| Literature DB >> 29292792 |
Yousheng Zhou1,2,3, Xiaofeng Zhao4, Yi Jiang5, Fengjun Shang6, Shaojiang Deng7, Xiaojun Wang8.
Abstract
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.Entities:
Keywords: V2V; authentication; provable security; vehicle sensor network
Year: 2017 PMID: 29292792 PMCID: PMC5751046 DOI: 10.3390/s17122854
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Structure of a vehicular ad-hoc network.
The notations.
| Notation | Definitions |
|---|---|
| A private key for the AS | |
| A private key for user | |
| A pre-shared secure key set among the LEs and the AS | |
| The identification code for entity | |
| The password for user | |
| The alias for entity | |
| A secure hash function | |
| ⊕ | The XOR operator |
| ∥ | The combination of strings |
| A public key for user | |
| A secure large prime | |
| A secure elliptic curve | |
| The primitive generator for | |
| The subgroup of | |
| The set consisting of all primes in | |
| An element selected randomly from | |
| A session key between entity | |
| A key update message |
Figure 2Key set generation scheme based on the hash–chain method.
Figure 3Normal vehicle registration procedure.
Figure 4General authentication procedure.
Figure 5Secure communication procedure.
Symbol and description of BAN logic.
| Symbol | Description |
|---|---|
| Entity | |
| Entity | |
| Entity | |
| Entity | |
Simulation of random oracles h and .
| A hash query |
| Otherwise, it chooses a random number |
The execution time of basic operation.
| Operation | ||||
|---|---|---|---|---|
| Execution time (ms) |
Comparison of efficiency.
| Scheme | Computation Cost | Computation Time (ms) |
|---|---|---|
| Reference [ | ≈1.838 | |
| Reference [ | ≈14.7 | |
| Reference [ | ≈14.7 | |
| Reference [ | ≈0.032 | |
| Reference [ | ≈0.04 | |
| Proposed | ≈3.54 |
Figure 6Execution time(ms) of different authentication protocols.
Comparison of security features.
| Security Threats and Scheme | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Proposed |
|---|---|---|---|---|---|---|
| Provides user anonymity | × | × | × | × | × | √ |
| Resistance to user traceability attack | × | × | × | × | × | √ |
| Resistance to impersonation attack | √ | × | √ | √ | √ | √ |
| Resist inside attack | √ | √ | √ | × | × | √ |
| Unlinkability of message | × | √ | √ | × | √ | √ |