Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV"

被引:15
作者
Ahmim, Ilyes [1 ]
Ghoualmi-Zine, Nacira [1 ]
Ahmim, Ahmed [1 ,2 ]
Ahmim, Marwa [1 ]
机构
[1] Badji Mokhtar Annaba Univ, Networks & Syst Lab LRS, Annaba, Algeria
[2] Mohamed Cherif Messaadia Univ Souk Ahras, Souk Ahras, Algeria
关键词
Internet of vehicles (IoV); Security protocol; Authentication protocol; Session-key agreement; Cryptanalysis; INTERNET; CHALLENGES;
D O I
10.1007/s10207-022-00595-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the Internet of Things has enriched the network field with new themes, among which we find the Internet of Vehicles (IoV). IoV improved the various smart traffic applications for management or security. It makes vehicles autonomously deal with the unexpected by sharing various resources like critical information, computing resources, etc. Nonetheless and as a user of current network technologies, IoV suffers from the same vulnerabilities of these technologies, which makes it vulnerable to various kinds of attacks that affect security and privacy. To overcome these new challenges, researchers have considered different IoV authentication protocols. However, most of them are compromised and contain real security problems. Dealing with IoV authentication protocol security flaws is a real challenge. Recently, Jiang et al. (Comput Commun 173:45-55, 2021) designed a three-factor authentication protocol for IoV environment. The proposed protocol combines lightweight operations that include elliptic curve cryptography, hash function, physically unclonable function, concatenation on one side, and XOR operation on the other side. Contrariwise, it contains several flaws. In this paper, we detailed the security analysis of Jiang et al. protocol that proves the limit of security guarantees between only user and data center due to the possibility for an adversary to deduce a session key shared between vehicle sensor and data center and between vehicle sensor and user. Moreover, regarding these limitations, we propose an improvement to remedy all the said security pitfalls.
引用
收藏
页码:1019 / 1026
页数:8
相关论文
共 13 条
[1]   Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0" [J].
Akram, Muhammad Arslan ;
Mahmood, Khalid ;
Kumari, Saru ;
Xiong, Hu .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4676-4681
[2]   Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures [J].
Butun, Ismail ;
Osterberg, Patrik ;
Song, Houbing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :616-644
[3]   Accessibility Analysis and Modeling for IoV in an Urban Scene [J].
Cheng, Jiujun ;
Yuan, Guiyuan ;
Zhou, Mengchu ;
Gao, Shangce ;
Liu, Cong ;
Duan, Hua ;
Zeng, QingTian .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (04) :4246-4256
[4]   Three-factor authentication protocol using physical unclonable function for IoV [J].
Jiang, Qi ;
Zhang, Xin ;
Zhang, Ning ;
Tian, Youliang ;
Ma, Xindi ;
Ma, Jianfeng .
COMPUTER COMMUNICATIONS, 2021, 173 :45-55
[5]   Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication" [J].
Mahmood, Khalid ;
Shamshad, Salman ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Obaidat, Mohammad S. .
IEEE SYSTEMS JOURNAL, 2021, 15 (01) :1366-1368
[6]   Security and Privacy Challenges in Connected Vehicular Cloud Computing [J].
Masood, Arooj ;
Lakew, Demeke Shumeye ;
Cho, Sungrae .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04) :2725-2764
[7]   Internet of Vehicles: Key Technologies, Network Model, Solutions and Challenges With Future Aspects [J].
Qureshi, Kashif Naseer ;
Din, Sadia ;
Jeon, Gwanggil ;
Piccialli, Francesco .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (03) :1777-1786
[8]   Security Analysis on "A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems" [J].
Saleem, Muhammad Asad ;
Shamshad, Salman ;
Ahmed, Shafiq ;
Ghaffar, Zahid ;
Mahmood, Khalid .
IEEE SYSTEMS JOURNAL, 2021, 15 (04) :5557-5559
[9]   Comments on "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment" [J].
Saleem, Muhammad Asad ;
Mahmood, Khalid ;
Kumari, Saru .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4671-4675
[10]   Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC" [J].
Shamshad, Salman ;
Mahmood, Khalid ;
Kumari, Saru ;
Khan, Muhammad Khurram .
IEEE SYSTEMS JOURNAL, 2021, 15 (01) :877-880