| Literature DB >> 34977343 |
Haqi Khalid1, Shaiful Jahari Hashim1, Sharifah Mumtazah Syed Ahmad1, Fazirulhisyam Hashim1, Muhammad Akmal Chaudhary2.
Abstract
In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one territory to another may have the connectivity services down for a while, leading to service interruption because it is pervasive in remote areas and places with multipath obstructions. Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. The proposed scheme utilizes an efficient AES-RSA algorithm to achieve integrity and confidentiality of the message. The offline joining is added to avoid remote network intrusions and the risk of network service interruptions. The proposed work includes two different significant goals to achieve first, then secure message on which the data is transmitted and efficiency in a cryptographic manner. The Burrows Abdi Needham (BAN logic) logic is used to prove that this scheme is mutually authenticated. The system's security has been tested using the well-known AVISPA tool to evaluate and verify its security formally. The results show that the proposed scheme outperforms the ID-CPPA, AAAS, and HCDA schemes by 53%, 55%, and 47% respectively in terms of computation cost, and 65%, 83%, and 40% respectively in terms of communication cost.Entities:
Keywords: Cross-domain authentication; Industrial IoT; Offline authentication; Security; VANET
Year: 2021 PMID: 34977343 PMCID: PMC8670398 DOI: 10.7717/peerj-cs.714
Source DB: PubMed Journal: PeerJ Comput Sci ISSN: 2376-5992
Figure 1The typical architecture of VANETs.
Comparison of the existing authentication schemes in VANET.
| References | Issue | Structure | Method | Tool | Objective | Evaluation Parameters | Limitation |
|---|---|---|---|---|---|---|---|
|
| Malicious vehicle entering in the VANETs | Centralized | Bilinear pairing | Cygwin 1.7.35-15, PBC library | Track the vehicles that misuse the VANET or road-side units | Computational cost and signature verification process | Suffers from the problem of enthusiasm when forwarding messages |
|
| 2021Security issues, such as authentication, integrity, and confidentiality | Centralized | ECC | JCA library and JPBC library | Removes the certificate revocation queries in PKC | Computation cost, Communication cost | Vulnerability to attacks ( |
|
| Significant computation and communication overhead | Centralized | Merkle HashTree | Crypto++ | Reducing the complexity involved in authenticating vehicles | Computation cost, Communication cost | Key session attacks and replay attacks vulnerability |
|
| OBUs and RSUs are constrained in computing and cannot afford the verification of large messages | Centralized | ECC | MIRACL library | Ensures security and integrity for V2V and V2I communication messages | Computation cost, Communication cost | Any vehicle's real identity can be easily discovered by sufferers of high computing and communication costs and an insider attacker |
|
| High computational cost in the process of checking the certificate revocation list (CRL) | Centralized | Bilinear pairing | PBC library | Provide a conditional tracking framework in which the TA traces the misbehaving vehicles or RSUs | Computational cost | Suffers high communication overhead |
|
| Increasing the number of revoked users allows the CRL volume to increase dramatically, which increases the signature verification period | Centralized | ECC | OMNET ++ | Provide a secure and fast communicational link between TA and RSU | Computation cost, communication cost | The execution time during message generation and verification are high |
|
| Elevated computing criteria during certificate generation and message verification phases | Centralized | ECC, pseudo-identity | PBC library | To improve efficiency further | Computation and communication overheads | If attackers have physical access to the tamper-proof device, it is not secure |
|
| Wrong output due to map-to-point hash and bilinear pairing operations requirements | Centralized | Certificateless cryptography and ECC | MIRACL Crypto SDK, ns-3.26 simulator | Reduce the cost of computing and communication | Computation and communication costs | Vulnerability to attacks ( |
|
| Large overhead in the signature authentication process | Centralized | Certificateless aggregate signature | MIRACL library | Reduce the computation cost in the sign phase | Computation and communication cost | Large overhead in the verification phase |
|
| An adversary can easily track a mobile node's route and the privacy of its driver | Centralized | lattice-based cryptography | PBC library | Assure secure communication | Computation and communication costs | Side-channel attack information could be leaked |
|
| High computational complexity | Centralized | ECC | MIRACL library | Achieve better performance and security | Computation and communication costs | Vulnerable to man-in-the-middle attack and modification attacks |
|
| Not successful in signing and checking a single message because of the comprehensive operations | Centralized | Bilinear pairing | JPBC library | Increases the efficiency | Computation and communication costs | Key escrow issues |
|
| Massive overheads in computation, especially in the batch verification phase | Centralized | ECC | MIRACL library | To verify many messages | Computation and communication overheads | Vulnerable to replay attacks |
|
| The vehicle could not check the legal existence of the RSU response | Centralized | Pseudonym mechanism and group signature | JPBC library | To balance security and efficiency | Communication overhead, computation cost, and signaling cost | Increases the computations and communications overheads |
|
| To acquire pseudonyms, pseudonym refilling is still preferred | Centralized | ECC | PBC library | Ensure the user's unlinkability and anonymity | Computation and communication costs | High computation cost |
|
| overcome the system key escrow problems | Centralized | Hash function only | PBC library | To protect the vehicle’s privacy | Computation and communication costs | Key session attacks and replay attacks vulnerability |
|
| Vulnerable to impersonation attacks and reveal the privacy of users during the communication process | Centralized | ECC | PBC library | Avoiding the risk of compromising the TPD of one vehicle leading | Computational and communication overhead | Password guessing attack |
|
| The complex certificate management problem | Centralized | ECC | MIRACL library | Avoid key escrow problem | Computational and communication overhead | Signature checking increases the computation overhead |
|
| The batch verification can fail due to an invalid request problem | Centralized | pseudonym | PBC library, NS2.34 | Minimize the authentication cost | Computational, communication cost, average delay, and the packet loss ratio | High computation cost due to the utilized bilinear pairing |
|
| Cloning or physical attack | Centralized | bilinear pairing | PBC library | Enhances the system security and privacy | Computational and communication overhead | Large overhead in the verification phase |
Figure 2The AES-RSA algorithm work diagram.
Figure 3Network diagram of the proposed scheme.
Notations.
| Notation | Definition |
|---|---|
| TA | Trusted authority |
| DTA | Domain trusted authority |
| RSU | Road-side unit |
| Vi | Vehicle |
|
| Large prime numbers |
|
| One-way hash function |
| TA’s secret key | |
|
| Vehicle’s identity |
|
| TA’s RSA public key |
|
| TA’s AES public key |
|
| TA’s RSA private key |
|
| Expiration of secret key |
|
| A key session between Vi and TA |
|
| DTA identity |
| A key session between TA and DTA | |
|
| RSU identity |
|
| The key session between DTA and RSU |
| Random numbers | |
|
| DTA signature |
|
| RSU signature |
| Timestamps |
Figure 4Vehicle registration phase.
Figure 5Domain trusted authority registration phase.
Figure 6RSU registration phase.
Figure 7Online joining phase.
Figure 8Online crossover phase.
Comparison of security features.
| ID-CPPA | AAAS | HCDA ( | Proposed scheme | |
|---|---|---|---|---|
| Message integrity and authentication | ✓ | ✓ | × | ✓ |
| Message unforgeability | × | × | ✓ | ✓ |
| Identity privacy-preserving | ✓ | ✓ | ✓ | ✓ |
| Non-repudiation | × | × | × | ✓ |
| Unlinkability | ✓ | ✓ | × | |
| Forward secrecy | × | ✓ | × | ✓ |
| Cross-domain Property | ✓ | ✓ | ✓ | ✓ |
| Offline authentication | × | × | × | ✓ |
| Impersonation Attacks | ✓ | × | ✓ | ✓ |
| Modification attack | ✓ | ✓ | ✓ | ✓ |
| Reply attack | ✓ | ✓ | ✓ | ✓ |
| Man-in the middle attack | ✓ | × | × | ✓ |
| Brute-force attack | × | × | × | ✓ |
Notation and description in BAN logic.
| Notation | Description |
|---|---|
|
| |
|
| B is fresh |
|
| P has jurisdiction over B |
|
| |
|
| |
|
| B or |
|
| |
|
| B is fresh with the key |
|
| |
|
| The current session key |
|
| The message-meaning rule |
|
| The freshness-conjuncatenation rule |
|
| The nonce verification |
|
| The jurisdiction rule |
Figure 9The AVISPA structure.
Figure 11The DTA role in HLPSL.
Figure 12Role specification of the proposed scheme in HLPSL for the session, goal, and environment.
Figure 10The vehicle and RSU roles in HLPSL.
Figure 13(A0B) The simulation results of the proposed scheme.
Comparison of the computation and communication costs of schemes.
| Scheme | Computation cost (ms) | Communication cost (bits) | |||
|---|---|---|---|---|---|
| Vehicle side (Vi) | RSU side | TA side | Total | ||
| ID-CPPA ( |
|
|
| 28.3964 ms | 2,432 bits |
| AAAS ( |
|
|
| 30.3702 ms | 3,264 bits |
| HCDA ( |
|
|
| 28.596 ms | 2,528 bits |
| Proposed scheme |
|
|
| 8.1258 ms | 1,408 bits |
The execution time of different cryptographic operations.
| Cryptographic operation | Time (ms) |
|---|---|
| Bilinear pairing operation | 4.211 |
| Scalar multiplication bilinear pairing in | 1.5654 |
| Point addition of the bilinear pairing in | 0.0106 |
| Map- to-point of the bilinear pairing in | 4.1724 |
| Scalar multiplication of the ECC | 0.6718 |
| Point addition of the ECC in an additive group G | 0.0031 |
| Hash function | 0.001 |
| Point exponentiation | 9.0082 |
| Symmetrical encryption ( | 0.0046 |
| Symmetrical decryption ( | 0.0046 |
| Asymmetric signature ( | 3.8500 |
| Asymmetric signature verification ( | 0.1925 |