmood, Khalid [2 ]
Akram, Muhammad Wahid [3 ]
Hussain, Shafiq [4 ]
Das, Ashok Kumar [5 ]
Park, Youngho [6 ]
机构
[1] Chongqing Univ, Sch Microelect & Commun Engn, Chongqing 400044, Peoples R China
[2] Natl Yunlin Univ Sci & Technol, Grad Sch Intelligent Data Sci, Yunlin 64002, Taiwan
[3] Univ Lahore, Dept Software Engn, Lahore 54590, Punjab, Pakistan
[4] Univ Sahiwal, Dept Comp Sci, Sahiwal 57000, Punjab, Pakistan
[5] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Telangana, India
[6] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Protocols; Authentication; Security; Vehicular ad hoc networks; Automobiles; Electronic mail; Privacy; Vehicular Ad-Hoc network (VANET); simultaneous authentication; key agreement; physical unclonable function (PUF); security; simulation; UNCLONABLE FUNCTION; V2V COMMUNICATION; PROTOCOL; INTERNET; EFFICIENT; SCHEME; DESIGN;
D O I
10.1109/TVT.2023.3341693
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The intellectual and immense attainment of a smart city and auto-mobile vehicles are gradually growing. This growth drives Vehicular Ad-Hoc Network (VANET), a broadly operated complex network for inter-vehicular transmission to acquire information relevant to the vehicle location, road condition, traffic congestion, and speed. Generally, this information is procured through an open-source communication, which is susceptible to various security threats. In broad terms, the privacy of data in VANET is considered an imperative task. In this regard, many authentication protocols are formerly initiated for VANET. Most of these protocols are precarious owing to eavesdropping, replay, and impersonation attacks, etc. Furthermore, most existing protocols operates on enormous communication and computation rate, which turns them inadequate for VANET. This paper exhibits a lightweight privacy-preserving authentication protocol for $n$ number of vehicles in VANET using the physical unclonable function (PUF) technique, and offers efficient and secure communication via public channels. Moreover, we evaluate our protocol formally and informally, showing that it is scalable, lightweight, and safe compared to formerly protocols. The rate of computation and communication is less than most related protocols. We also simulate the proposed scheme using the NS-3 simulator to measure its various network performance parameters. As a result, it is apparent through the beheld statistics that the presented protocol is beyond practical, efficient, and reliable for the secure dissemination of information in VANET.
引用
收藏
页码:6727 / 6739
页数:13
相关论文
共 25 条
[1]   A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles [J].
Aman, Muhammad Naveed ;
Javaid, Uzair ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) :1123-1139
[2]   Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges [J].
Bagga, Palak ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2020, 8 :54314-54344
[3]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[4]   An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs [J].
Cui, Jie ;
Wu, Di ;
Zhang, Jing ;
Xu, Yan ;
Zhong, Hong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) :2972-2986
[5]   Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks [J].
Dang, Lanjun ;
Xu, Jie ;
Cao, Xuefei ;
Li, Hui ;
Chen, Jie ;
Zhang, Yueyu ;
Fu, Xiaotong .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (04)
[6]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[7]   Secure Message Communication Protocol Among Vehicles in Smart City [J].
Dua, Amit ;
Kumar, Neeraj ;
Das, Ashok Kumar ;
Susilo, Willy .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) :4359-4373
[8]   A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices [J].
Ebrahimabadi, Mohammad ;
Younis, Mohamed ;
Karimi, Naghmeh .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3684-3703
[9]   A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things [J].
Gope, Prosanta ;
Millwood, Owen ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) :1971-1980
[10]   An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :13621-13630