A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles

被引:105
作者
Aman, Muhammad Naveed [1 ]
Javaid, Uzair [2 ]
Sikdar, Biplab [2 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117576, Singapore
关键词
Protocols; Authentication; Roads; Logic gates; Vehicular ad hoc networks; Internet of Things; Internet of Vehicles (IoV); physical unclonable functions (PUFs); privacy; vehicular < italic xmlns:ali="http:; www; niso; org; schemas; ali; 1; 0; xmlns:mml="http:; w3; 1998; Math; MathML" xmlns:xlink="http:; 1999; xlink" xmlns:xsi="http:; 2001; XMLSchema-instance"> ad hoc <; italic > network (VANETs); SECURITY; IOT; BLOCKCHAIN; EFFICIENT;
D O I
10.1109/JIOT.2020.3010893
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most important and critical requirements for the Internet of Vehicles (IoV) is security under strict latency. Typically, authentication protocols for vehicular <italic>ad hoc</italic> networks need to authenticate themselves frequently. This results in reduced application traffic and increased overhead. Moreover, the mobile nature of vehicles makes them a prime target for physical, side channel, and cloning attacks. To address these issues, this article presents an efficient protocol for authentication in the IoV. The proposed protocol uses physical unclonable functions to provide the desired security characteristics. To reduce the overhead of authentication and improve the throughput of application layer packets, the proposed protocol uses a three-layered infrastructure architecture for IoVs, i.e., roadside units (RSUs), RSU gateways, and trusted authority. A vehicle needs to authenticate only once when it enters the area of an RSU gateway which may engulf multiple RSUs. A performance analysis of the protocol shows that the proposed strategy significantly reduces the number of authentication packets and MAC/PHY overhead while the security analysis demonstrates its robustness against various types of attacks.
引用
收藏
页码:1123 / 1139
页数:17
相关论文
共 54 条
[1]  
Aman M. N., PROVERIF SIMULATION
[2]   A Lightweight Protocol for Secure Data Provenance in the Internet of Things Using Wireless Fingerprints [J].
Aman, Muhammad Naveed ;
Basheer, Mohamed Haroon ;
Sikdar, Biplab .
IEEE SYSTEMS JOURNAL, 2021, 15 (02) :2948-2958
[3]   HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability [J].
Aman, Muhammad Naveed ;
Basheer, Mohamed Haroon ;
Dash, Siddhant ;
Wong, Jun Wen ;
Xu, Jia ;
Lim, Hoon Wei ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) :7220-7233
[4]   Data Provenance for IoT With Light Weight Authentication and Privacy Preservation [J].
Aman, Muhammad Naveed ;
Basheer, Mohammed Haroon ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :10441-10457
[5]   Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff [J].
Aman, Muhammad Naveed ;
Taneja, Sachin ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Alioto, Massimo .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2843-2859
[6]   Two-Factor Authentication for IoT With Location Information [J].
Aman, Muhammad Naveed ;
Basheer, Mohamed Haroon ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :3335-3351
[7]   ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication [J].
Aman, Muhammad Naveed ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :5119-5131
[8]   Low Power Data Integrity in IoT Systems [J].
Aman, Muhammad Naveed ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Ali, Anwar .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :3102-3113
[9]  
Aman MN, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P310, DOI 10.1109/DESEC.2017.8073853
[10]  
[Anonymous], 2011, 6238 IETF RFC