A Novel MAC-Based Authentication Scheme (NoMAS) for Internet of Vehicles (IoV)

被引:18
作者
Sikarwar, Himani [1 ]
Das, Debasis [1 ]
机构
[1] Indian Inst Technol IIT, Dept Comp Sci & Engn, Jodhpur 342030, India
关键词
Authentication; Side-channel attacks; Passwords; Internet of Vehicles; Computational modeling; Quality of service; Privacy; Internet of vehicles (IoV); anonymous authentication; privacy preservation; security and privacy in IoV; MAC-based authentication; intelligent transportation system (ITS); KEY AGREEMENT PROTOCOL; LIGHTWEIGHT AUTHENTICATION; DESIGN; EFFICIENT;
D O I
10.1109/TITS.2023.3242291
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The fully dynamic dense environment of the Internet of Vehicles (IoV) and conditions like high traffic jams, collisions, and uneven road conditions increase the communication messages. Consequently, the computation and communication costs of the IoV network are increased. Therefore, IoV needs a lightweight and efficient security solution along with effective communications. Existing state-of-the-art schemes in IoV are generally based on cryptographic methods that use session keys, public keys, elliptic curves, and Message Authentication Codes (MAC). In contrast to the other schemes, MAC-based schemes provide feasible security solutions having high performance with less overhead. The existing MAC-based authentication schemes are vulnerable to the key disclosure issue along with some security attacks such as side-channel attacks, Distributed Denial of Services (DDoS), etc. Due to the side channel attack, a data leakage problem occurs, which is a serious concern in security and privacy facets. We propose a novel MAC-based authentication scheme (NoMAS) that mitigates the above-discussed challenges and provides all the benefits of MAC-based schemes. The NoMAS scheme offers a solution for key disclosure issues by providing Hard Key and Soft Key Updates (HKU and SKU) and data leakage problems using encryption along with high performance. It reduces the computational overhead maximum to 99.60% and the communication overhead maximum to approximately 81% compared to the existing schemes. In the security analysis, We have provided the formal security proof using BAN logic and the ProVerif tool and verified the correctness of the scheme.
引用
收藏
页码:4904 / 4916
页数:13
相关论文
共 30 条
  • [1] Deployment of IoV for Smart Cities: Applications, Architecture, and Challenges
    Ang, Li-Minn
    Seng, Kah Phooi
    Ijemaru, Gerald K.
    Zungeru, Adamu Murtala
    [J]. IEEE ACCESS, 2019, 7 : 6473 - 6492
  • [2] Asl FR, 2017, VEH TECHNOL CONFE
  • [3] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476
  • [4] On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System
    Bagga, Palak
    Das, Ashok Kumar
    Wazid, Mohammad
    Rodrigues, Joel J. P. C.
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) : 1736 - 1751
  • [5] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    [J]. WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743
  • [6] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [7] Routing in Internet of Vehicles: A Review
    Cheng, JiuJun
    Cheng, JunLu
    Zhou, MengChu
    Liu, FuQiang
    Gao, ShangCe
    Liu, Cong
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (05) : 2339 - 2352
  • [8] A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif
    Cheval, Vincent
    Cortier, Veronique
    Turuani, Mathieu
    [J]. IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 344 - 358
  • [9] TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks
    Chuang, Ming-Chin
    Lee, Jeng-Farn
    [J]. IEEE SYSTEMS JOURNAL, 2014, 8 (03): : 749 - 758
  • [10] Ding C., 1996, CHINESE REMAINDER TH