RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing

被引:24
作者
Safkhani, Masoumeh [1 ]
Camara, Carmen [2 ]
Peris-Lopez, Pedro [2 ]
Bagheri, Nasour [3 ,4 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran 1678815811, Iran
[2] Carlos III Madrid Univ, Comp Sci Dept, Madrid 28911, Spain
[3] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[4] Inst Res Fundamental Sci IPM, Sch Comp Sci SCS, Tehran, Iran
关键词
Vehicular cloud computing; Authentication; Elliptic curve based cryptography; Security analysis; Tag/reader impersonation; Distance bounding attacks; KEY MANAGEMENT-TECHNIQUES; SECURE DATA-TRANSMISSION; DUAL AUTHENTICATION; INTERNET; FRAMEWORK; SCHEME;
D O I
10.1016/j.vehcom.2020.100311
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
RSEAP is a recently proposed RFID based authentication protocol for vehicular cloud computing whose authors claimed to be secure and efficient. In this article, we challenge these claims. More precisely, we show that RSEAP does not provide the desired security, and it is possible to conduct both tag and reader impersonation attacks efficiently. Besides, despite the use of timestamps, we show how this protocol also suffers from a range of relay attacks. The complexity of any of the proposed attacks is negligible while the success probability is maximum (i.e., the adversary's success probability is '1' since all the proposed attacks are deterministic). To improve the security of RSEAP scheme, we suggest the required patches for fixing the security vulnerabilities mentioned above. We show that the improved protocol, called RSEAP2, is more efficient (computation and communication costs) than the original RSEAP, while provides a higher security level. The security of RSEAP2 is evaluated informally and also formally using the Scyther tool, which is a well-known and automated tool to assess the security of cryptographic protocols. Additionally, we have formally verified the security of the proposed scheme under the Real-or-Random oracle model. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 40 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Ahmed Z., 2018, Cloud Security, DOI DOI 10.4018/978-1-5225-8176-5.CH106
[3]   An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation [J].
Amin, Ruhul ;
Lohani, Paras ;
Ekka, McLican ;
Chourasia, Sunay ;
Vollala, Satyanarayana .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 82
[4]  
[Anonymous], 2017, HDB RES ADV TRENDS M
[5]   Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications [J].
Arfaoui, Amel ;
Kribeche, Ali ;
Senouci, Sidi-Mohammed .
COMPUTER NETWORKS, 2019, 159 :23-36
[6]   Security of Distance-Bounding: A Survey [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Boureanu, Ioana ;
Capkun, Srdjan ;
Hancke, Gerhard ;
Kardas, Suleyman ;
Kim, Chong Hee ;
Lauradoux, Cedric ;
Martin, Benjamin ;
Munilla, Jorge ;
Peinado, Alberto ;
Rasmussen, Kasper Bonne ;
Singelee, Dave ;
Tchamkerten, Aslan ;
Trujillo-Rasua, Rolando ;
Vaudenay, Serge .
ACM COMPUTING SURVEYS, 2019, 51 (05)
[7]   Reply to Comments on "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks" [J].
Azees, Maria .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (09) :3595-3595
[8]  
Blanchet Bruno., 2007, DAGSTUHL SEMINAR FOR, P117
[9]   Vehicular cloud computing: Architectures, applications, and mobility [J].
Boukerche, Azzedine ;
De Grande, Robson E. .
COMPUTER NETWORKS, 2018, 135 :171-189
[10]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13