Modeling and Verifying Privacy-Preserving Authentication Scheme for VANET Using CSP

被引:0
作者
Qin, Ning [1 ]
Mao, Hongyan [1 ]
Liu, Yiwen [1 ]
Chen, Kai [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
来源
2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC | 2023年
基金
中国国家自然科学基金;
关键词
VANET; privacy-preserving authentication; formal verification; CSP;
D O I
10.1109/COMPSAC57700.2023.00103
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As an important part of intelligent traffic, Vehicle Ad hoc Network (VANET) is extensively applied which can provide secure communication mechanisms. Due to the necessity of security in VANET, a privacy-preserving mutual authentication scheme was proposed to ensure secure communication for the entities, however, this scheme has not been verified from the formalization view. In this paper, we propose and formally model the privacy-preserving mutual authentication scheme with the man-in-middle attack using Communication Sequential Process (CSP). Five properties are defined and verified including data availability for components, conditional privacy preservation, data confidentiality, data integrity and traceability based on the Process Analysis Toolkit (PAT). Initially, the results of verification indicate that this scheme cannot satisfy data confidentiality, data integrity and traceability. To enhance the security mechanism, two improved approaches are proposed to support the security of this scheme, which adopt the special encryption strategy and change the original checksum. The results of the new verification show that all properties are satisfied and the secure communication is guaranteed.
引用
收藏
页码:747 / 752
页数:6
相关论文
共 15 条
[1]  
Al-shareeda Mahmood A., 2021, 2021 International Conference on Advanced Computer Applications (ACA), P156, DOI 10.1109/ACA52198.2021.9626779
[2]   NERA: A new and efficient RSU based authentication scheme for VANETs [J].
Bayat, Majid ;
Pournaghi, Morteza ;
Rahimi, Majid ;
Barmshoory, Mostafa .
WIRELESS NETWORKS, 2020, 26 (05) :3083-3098
[3]   COMMUNICATING SEQUENTIAL PROCESSES [J].
HOARE, CAR .
COMMUNICATIONS OF THE ACM, 1978, 21 (08) :666-677
[4]   Formal Verification and Improvement of the PKMv3 Protocol Using CSP [J].
Jiang, Jinpeng ;
Mao, Hongyan ;
Shaol, Rumeng ;
Xu, Yuanmin .
2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, :682-687
[5]  
Li R., 2020, P INT C SOFTWARE ENG, V2440, P1
[6]  
Li R., 2020, P INT C SOFTWARE ENG, P1
[7]   A privacy-preserving mutual authentication scheme for group communication in VANET [J].
Nath, Himun Jyoti ;
Choudhury, Hiten .
COMPUTER COMMUNICATIONS, 2022, 192 :357-372
[8]  
pat comp nus edu sg, PAT PESS AN TOOLK
[9]  
Roscoe AW, 2010, TEXTS COMPUT SCI, P3, DOI 10.1007/978-1-84882-258-0_1
[10]   Modeling and Verifying Intelligent Unit Transmission Protocol Using CSP Model Checker PAT [J].
Shao Zhipeng ;
Hao HanYong ;
Ma Yuanyuan ;
Wang Chen ;
Fei Jiaxuan .
2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2016), 2016, :244-251