A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs

被引:34
作者
Nandy, Tarak [1 ]
Idris, Mohd Yamani Idna [1 ,2 ]
Noor, Rafidah Md [1 ,2 ]
Wahab, Ainuddin Wahid Abdul [1 ,2 ]
Bhattacharyya, Sananda [3 ]
Kolandaisamy, Raenu [4 ]
Yahuza, Muktar [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Malaya, Fac Comp Sci & Informat Technol, Ctr Mobile Cloud Comp Res C4MCCR, Kuala Lumpur 50603, Malaysia
[3] Maldives Business Sch, Male 20175, Maldives
[4] UCSI Univ, Inst Comp Sci & Digital Innovat, Kuala Lumpur 56000, Malaysia
关键词
Authentication; Vehicular ad hoc networks; Protocols; Sensors; Security; Elliptic curve cryptography; Privacy; elliptic curve cryptography (ECC); privacy; security; vehicular ad-hoc network (VANET); KEY-EXCHANGE;
D O I
10.1109/JSEN.2021.3097172
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vehicular network is a collection of vehicles and other components facilitated with versatile sensors to communicate, which is backboned by authentication. Present authentication protocols focus on either the lightweight feature or security. On the other hand, privacy during authentication is essential. Moreover, existing schemes are dependent on the trusted authority for checking the legitimacy of a communicating node, which suffers from the infrastructure-less scenario. Alternatively, existing protocols are dependent on a secure communication channel during the registration phase. To address these concerns, an elliptic curve cryptography-based authentication protocol has been designed. Moreover, a secure key establishment is shown in this paper. Pseudo-id-based authentication is used to provide the privacy-preservation on the scheme. On the other hand, symmetric-key cryptography with a session key is used for message encryption during communication. A security analysis on the proposed scheme using the BAN logic and AVISPA shows the protocol's resilience capabilities on various attacks. Alternatively, the mathematical proof of the protocol represents the proof of correctness. Moreover, extensive performance analysis with the existing authentication schemes shows that the proposed algorithm is better in computation cost, communication cost, and energy cost. Lastly, the NS3 simulation shows the packet data transfer among the nodes in the network.
引用
收藏
页码:20998 / 21011
页数:14
相关论文
共 36 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Hasbullah, Iznan Husainy ;
Manickam, Selvakumar .
IEEE SENSORS JOURNAL, 2021, 21 (02) :2422-2433
[3]   An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs [J].
Ali, Ikram ;
Li, Fagen .
VEHICULAR COMMUNICATIONS, 2020, 22
[4]   A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks [J].
Asaar, Maryam Rajabzadeh ;
Salmasizadeh, Mahmoud ;
Susilo, Willy ;
Majidi, Akbar .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) :5409-5423
[5]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[6]   Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network [J].
Balaji, N. Alangudi ;
Sukumar, R. ;
Parvathy, M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2019, 76 :94-110
[7]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[8]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[9]   Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment [J].
Cui, Jie ;
Zhang, Xiaoyu ;
Zhong, Hong ;
Zhang, Jing ;
Liu, Lu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) :1654-1667
[10]   Secure mutual authentication with privacy preservation in vehicular ad hoc networks [J].
Cui, Jie ;
Xu, Wenyu ;
Han, Yibo ;
Zhang, Jing ;
Zhong, Hong .
VEHICULAR COMMUNICATIONS, 2020, 21