Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks

被引:25
作者
Al-Shareeda, Mahmood A. [1 ]
Manickam, Selvakumar [1 ]
Mohammed, Badiea Abdulkarem [2 ]
Al-Mekhlafi, Zeyad Ghaleb [2 ]
Qtaish, Amjad [2 ]
Alzahrani, Abdullah J. [2 ]
Alshammari, Gharbi [2 ]
Sallam, Amer A. [3 ]
Almekhlafi, Khalil [4 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, Usm 11800, Penang, Malaysia
[2] Univ Hail, Coll Comp Sci & Engn, Hail 81481, Saudi Arabia
[3] Taiz Univ, Engn & Informat Technol Coll, Taizi 6803, Yemen
[4] Taibah Univ, CBA Yanbu, Al Madinah 42353, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 12期
关键词
Chebyshev polynomial; side-channel attacks; 5G-enabled vehicular networks; semi-group; privacy and security; chaotic map; KEY AGREEMENT; PRIVACY; AUTHENTICATION; SECURITY; PROTOCOL;
D O I
10.3390/app12125939
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks are often required to cope with schemes based on either bilinear pair cryptography (BPC) or elliptic curve cryptography (ECC). Nevertheless, these schemes suffer from massively inefficient performance related to signing and verifying messages in areas of the high-density traffic stream. Meanwhile, adversaries could launch side-channel attacks to obtain sensitive data protected in a tamper-proof device (TPD) to destroy the system. This paper proposes a Chebyshev polynomial-based scheme for resisting side-channel attacks in 5G-enabled vehicular networks. Our work could achieve both important properties of the Chebyshev polynomial in terms of chaotic and semi-group. Our work consists of five phases: system initialization, enrollment, signing, verification, and pseudonym renew. Moreover, to resist side-channel attacks, our work renews periodically and frequently the vehicle's information in the TPD. Security analysis shows that our work archives the privacy (pseudonym identity and unlikability) and security (authentication, integrity, and traceability) in 5G-enabled vehicular networks. Finally, our work does not employ the BPC or the ECC; its efficiency performance outperforms other existing recent works, making it suitable for use in vehicular networks.
引用
收藏
页数:17
相关论文
共 36 条
[1]   A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Manickam, Selvakumar ;
Hasbullah, Iznan H. .
SENSORS, 2022, 22 (05)
[2]   Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Manickam, Selvakumar ;
Hasbullah, Iznan H. .
APPLIED SCIENCES-BASEL, 2022, 12 (03)
[3]   SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Manickam, Selvakumar ;
Hasbullah, Iznan H. .
SENSORS, 2021, 21 (24)
[4]   Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Manickam, Selvakumar ;
Khalil, Ayman ;
Hasbullah, Iznan Husainy .
IEEE ACCESS, 2021, 9 :121522-121531
[5]  
Alazzawi Murtadha A, 2020, Revised Selected Papers, P80
[6]  
Alimohammadi M, 2015, 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), P23, DOI 10.1109/ISCISC.2015.7387893
[7]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[8]  
Asghar M, 2018, 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P113
[9]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[10]  
Chiti Francesco., 2017, 5G Mobile Communications, P625, DOI DOI 10.1007/978-3-319-34208-523