The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications

被引:7
作者
Baee, Mir Ali Rezazadeh [1 ]
Simpson, Leonie [1 ]
Foo, Ernest [1 ,2 ]
Pieprzyk, Josef [1 ,3 ,4 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Griffith Univ, Sch Informat & Commun Technol, Brisbane, Qld 4111, Australia
[3] CSIRO, Sch Comp Sci, Data61, Marsfield, NSW 2122, Australia
[4] Polish Acad Sci, Inst Comp Sci, PL-01248 Warsaw, Poland
来源
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY | 2023年 / 4卷
基金
澳大利亚研究理事会;
关键词
Protocols; Authentication; Vehicular ad hoc networks; Symbols; Privacy; Australia; Roads; cryptography; known-key attack; message forgery attack; perfect forward secrecy; PRIVACY-PRESERVING AUTHENTICATION; EFFICIENCY; PROTOCOL;
D O I
10.1109/OJVT.2022.3217552
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber-attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure systemkey update protocol to restore the whole system when necessary. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes.
引用
收藏
页码:101 / 113
页数:13
相关论文
共 49 条
[31]  
Menezes A., 1996, Handbook of Applied Cryptography
[32]   Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography [J].
Menezes, Alfred ;
Sarkar, Palash ;
Singh, Shashank .
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 :83-108
[33]  
NXP Semiconductors, ROADLINK SAF5400 SIN
[34]   Continuous authentication for VANET [J].
Palaniswamy, Basker ;
Camtepe, Seyit ;
Foo, Ernest ;
Simpson, Leonie ;
Baee, Mir Ali Rezazadeh ;
Pieprzyk, Josef .
VEHICULAR COMMUNICATIONS, 2020, 25
[35]   Vehicular Communication Systems: Enabling Technologies, Applications, and Future Outlook on Intelligent Transportation [J].
Papadimitratos, Panos ;
de La Fortelle, Arnaud ;
Evenssen, Knut ;
Brignolo, Roberto ;
Cosenza, Stefano .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (11) :84-95
[36]  
Raya M., 2005, Pro- ceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, P11, DOI DOI 10.1145/1102219.1102223
[37]   Authentication strategies in vehicular communications: a taxonomy and framework [J].
Rezazadeh Baee, Mir Ali ;
Simpson, Leonie ;
Boyen, Xavier ;
Foo, Ernest ;
Pieprzyk, Josef .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[38]   A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications [J].
RezazadehBaee, Mir Ali ;
Simpson, Leonie ;
Boyen, Xavier ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (09) :9306-9319
[39]  
Sakemi Y., 2019, INTERNET DRAFT DRAFT
[40]   Trust management in vehicular ad hoc network: a systematic review [J].
Soleymani, Seyed Ahmad ;
Abdullah, Abdul Hanan ;
Hassan, Wan Haslina ;
Anisi, Mohammad Hossein ;
Goudarzi, Shidrokh ;
Baee, Mir Ali Rezazadeh ;
Mandala, Satria .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015,