NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

被引:5
作者
Kumar, Pankaj [1 ]
Om, Hari [1 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Mutual authentication; Security; Conditional privacy; V2I communication; V2V communication; (2 n)-threshold; PROTOCOL; ANONYMITY; SECURITY; INTERNET; DESIGN;
D O I
10.1016/j.comcom.2023.11.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing end-to-end communication in Vehicular Ad-hoc Networks (VANET) is crucial due to zero trust between the communicating entities. Additionally, the underlying communication needs to be lightweight in many cases, especially when vehicles are moving at high speeds or deploying applications like Vehicular Sensor Networks (VSN) and next-generation vehicular networks with densely deployed small-cells and micro-cells. The traditional VANET facilitates two types of communication: Vehicle-to-Infrastructure (V2I) communication to establish trust between a Vehicle User (Vi) and roadside infrastructure, followed by Vehicle-to-Vehicle communication for information exchange. Unlike existing protocols that encounter security issues and high authentication delay as they require communication with a Trusted Authority (TA) every time Vi needs authentication or re-authentication, we present a symmetric key-based an authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme, called NextGenV2V. In NextGenV2V, authentication of a newly visited Vi is performed with the help of TA, but re-authentication of a pre-authenticated Vi is done without the support of TA. This significantly reduces communication overhead during re-authentication and improves the overall authentication delay. NextGenV2V is designed in such a way that at least 2 out of n registered vehicle users must cooperate to compute a shared secret key. This feature ensures improved security, as attackers cannot breach the system's security unless two or more vehicles are compromised. Furthermore, considering that an attacker cannot physically be present in more than one location simultaneously, the system's security remains intact even if a current vehicle is compromised. The proposed protocol is also verified to resist known security attacks, both formally and informally. To demonstrate the effectiveness of NextGenV2V, a comparative performance analysis is presented that proves its suitability for next-generation vehicular networks.
引用
收藏
页码:296 / 308
页数:13
相关论文
共 44 条
  • [1] 3GPP, 2010, Tech. Rep.
  • [2] Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
    Abdel Hakeem, Shimaa A.
    Kim, HyungWon
    [J]. SENSORS, 2022, 22 (01)
  • [3] Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
    Alazzawi, Murtadha A.
    Lu, Hongwei
    Yassin, Ali A.
    Chen, Kai
    [J]. IEEE ACCESS, 2019, 7 : 71424 - 71435
  • [4] Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey
    Ali, Ikram
    Hassan, Alzubair
    Li, Fagen
    [J]. VEHICULAR COMMUNICATIONS, 2019, 16 : 45 - 61
  • [5] [Anonymous], 2013, document 3GPP TR 36.872
  • [6] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [7] A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network
    Azam, Farooque
    Yadav, Sunil Kumar
    Priyadarshi, Neeraj
    Padmanaban, Sanjeevikumar
    Bansal, R. C.
    [J]. IEEE ACCESS, 2021, 9 : 31309 - 31321
  • [8] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [9] V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs
    Chang, Che-Yu
    Yen, Hsu-Chun
    Deng, Der-Jiunn
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (01) : 5 - 17
  • [10] Securing the anonymity of content providers in the World Wide Web
    Demuth, T
    Rieke, A
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 494 - 502