The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications

被引:7
作者
Baee, Mir Ali Rezazadeh [1 ]
Simpson, Leonie [1 ]
Foo, Ernest [1 ,2 ]
Pieprzyk, Josef [1 ,3 ,4 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Griffith Univ, Sch Informat & Commun Technol, Brisbane, Qld 4111, Australia
[3] CSIRO, Sch Comp Sci, Data61, Marsfield, NSW 2122, Australia
[4] Polish Acad Sci, Inst Comp Sci, PL-01248 Warsaw, Poland
来源
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY | 2023年 / 4卷
基金
澳大利亚研究理事会;
关键词
Protocols; Authentication; Vehicular ad hoc networks; Symbols; Privacy; Australia; Roads; cryptography; known-key attack; message forgery attack; perfect forward secrecy; PRIVACY-PRESERVING AUTHENTICATION; EFFICIENCY; PROTOCOL;
D O I
10.1109/OJVT.2022.3217552
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber-attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure systemkey update protocol to restore the whole system when necessary. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes.
引用
收藏
页码:101 / 113
页数:13
相关论文
共 49 条
[1]  
Abdalla M., 1999, IACR Cryptol. ePrint Arch., V1999, P7
[2]  
[Anonymous], 2003, OpenSSL: The Open Source toolkit for SSL/ TLS
[3]  
[Anonymous], 2017, IEEE STD 16092A 2017, P1, DOI [DOI 10.1109/IEEESTD.2017.8055462, DOI 10.1109/IEEESTD.2017]
[4]  
[Anonymous], 2000, PKCS 5 PASSWORD BASE
[5]  
Baee M. A. R., 2021, PhD thesis
[6]  
Baee M.A.R., 2014, Master's thesis
[7]   ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption [J].
Baee, Mir Ali Rezazadeh ;
Simpson, Leonie ;
Boyen, Xavier ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) :1799-1817
[8]   On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! [J].
Baee, Mir Ali Rezazadeh ;
Simpson, Leonie ;
Boyen, Xavier ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) :3678-3693
[9]   Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2 [J].
Baee, Mir Ali Rezazadeh ;
Simpson, Leonie ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (12) :11577-11587
[10]  
Barreto PSLM, 2006, LECT NOTES COMPUT SC, V3897, P319