Literature DB >> 29762511

PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks.

Yang Ming1, Xiaoqin Shen2.   

Abstract

Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which smart vehicles can communicate with other vehicles or roadside units. For the availability of VANETs, it is very important to deal with the security and privacy problems for VANETs. In this paper, based on certificateless cryptography and elliptic curve cryptography, we present a certificateless signature with message recovery (CLS-MR), which we believe are of independent interest. Then, a practical certificateless conditional privacy preserving authentication (PCPA) scheme is proposed by incorporating the proposed CLS-MR scheme. Furthermore, the security analysis shows that PCPA satisfies all security and privacy requirements. The evaluation results indicate that PCPA achieves low computation and communication costs because there is no need to use the bilinear pairing and map-to-point hash operations. Moreover, extensive simulations show that PCPA is feasible and achieves prominent performances in terms of message delay and message loss ratio, and thus is more suitable for the deployment and adoption of VANETs.

Entities:  

Keywords:  authentication; certificateless signature; conditional privacy preserving; security; vehicular ad hoc networks

Year:  2018        PMID: 29762511      PMCID: PMC5982737          DOI: 10.3390/s18051573

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

With the progress in human civilization and development of industrial technology, vehicles are widely popularized in modern society, which leads to such problems as traffic congestion, accidents, vehicle emissions, etc. Therefore, wide attention has been paid to deal with the abovementioned issues in both the academia and automobile industry. Vehicular ad hoc networks (VANETs), as a key component of intelligent transport system (ITS) and a particular mobile ad hoc networks (MANETs), is promising in improving traffic management efficiency and road traffic safety [1] . Generally, a typical VANET is mainly comprised of three types of entities, i.e., the trusted authorizers (TAs), the roadside units (RSUs) installed along the roads, and the vehicles rigged with onbroad units (OBUs). The TAs maintain the whole system and communicate with the RSUs using a secure wired communication. The RSUs alleviate the burden of the TAs by performing authentication tasks, while the vehicles (OBUs) provided the wireless communication capability, which communicate with the RSUs (Vehicle-to-Infrastructure, V2I) communication and other vehicles (Vehicle-to-Vehicle, V2V) communication. Here, IEEE 802.11 p standard is used for wireless communication based on Dedicated Short Range Communication (DSRC) protocol [2,3], in which each vehicle (OBU) broadcasts the traffic-related messages (e.g., vehicle’s speed, position, turning direction and time) periodically every 300 ms. According to the received traffic-related messages, other vehicles can alter driving routes to avoid emergent braking or traffic accidents, and the RSU will inform the traffic control center to regulate the traffic for preventing potential traffic jams. Based on the hybrid architecture of V2I and V2V communication, VANETs are conducive to enhancing traffic safety, improving traffic management and optimizing traffic efficiency. Owing to the inherent broadcast nature of the wireless channels, the communication in VANETs is vulnerable to various attacks such as eavesdropping, replaying, tampering, modification and forgery attacks, etc. Therefore, for the widespread deployment of VANETs, the security and privacy challenges must be solved [4,5]. The authentication mechanism, which consists of identity authentication and message integrity, is the key to ensuring the security of VANETs [1,5,6]. If identity authentication is not satisfied, a malicious vehicle may impersonate as a legal vehicle to broadcast messages for obtaining illegal benefits. If message integrity is not ensured, a malicious vehicle may broadcast falsified or altered messages to seriously disrupt traffic or incur serious consequences for the surrounding vehicles without being caught. Thus, authentication has to be implemented to verify a vehicle’s identity and to differentiate trustworthy messages from received ones. The digital signature technology may be used to address this problem in VANETs, the vehicle should make a signature on messages before sending them out, and the receivers will authenticate the messages before employment. Apart from that, privacy is also important for VANETs [7,8]. The vehicle’s privacy information like current position, license number, driver’s identity and travel route must be kept confidential for a long time. For example, the leakage of vehicle’s route information will incur the grave consequences since the information may be used for crimes or traffic accident. In general, the vehicles wouldn’t want their privacy information disclosed in broadcasting messages. Therefore, the vehicle privacy must be protected. However, the fact is that security sometimes conflicts with privacy. Especially, the former often involves some identity information and message’s origin, while the latter requires that no entity can trace a message to its generator. Thus, conditional privacy is usually considered in VANETs. That being said, the vehicle’s privacy is usually preserved in the system. If a malicious vehicle does not perform the protocol correctly (e.g., broadcasting false messages), then its privacy is revoked, in which case a trust authority (TA) will be capable to trace or retrieve the real identity of vehicle. The conditional privacy-preserving authentication (CPPA) mechanism [9,10], which is able to achieve message authentication and conditional privacy preservation simultaneously, is fully appropriate for addressing the security and privacy issues in VANETs. Lots of existing studies on the CPPA schemes in VANETs have been carried out in recent years. We can broadly categorize these schemes into public key infrastructure-based (PKI-based) schemes [1], identity-based (ID-based) schemes [11], and certificateless schemes [12,13,14,15]. Despite having solved the key escrow problem in ID-based schemes and the public key certification management problem in PKI-based schemes, the certificateless schemes are still unsuitable for the VANETs. The reason is that such schemes [12,13,14,15] have poor performances due to the requirements of map-to-point hash and bilinear pairing operations. Compared to other cryptographic operations, these two operations are complex and time-consuming. Therefore, it is important to design a practical certificateless CPPA scheme for VANETs without using bilinear pairing and map-to-point hash operations.

1.1. Our Contributions

This paper proposes a practical certificateless conditional privacy preserving authentication (PCPA) scheme for VANETs. To summarize, the major contributions of this paper are as follows: A certificateless signature with message recovery (CLS-MR), which is proved to be secure under the assumption of elliptic curve discrete logarithm (ECDL) in the random oracle, is proposed based on certificateless cryptography [16] and elliptic curve cryptography (ECC) [17,18]. This is of independent interest. A practical certificateless conditional privacy preserving authentication (PCPA) scheme for VANETs is proposed based on CLS-MR. The security analysis and comparison indicate that PCPA satisfies all security and privacy requirements. The performance in computation and communication cost is evaluated through quantitative calculations. Experimental results depict that PCPA is more efficient than other schemes in [12,13,14,15]. An extensive simulation is performed and the results display that PCPA is more feasible and achieves the low average message delay and message loss ratio.

1.2. Organization

Organization of this paper is demonstrated as follows: in Section 2, we survey the related work about CPPA in VANETs. In Section 3, the preliminaries are introduced. We present the concrete PCPA scheme for V2I communication in Section 4. Section 5 analyzes the security of the proposed scheme. Section 6 conducts the performance evaluations and experimental simulation results. Finally, Section 7 concludes the paper.

2. Related Works

A lot of researchers have put great efforts on authentication schemes aimed to achieve security, privacy and efficiency. These schemes are roughly classified into three categories: PKI-based authentication schemes, ID-based authentication schemes, and certificateless authentication schemes. In the first category, the anonymous certificates are used to hidden the vehicle’s real identities. In 2004, Hubaux et al. [4] claimed that the PKI technology could be used to address the security and privacy preserving problems in VANETs. In 2007, Raya and Hubaux [1], based on PKI and anonymous certificates, put forward an anonymous authentication scheme for VANETs. In this scheme, each vehicle needs to preload lots of anonymous public/private key pairs and the corresponding public key certificates. In this case, the vehicles need a large storage spaces and a huge verification overhead. Furthermore, a trusted authority (TA) will generate a large certificate revocation list (CRL), making the revocation mechanism very inefficient. In 2008, Lu et al. [10] constructed an efficient conditional privacy preserving (ECPP) mechanism for VANETs, to solve the storage space problem and the CRL growth problem in [11]. Zhang et al. [19] proposed a message authentication scheme based k-anonymity approach and hash message authentication code to achieve the privacy preserving of the vehicles and low communication cost. However, all the PKI-based authentication schemes for VANETs have a bottleneck problem on the management and storage of certificates. ID-based authentication schemes for VANETs have been proposed so as to solve the problems mentioned above. Incorporating the ID-based cryptography [20], Zhang et al. [11,21] proposed ID-based CPPA schemes supporting batch verification based on bilinear pairing for VANETs. In these schemes, the RSU and the vehicle utilize the pseudo-identity information as the public keys, while the private keys are generated by a trusted third party, namely, the private key generator (PKG). Thus, these schemes avoid the requirements of certificate storage in the entities, and alleviate the certificate management of PKI. Furthermore, the schemes achieve low verification cost because of batch message verification, which allows a large number of messages to be verified simultaneously. In 2009, based on binary authentication tree, an ID-based authentication scheme for V2I communication is proposed by Jiang et al. [22]. This scheme meets the security and privacy requirements, and achieves high efficiency in VANETs. In 2011, Chim et al. [23] pointed out that the schemes proposed in [11,21] were insecure against impersonation and anti-traceability attacks, then constructed a secure communication scheme for VANETs. Based on bilinear pairing, Huang et al. [24] presented a new authentication scheme for VANETs that not only is efficient in performances, but also provides conditional privacy to the vehicles. Based on the pseudo-identity-based signature, Shim [25] proposed an ID-based CPPA scheme for VANETs. In 2013, Shim [26] and Li et al. [27] pointed out that the schemes in [11,22] were insecure against the security attacks, and then established the improved ID-based authentication schemes. Horng et al. [28] showed that scheme in [23] is not secure against impersonation attack and proposed a secure scheme to make up for the security flaw in [23]. In 2014, Zhang et al. [29], aiming at the weakness mentioned in [27], constructed an improved ID-based CPPA scheme for VANETs. Liu et al. [30] indicated that the underlying ID-based signature scheme in [25] was unable to reach an acceptable security level, and thus the corresponding Coron’s technique authentication scheme suffers from a modification attack. In 2015, Bayat et al. [31] further pointed out the security flaws in [27] and designed a new scheme. Based on bilinear pairing, ID-based authentication schemes [32,33,34,35,36] were proposed, which are capable of guaranteeing the security and privacy requirements in VANETs. However, the performance of such schemes is not satisfactory because bilinear pairing operations should be used to implement authentication in VANETs. Based on the ECC, efficient ID-based authentication schemes for VANETs were proposed in [37,38,39,40,41,42,43], where bilinear pairing operations and map-to-hash operations are not applied. They achieve high efficiency in terms of computation and communication cost. Although ID-based authentication schemes eliminate the certificates, simplify the key management and reduce the storage overhead, they are confronted with the inherent key escrow challenge. That is to say, PKG has the knowledge on the private keys of all vehicles and RSUs. It appears that this condition may be excessively strong and not appropriate for VANETs. To solve the key escrow problem in ID-based authentication schemes, certificateless authentication schemes have been proposed for VANETs. Horng et al. [12], based on certificateless cryptography [16], put forward a secure certificateless CPPA scheme. In this scheme, only the partial private key of the users (RSU and Vehicle) is generated by a trusted party, namely, the Key Generator Center (KGC). A secret value is picked by the user itself, and combines the partial private key to form the private key. Therefore, the KGC has no the private key s of all users. Moreover, in the certificateless CPPA scheme, public key certificates are not needed to guarantee the authenticity of public keys. In 2016, Li et al. [13] found that the scheme in [12] was not secure against a malicious-but-passive KGC under the existing security model. In other words, KGC may maliciously implant a trapdoor in the public system parameters and attempts to forge a signature without the vehicle’s private key. Based on bilinear pairing, an efficient certificateless aggregate signature scheme for VANETs was put forward by Malhi et al. [14], which achieves low computation cost s in verification phase. In 2018, Kumar et al. [15] demonstrated that the scheme in [14] was vulnerable to malicious KGC attack and proposed an improved scheme for VANETs, which was able to eliminate the security flaws of scheme in [14] and achieved the same performances. Upon reviewing the literature, the aforementioned schemes have different problems. The PKI-based schemes suffer from the high cost of certificate management on CA, in which the vehicles could easily disrupt the service of VANETs. As for ID-based schemes, a key escrow problem is inevitable and incurs the security of VANETs. Until now, the existing certificateless schemes solve the above problems in PKI-based and ID-based schemes but are still not efficient and suitable to VANETs because of the huge computation overhead and communication cost. The proposed scheme had addressed the aforementioned issues simultaneously based on the ECC. It neither requires the certificate management, nor the involves key escrow problem. Moreover, the proposed scheme does not use bilinear pairing and map-to-point hash operations, which achieves outstanding performances and is more suitable for VANETs than other schemes.

3. Preliminaries

The elliptic curves and related problem, system model, security requirement and cryptographic primitive used as building blocks are introduced in this section. For readability, the notations adopted in the present paper are listed in Table 1.
Table 1

Notations.

SymbolDescription
p,q two large prime numbers
Fp a finite field over p
G an additive group
P a generator of G
KGCa key generation center
(Ppub,s) KGC’s public key and private key
H1(·),H2(·), H3(·),H4(·)hash functions: H1,H2,H3,H4:{0,1}*Zq*,
F1(·),F2(·) F1:{0,1}l2{0,1}l1, F2:{0,1}l1{0,1}l2, l1+l2=|q|
Vi the i-th vehicle
RSUroadside unit
OBUonboard unit
TRAa trace authority
(Tpub,t) TRA’s public key and private key
RIDi Vi’s real identity
PIDi Vi’s pseudo identity
PKi Vi’s public key
Ri,di Vi’s partial private key
xi Vi’s secret value
Ti the valid period of PIDi
OR operation
cti current timestamp
Mi a message sent from vehicle to RSU
Pi Vi’s public key in [12,13,14]
(Ri,Si) a signature on Mi in [12,13]
(Ui,Vijk) a signature on Mi in [14]

3.1. Elliptic Curves

Miller [17] and Koblitz [18] first proposed the concept of elliptic curve cryptography (ECC). Let be a finite field with a large prime p. The elliptic curve E over is defined as the set of an infinity point O and all points that meet the equation , where the discriminant and . The elliptic curve E forms an additive cyclic group under the operation of point addition . Scalar multiplication operation over is expressed as . The hard problems based on ECC are shown as follows: Elliptic curve discrete logarithm (ECDL) problem: Given two random points , find an integer x, such that . Elliptic curve discrete logarithm (ECDL) assumption problem: There are no polynomial-time algorithms to solve the ECDL problem with non-negligible probability. Elliptic curve computational Differ-Hellman (ECCDH) problem: For unknown integers and the given two random points , calculate the point . Elliptic curve computational Differ-Hellman (ECCDH) assumption: There are no polynomial-time algorithms to solve the ECCDH problem with non-negligible probability.

3.2. System Model

The system model of the proposed scheme is shown in Figure 1. As is shown in Figure 1, the system is composed of five entities: the Key Generator Center (KGC), the Trace Authority (TRA), the Application Servers (AS), the RSU, and the OBU.
Figure 1

System model.

KGC: It is in charge of calculating system parameters and preloading them on RSUs and OBUs in offline mode. In addition, it also produces and distributes the partial private keys for RSUs and OBUs. The KGC is assumed to be a trusted third party with sufficient storage space and computing power. TRA: It is used for the registration of RSUs and OBUs. It can trace messages to their source and disclose the vehicles’ real identity. Similarly, the TRA is assumed to be a trusted third party with sufficient storage space and computing power. AS: It is a safety-related application server, like a traffic-data analysis center or traffic manage center. It first gathers the traffic-related messages including current location, time, traffic accidents from RSUs, and then conducts further analysis and/or provides feedback to them. The AS communicates with KGC, TRA and RSUs via the wired channel. RSU: It is located along the roadside and is used for verifying the authenticity and integrity of messages and processing them locally or forwarding them to TAs or AS when received the messages from OBUs. The RSU communicates with the vehicle in a certain coverage region by a wireless channel and communicates with KGC, TRA and AS via a secure wired channel. OBU: It is installed on the vehicle to communicate with other vehicles and RSUs for sharing traffic-related status information like speed, direction, and position through the Dedicated Short Range Communication (DSRC) [2,3]. Generally, the OBU is assumed to have less computation power than RSU.

3.3. Security Requirements

In V2I communication, the following security requirements need to be satisfied in the proposed scheme. Authentication and message integrity: The message receiver (RSU) should be able to verify the legality of the vehicle efficiently in the system and detect any modification of the received message. Identity privacy preserving: Any entity should not identify or trace the vehicle’s real identity by analyzing the received messages. Traceability: The generator of any mistake message should be traceable. TRA should be able to disclose the real identity of any malicious vehicle, which has broadcasted forged messages to other vehicles in order to disrupt the traffic. Unlinkability: Apart from TRA, neither should the RSU nor the malicious vehicle be able to determine whether two messages are from the same vehicle. Key escrow resilience: KGC, a semi-trusted party, should not impersonate legitimate vehicle to generate a valid signature using the vehicle’s private key. Role separation: Two trusted authorities exist in the proposed scheme, i.e., KGC and TRA. KGC is working for creating the vehicle’s partial private key on the pseudo identity. TRA is responsible for producing the pseudo identities and tracing the vehicle’s real identity. Resistance to attack: The proposed scheme should resist various of popular attacks such as the replay attack, the modification attack, the impersonation attack, and the man-in-the-middle attack in VANETs.

3.4. CLS-MR

The CLS-MR includes the following algorithms: setup, partial-private-key-extract, set-secret-value, set-private-key, set-public-key, sign, and verify. Setup: Given a security parameter k, the KGC generates a group of the prime order q based on an elliptic curve E defined over a finite field , where is a generator. The KGC randomly chooses and computes . The KGC also chooses hash functions , and , where and are positive integers such that . The system parameter is and the master key is s . Partial-Private-Key-Extract: Given and an identity , the KGC chooses at random and computes , , . The partial private key for is . The KGC securely returns to the user. Set-Secret-Value: The user picks a random number as its secret value. Set-Private-Key: The private key of user is . Set-Public-Key: Given and the user’s secret value , the user computes and sets as its public key. Sign: Given , private key for the user under and a message , the user picks a random number and computes , , , , . Finally, the signature on m for is . Verify: Given , the public key , the user’s identity and the signature , any verifier recovers the message and checks the validity of signature. To recover message m, the verifier computes , , , , where ⊕ is exclusive or operation, and are the most significant -bit of f and the least significant -bit of f, respectively. Correctness: Given a signature for under , compute , , , and Then, one can recover

3.5. Security Proof

According to certificateless cryptography [16], two types of adversaries, i.e., Type I adversary and Type II adversary , are considered in CLS-MR. The adversary models an outside adversary and acts as a malicious third party while the adversary models an inside adversary and serves as a malicious-but-passive KGC. Type I adversary : The adversary is not in possession of the master key, but is capable of replacing the public key of the user with a value chosen by itself. Type II adversary : The adversary is in possession of the master key, but cannot replace the public key of the user. The formal security model of CLS-RM is depicted in detail in [16]. The proposed CLS-MR is existentially unforgeable under the ECDL assumption in the random oracle model. Theorem 1 is proved according to Lemma 1 and Lemma 2 listed below. ☐ In the random oracle model, CLS-MR is existential unforgeable against Type I adversary In the random oracle model, CLS-MR is existential unforgeable against Type II adversary The security proof of Lemma 1 and Lemma 2 can be found in the appendix.

4. The Proposed Scheme

This section proposes a practical certificateless conditional privacy-preserving authentication (PCPA) scheme for VANETs based on CLS-MR. Specifically, the proposed scheme includes system initialization, pseudo identity generation and partial private key extraction, public/private key generation and message signing, and message verification phases.

4.1. System Initialization

The system initialization, which is carried out by TAs (KGC and TRA), is to produce system parameters for all RSUs and OBUs. The following steps are performed in this phase: The TAs randomly choose a prime p, an elliptic curve E over the finite field , which is defined by the equation , where and . The TAs pick a group of prime order q based on E and denote a generator. The KGC calculates its public key , where is the master key for partial private key generation. The TRA chooses a random number as the master key for identity traceability and computes . The TAs choose hash functions: , , , , and , where and are positive integers such that . The TAs publish the system parameters and send them to all RSUs and vehicles (OBUs). Here, the system parameters are preloaded into the all vehicles’ tamper-proof devices (TPD) for VANETs. The master keys s and t are kept secretly by KGC and TRA, respectively.

4.2. Pseudo Identity Generation and Partial Private Key Extraction

This phase is performed between the TAs (TRA and KGC) and the vehicles. Receiving the real identity from , where uniquely identifies the vehicle , the KGC calculates partial private keys on them after the TRA generates pseudo identities for the vehicle . Then, the partial private keys and pseudo identities are preloaded in TPD of vehicle . The details of this phase are as follows: The vehicle sends the real identity to the TRA in secure mode. Upon receiving the real identity , the TRA randomly chooses and computes , , where defines the valid period of the pseudo identity . Then, a pseudo identity is transmitted to the KGC via a secure way. When receiving the pseudo identity , the KGC randomly chooses and calculates the partial private key using the master key s where , . After that, the KGC sends the partial private key and pseudo identity to the vehicle .

4.3. Public/Private Key Generation and Message Signing

During this phase, the vehicle generates public/private key and signs messages. Then, the vehicle broadcasts a final message, including the pseudo identity, public key, timestamp, and signature, to nearby RSUs. The details of this phase are as follows: The vehicle randomly picks as the secret value and computes . Then, the vehicle ’s private key is and the public key is . The vehicle randomly chooses a pseudo identity from its storage and a current timestamp , which is used to ensure the freshness of message so as to resist the replay attack. Given a traffic-related message , the vehicle randomly picks , and calculates , , , , . The signature of a traffic-related message is . Then, the vehicle broadcasts the final message to nearby RSUs.

4.4. Message Verification

In this phase, after receiving the final message , the verifier (RSU) recovers the messages and checks the validity of the signature. Based on this, it is a guarantee that the corresponding vehicle cannot broadcast false messages or masquerading as other legal vehicles. This phase is described as follows: The verifier checks whether is valid and is fresh. If is not valid or is not fresh, the message will be rejected. The verifier computes , , , , . Checks whether .

5. Security Analysis

In this section, an analysis on the security of the proposed scheme as well as its comparison with the latest schemes is conducted. Authentication and message integrity: To ensure the authentication and message integrity, a new CLS-MR scheme is employed in the proposed PCPA. According to Theorem 1, the underlying CLS-MR is secure against adaptive chosen message and identity attacks under the ECDL assumption in the random oracle model. Through a Message Verification algorithm, a verifier (RSU) can confirm the validity and integrity of . That is to say, any polynomial-time adversary is unable to forge or modify a valid signature. Therefore, the message integrity and authentication can be ensured in the proposed scheme. Identity privacy preserving: According to the description of the proposed scheme, the real identity of the vehicle is only included in random pseudo identity , where , and . To extract the vehicle real identity , the adversary has to compute . However, without knowing and t, it is impossible for any adversary to obtain as it is an instance of a ECCDH problem to solve . Therefore, the identity privacy preserving can be ensured in the proposed scheme. Traceability: According to the description of the proposed scheme, the TRA can use its own master key t to compute and . TRA can extract the real identity from a pseudo identity involved in the broadcast messages. Therefore, the proposed scheme satisfies the traceability. Unlinkability: According to the description of the proposed scheme, the TRA, KGC, and the vehicle randomly choose , and respectively, and generates , where , , , , , , and . Due to the randomness of , and , any adversary is unable to link two messages sent from the same vehicle or two anonymous pseudo identities, through which the unlinkability of the proposed scheme is satisfied. Role separation: According to the description of the proposed scheme, there are two trusted authorities with different functions, i.e., TRA and KGC. The real identity of a vehicle can only be revealed by TRA rather than KGC by using the master key t. Here, t have to be well safeguarded for the vehicle’s privacy preserving. However, there is no need to give strong protection to the master key s of KGC, since no adversaries can generate a valid signature without the vehicle’s secret value. Therefore, the role separation can be provided in the proposed scheme. Key escrow resilience: According to the Lemma 2, the malicious KGC cannot impersonate a vehicle successfully under the ECDLP assumption. The basic reason is that the vehicle calculates the secret value itself, and it cannot be accessed by the KGC. Therefore, the key escrow resilience is satisfied in the proposed scheme. Resistance to attacks: The proposed scheme is secure against the main attacks of network. The details are as follows: Replay attack: It can be known from the description of the proposed scheme, the timestamp is included in , which ensures the message freshness to guards against the replay attacks. This requires loose synchronization of the clocks, which could be provided by widely used GPS devices. Modification attack: Following the depiction of the proposed scheme, we realized that is a signature of the traffic-related message under . Based on the CLS-MR and Theorem 1, any polynomial adversary can not forge a valid signature and RSU can find any modification on by the Message Verification algorithm. Impersonation attack: It can be known from Theorem 1 that no adversary is able to fabricate the legal message without the vehicle’s private key. By means of the validity checking on the received message, RSU can find the impersonation attack. Man-in-the-middle attack: As is shown in the analysis on the modification attack, any modification about in transmission can be found. We compare the security of the proposed PCPA scheme for VANETs with that of the schemes put forwarded by Horng et al. [12], Li et al. [13], Malhi et al. [14], and Kumar et al. [15]. Details on the security comparisons between the proposed scheme and the abovementioned schemes are given in Table 2, where ✓ indicates “satisfy” and ✗ refers to “not satisfy”.
Table 2

Security comparisons.

Security[12][13][14][15]The Proposed Scheme
Authentication and Message integrity
Identity privacy preserving
Traceability
Unlinkability
Role separation
Key escrow resilience
Resistance to attacks

6. Performance Evaluation and Simulation

Here, we analyze the computation and communication costs of the proposed PCPA and evaluate its performance with the existing schemes in [12,13,14]. It should be pointed out that the analysis and comparison of Kumar et al.’s scheme [15] are omitted, as it has only made a small change in the signing phase to fix the security flaw in [14]. Moreover, a comprehensive simulation is carried out using simulation of urban mobility (SUMO) [44] and ns-3.26 simulator [45]. SUMO is a traffic simulation tool that can provide the realistic traffic mobility model and ns-3.26 is used for wireless network simulation. Based on the simulations, we give concrete evaluation on average message delay and average message loss ratio in real scenarios.

6.1. Computation Cost

The computation cost for the message signing and verification in the proposed scheme is analyzed and the results are compared with those obtained from the schemes put forward by Horng et al. [12], Li et al. [13], and Malhi et al. [14]. For the pairing-based schemes [12,13,14], the symmetric bilinear pairing for the 80-bit security can be defined as follows: , where is an additive group formed by a generator P with the order q on a super singular elliptic curve with embedding degree 2. q is 160-bit Solinas prime number and p is 512-bit prime number, which satisfy . For the proposed scheme, the ECC for the same security level can be constructed as follows: with order q is an additive group generated by a point P on a non-singular elliptic curve , where p, q are two 160-bit prime numbers, , and b is a random 160-bit prime number. The time cost for performing the cryptographic operations is defined below. Let be the time to perform a bilinear pairing operation, and be the time to perform a scale multiplication operation in bilinear pairing and ECC, respectively. The time to perform a map-to-point hash function operation is denoted as . Other lightweight operations (point addition, and one-way hash function operation) are not taken into account. Using the MIRACL Crypto SDK [46], the running time of the above cryptographic operations can be quantified. The experiment is run on Intel Corei5-4590 (Intel Corporation, Santa Clara, CA, USA), 3.3 GHz CPU, 8 gigabytes memory with Windows 7 (Microsoft Corporation, Redmond, WA, USA). The average execution times of those operations are listed in Table 3.
Table 3

Execution time of cryptographic operation (in Milliseconds).

Cryptographic OperationExecution Time
Bilinear pairing Tp9.0791
Scalar multiplication in bilinear pairing Tm-bp3.7770
Scalar multiplication in ECC Tm-ecc0.8310
Map-to-point hash function in bilinear pairing Tmtp9.7052
Based on the experiment results, the computation costs of Horng et al.’s scheme [12], Li et al.’s scheme [13], Mahli et al.’s scheme [14] and the proposed PCPA are compared and shown in Table 4.
Table 4

Comparison of computation cost.

SchemeA Message SigningA Message Verificationn Message Signingn Message Verification (Batch)
Hong et al’s scheme [12]7.5540 ms40.7195 ms7.5540n ms13.4822n + 27.2373 ms
Li et al’s scheme [13]17.2592 ms50.4247 ms17.2592n ms13.4822n + 36.9425 ms
Malhi et al’s scheme [14]15.1080 ms38.5683 ms15.1080n ms11.3310n + 27.2373 ms
The proposed scheme0.8310 ms3.3240 ms0.8310n ms3.3240n ms
For the computation cost of one message signing, Horng et al.’s scheme [12] requires two scalar multiplication operations in bilinear pairing. Therefore, the total signing time is 2 ms. Li et al.’s scheme [13] requires one map-to-point hash operation and two scalar multiplication operations in bilinear pairing. Thus, the total signing time is ms. Malhi et al.’s scheme [14] requires four scalar multiplication operations in bilinear pairing. Thus, the total signing time is 4 ms. The proposed scheme requires one scalar multiplication operation in ECC. Thus, the total signing time is 1 = 0.8310 ms. For the computation cost of one message verification, Horng et al.’s scheme [12] requires one map-to-point hash operation, one scalar multiplication operation in bilinear pairing and three bilinear pairing operations. Thus, the total verification time is + + 3 = 40.7195 ms. Li et al.’s scheme [13] requires two map-to-point hash operations, one scalar multiplication operation in bilinear pairing and three bilinear pairing operations. Thus, the total verification time is 2 + + 3 = 50.4247 ms. Mahli et al.’s scheme [14] requires three scalar multiplication operations in bilinear pairing and three bilinear pairing operations. Thus, the total verification time is 3 + 3 = 38.5683 ms. The proposed scheme requires four scalar multiplication operations in ECC. Therefore, the total verification time is 4 = 3.3240 ms. Figure 2 clearly indicates the computation cost for one message and that with an increasing number of messages, respectively. As is shown in Table 4 and Figure 2a, the computation cost of a message signing is 0.8310 ms in the proposed scheme, which decreases by 88.9%, 95.2% and 94.5% compared with those in [12,13,14], respectively. In terms of the computation overhead of one message verification, the proposed scheme needs 3.3240 ms, which decreases by 91.8%, 93.4% and 91.4% compared with those in [12,13,14], respectively.
Figure 2

Computation cost. (a) computation cost in one message signing and verification; (b) signing cost versus number of messages; (c) verification cost versus number of messages.

To obtain the computation cost of multiple (n) messages signing, the computation delay of one message signing should be repeated n times. Therefore, the computation costs of n messages signing in [12,13,14] and the proposed scheme are ms, ms, ms, and ms, respectively. For computation cost of multiply (n) messages verification, Horng et al.’s scheme [12] requires n map-to-point hash operations, n scalar multiplication operations in bilinear pairing and three bilinear pairing operations. Thus, the total verification time is + + 3 = 13.4822n + 27.2373 ms. Li et al.’s scheme [13] requires map-to-point hash operations, n scalar multiplication operations in bilinear pairing and three bilinear pairing operations. Thus, the total verification time is + + 3 = ms. Mahli et al.’s scheme [14] requires scalar multiplication operations in bilinear pairing and three bilinear pairing operations. Thus, the total verification time is 3 + 3 = ms. The proposed scheme requires scalar multiplication operations in ECC. Therefore, the total verification time is 4 = ms. It is known from Figure 2b,c that the signing cost together with verification cost grows linearly with the increase of the number of messages. In addition, the proposed scheme has the lowest slope. As is shown in Figure 2b, when , the signing costs of the schemes in [12,13,14] and the proposed scheme respectively are 453.2400 ms, 1035.5520 ms, 906.4800 ms, 49.8600 ms. As is shown in Figure 2c, the verification costs of the schemes in [12,13,14] and the proposed scheme respectively are 162.0593 ms, 171.7645 ms, 140.5473 ms, and 33.2400 ms when , and 836.1693 ms, 845.8745 ms, 707.0973 ms, and 199.4400 ms when . Therefore, the proposed PCPA achieves lower computation cost than the schemes in [12,13,14] in the signing and verification phases, regardless of the number of messages.

6.2. Communication Cost

In this subsection, the communication costs of Horng et al.’s scheme [12], Li et al.’s scheme [13], Malhi et al.’s scheme [14] and the proposed scheme are evaluated. In V2I communication, the communication cost refers to the size of message transmitted from a vehicle (OBU) to an RSU. As is mentioned above, the length of q is 160 bits and that of p is 512 bits, so the length of elements in and , respectively, are 20 bytes and 64 bytes. Assuming that the output length of general one-way hash function is 160 bits (20 bytes), and the length of the timestamp is 32 bits (4 bytes). According to IEEE Trial-Use standard [47] for VANETs security, the length of the traffic-related message is 67 bytes. The comparison of communication cost is shown in Table 5 and analyzed as follows.
Table 5

Comparison of communication cost.

SchemeSend a MessageSend n Messages
Horng er al.’s scheme [12]351 bytes351n bytes
Li et al.’s scheme [13]351 bytes351n bytes
Malhi et al.’s scheme [14]323 bytes323n bytes
The proposed scheme 128 bytes 128n bytes
In [12,13], is sent from the vehicle (OBU) to a RSU, where , , and denotes a timestamp. Thus, the communication cost of these two schemes is 351 bytes as In [14], is sent from the vehicle (OBU) to a RSU, where . Thus, the communication cost of this scheme is 323 bytes as In the proposed PCPA, is sent from the vehicle (OBU) to a RSU, where , , and denotes a timestamp. Thus, the communication cost of the proposed scheme is 195 bytes as The comparisons on the communication costs of one message and multiply messages is shown in Figure 3. The communication costs increase linearly with the growth of the number of messages in all schemes. The schemes in [12,13] are the same in communication costs. The communication costs of the proposed scheme are the lowest in all schemes, which significantly decreases by 63.5%, 63.5%, and 60.4% compared with those of the schemes in [12,13,14], respectively. When the number of messages is 30,000, the proposed scheme can save 6.38 MB and 5.58 MB bandwidth compared with the schemes [12,13,14], respectively.
Figure 3

Communication cost. (a) communication cost of one message; (b) communication cost versus number of messages.

6.3. Simulation

Exploring SUMO [44] and ns-3.26 [45], we evaluate the performances of the schemes of Horng et al. [12], Li et al. [13], and Malhi et al. [14] as well as the proposed PCPA scheme. The SUMO is used to generate detailed vehicle movement traces by employing models, and then these traces is put into the ns-3.26 simulator to assess the efficiency and applicability of the schemes. The simulation road scenario is shown in Figure 4, in which the RSUs are distributed every 500 m along the road, and each vehicle broadcasts messages every 300 ms. The vehicles are distributed on the road and move to the crossings randomly. The parameters for the simulation are listed in Table 6.
Figure 4

Road scenario for simulation.

Table 6

Simulation parameters.

ParametersValues
Simulation area1000 m×1000 m
Wireless protocol802.11 p
Channel bit rate6 Mbs
Buffer size1 M bytes
Number of RSU9
Simulation time200s
Traffic simulation toolSUMO
Network simulation toolns-3.26
Vehicle speed10–50 m/s
The average message delay (aMD) and average message loss ratio (aMLR) are defined through the notions below: : The number of RSUs within the simulation area. : The number of vehicles within the simulation area. : The number of messages sent by vehicle . : The time for sending a message to . : The time for receiving a message from . : The average verification time for each message. : The number of messages received by in the media access control (MAC) layer. : The number of messages dropped by in the application layer. Average Message Delay (aMD) The aMD reflects the average time latency for a message to be received by the RSU after it is generated, which is defined as . Two experiments are conduced to analyze that how aMD with the density and speed of vehicles. The results of simulation are demonstrated in Figure 5.
Figure 5

Average message delay. (a) average message delay versus number of vehicles; (b) average message delay versus speed of vehicles.

The relationship between aMD and the number of vehicles is described in Figure 5a, where the number of vehicles varies from 20 to 100, and the average speed of vehicles is approximately 20 m/s (72 km/h). As is shown in Figure 5a, the aMD for RSUs increases with the number of vehicles in all schemes. The aMD is 2.94 s, 2.98 s, 2.40 s and 0.009 s in Horng et al.’s scheme [12], Li et al.’s scheme [13], Mahli et al.’s scheme [14] and the proposed scheme, respectively. In addition, the aMD of the proposed scheme is the lowest, which is slightly influenced by vehicle density. The relationship between aMD and the speed of vehicles is shown in Figure 5b. The average speed of vehicles varies from 10 to 50 m/s (36 to 180 km/h) and the number of vehicles is 50. Obviously, when the vehicle density is constant, the aMD hardly changes, indicating that it is scarcely affected by the vehicle speed. This is only a theoretical simulation result with no practical implementation. Average Message Loss Ratio (aMLR) The aMLR expresses the ratio of the number of messages dropped to the total number of messages received by the RSUs, which is defined as Two experiments are conducted to analyze aMLR with the density and speed of vehicles. The results of simulation are shown in Figure 6.
Figure 6

Average message loss ratio. (a) average message loss ratio versus number of vehicles; (b) average message loss ratio versus speed of vehicles.

The relationship between aMLR and the number of vehicles is shown in Figure 6a, where the number of vehicles varies from 20 to 100 and the average speed of vehicles is approximately 20 m/s (72 km/h). Under the fixed vehicle speed, when the number of vehicles is larger than 20, the aMLR grows with the number of vehicles in Horng et al.’s scheme [12], Li et al.’s scheme [13] and Malhi et al.’s scheme [14]. Furthermore, the aMLRs respectively hit 57%, 57%, 46% in the schemes of [12,13,14] when the number of vehicles is 100. No matter the density of the vehicles, the aMLR is almost 0. Figure 6b shows the relationship between aMLR and the speed of vehicles. The speed of vehicles varies from 10 to 50 m/s (36 to 180 km/h) and the number of vehicles is 50. It is easy to see that, when the speed of vehicles is higher than 20 m/s, the aMLRs in the schemes of Horng et al. [12], Li et al. [13], and Malhi et al. [14] are slightly influenced. The aMLR in the proposed scheme is 0% regardless of how the vehicle speed changes.

7. Conclusions

In this paper, a new efficient certificateless signature with message recovery (CLS-MR) is first presented. Under the ECDLP assumption, this scheme is secure in the random oracles. Based on the invented CLS-MR, a practical certificateless conditional privacy-preserving authentication (PCPA) scheme for VANETs is put forward. The security analysis indicates that PCPA satisfies the security and privacy-preserving requirements in VANETs. The performance evaluation and comparison show that the PCPA scheme is more efficient in both computation cost and communication cost since it does not employ map-to-point hash function and bilinear pairing operations. Furthermore, the simulation experimental results demonstrate the superiority of PCPA compared to other schemes in average message delay and message loss ratio, and thus PCPA is more suitable for VANETs.
  5 in total

1.  Efficient Certificate-Less Aggregate Signature Scheme with Conditional Privacy-Preservation for Vehicular Ad Hoc Networks Enhanced Smart Grid System.

Authors:  Thokozani Felix Vallent; Damien Hanyurwimfura; Chomora Mikeka
Journal:  Sensors (Basel)       Date:  2021-04-21       Impact factor: 3.576

2.  A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring.

Authors:  Gyorgy Kolumban-Antal; Vladko Lasak; Razvan Bogdan; Bogdan Groza
Journal:  Sensors (Basel)       Date:  2020-01-10       Impact factor: 3.576

3.  A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT.

Authors:  Haqi Khalid; Shaiful Jahari Hashim; Sharifah Mumtazah Syed Ahmad; Fazirulhisyam Hashim; Muhammad Akmal Chaudhary
Journal:  PeerJ Comput Sci       Date:  2021-12-10

4.  An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds.

Authors:  Congcong Li; Shouwen Ji; Xi Zhang; Haiping Wang; Dongfeng Li; Huiyong Liu
Journal:  Sensors (Basel)       Date:  2018-08-31       Impact factor: 3.576

5.  Efficient Privacy-Preserving Data Sharing for Fog-Assisted Vehicular Sensor Networks.

Authors:  Yang Ming; Xiaopeng Yu
Journal:  Sensors (Basel)       Date:  2020-01-16       Impact factor: 3.576

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.