A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs

被引:34
作者
Nandy, Tarak [1 ]
Idris, Mohd Yamani Idna [1 ,2 ]
Noor, Rafidah Md [1 ,2 ]
Wahab, Ainuddin Wahid Abdul [1 ,2 ]
Bhattacharyya, Sananda [3 ]
Kolandaisamy, Raenu [4 ]
Yahuza, Muktar [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Malaya, Fac Comp Sci & Informat Technol, Ctr Mobile Cloud Comp Res C4MCCR, Kuala Lumpur 50603, Malaysia
[3] Maldives Business Sch, Male 20175, Maldives
[4] UCSI Univ, Inst Comp Sci & Digital Innovat, Kuala Lumpur 56000, Malaysia
关键词
Authentication; Vehicular ad hoc networks; Protocols; Sensors; Security; Elliptic curve cryptography; Privacy; elliptic curve cryptography (ECC); privacy; security; vehicular ad-hoc network (VANET); KEY-EXCHANGE;
D O I
10.1109/JSEN.2021.3097172
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vehicular network is a collection of vehicles and other components facilitated with versatile sensors to communicate, which is backboned by authentication. Present authentication protocols focus on either the lightweight feature or security. On the other hand, privacy during authentication is essential. Moreover, existing schemes are dependent on the trusted authority for checking the legitimacy of a communicating node, which suffers from the infrastructure-less scenario. Alternatively, existing protocols are dependent on a secure communication channel during the registration phase. To address these concerns, an elliptic curve cryptography-based authentication protocol has been designed. Moreover, a secure key establishment is shown in this paper. Pseudo-id-based authentication is used to provide the privacy-preservation on the scheme. On the other hand, symmetric-key cryptography with a session key is used for message encryption during communication. A security analysis on the proposed scheme using the BAN logic and AVISPA shows the protocol's resilience capabilities on various attacks. Alternatively, the mathematical proof of the protocol represents the proof of correctness. Moreover, extensive performance analysis with the existing authentication schemes shows that the proposed algorithm is better in computation cost, communication cost, and energy cost. Lastly, the NS3 simulation shows the packet data transfer among the nodes in the network.
引用
收藏
页码:20998 / 21011
页数:14
相关论文
共 36 条
[21]  
Nandy T., 2020, 2020 NAT C EM TRENDS, DOI [10.1109/ncetstea48365.2020.9119934, DOI 10.1109/NCETSTEA48365.2020.9119934]
[22]   Review on Security of Internet of Things Authentication Mechanism [J].
Nandy, Tarak ;
Bin Idris, Mohd Yamani Idna ;
Noor, Rafidah Md ;
Kiah, Miss Laiha Mat ;
Lun, Lau Sian ;
Juma'at, Nor Badrul Annuar ;
Ahmedy, Ismail ;
Ghani, Norjihan Abdul ;
Bhattacharyya, Sananda .
IEEE ACCESS, 2019, 7 :151054-151089
[23]   NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET [J].
Pournaghi, Seyed Morteza ;
Zahednejad, Behnam ;
Bayat, Majid ;
Farjami, Yaghoub .
COMPUTER NETWORKS, 2018, 134 :78-92
[24]   A Security and Privacy Review of VANETs [J].
Qu, Fengzhong ;
Wu, Zhihui ;
Wang, Fei-Yue ;
Cho, Woong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (06) :2985-2996
[25]   A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET [J].
Rajput, Ubaidullah ;
Abbas, Fizza ;
Eun, Hasoo ;
Oh, Heekuck .
IEEE ACCESS, 2017, 5 :12014-12030
[26]   Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs [J].
Tangade, Shrikant ;
Manvi, Sunilkumar S. ;
Lorenz, Pascal .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) :8647-8655
[27]   Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems [J].
Vangala, Anusha ;
Bera, Basudeb ;
Saha, Sourav ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Park, Youngho .
IEEE SENSORS JOURNAL, 2021, 21 (14) :15824-15838
[28]   A Lightweight Authentication Protocol for V2V Communication in VANETs [J].
Vasudev, Harsha ;
Das, Debasis .
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, :1237-1242
[29]   Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks [J].
Vijayakumar, P. ;
Chang, Victor ;
Deborah, L. Jegatha ;
Balusamy, Balamurugan ;
Shynu, P. G. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :943-955
[30]   Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks [J].
Vijayakumar, Pandi ;
Azees, Maria ;
Chang, Victor ;
Deborah, Jegatha ;
Balusamy, Balamurugan .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03) :2439-2450