| Literature DB >> 35270843 |
Mahmood A Al-Shareeda1, Mohammed Anbar1, Selvakumar Manickam1, Iznan H Hasbullah1.
Abstract
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks. Achieving rapid message signing and verification for authentication is challenging due to complex operations, such as bilinear pairs. This paper proposes a secure pseudonym-based conditional privacy-persevering authentication scheme for communication security in VANETs. The Elliptic Curve Cryptography (ECC) and secure hash cryptographic function were used in the proposed scheme for signing and verifying messages. After a vehicle receives a significant amount of pseudo-IDs and the corresponding signature key from the Trusted Authority (TA), it uses them to sign a message during the broadcasting process. Thus, the proposed scheme requires each vehicle to check all the broadcasting messages received. Besides, in the proposed scheme, the TA can revoke misbehaving vehicles from continuously broadcasting signed messages, thus preventing insider attacks. The security analysis proved that the proposed scheme fulfilled the security requirements, including identity privacy-preservation, message integrity and authenticity, unlinkability, and traceability. The proposed scheme also withstood common security attacks such as man-in-the-middle, impersonation, modification, and replay attacks. Besides, our scheme was resistant against an adaptive chosen-message attack under the random oracle model. Furthermore, our scheme did not employ bilinear pairing operations; therefore, the performance analysis and comparison showed a lower resulting overhead than other identity-based schemes. The computation costs of the message signing, individual signature authentication, and batch signature authentication were reduced by 49%, 33.3%, and 90.2%, respectively.Entities:
Keywords: Elliptic Curve Cryptography (ECC); Vehicular Ad hoc Networks (VANETs); pseudonym identity scheme; random oracle model; security and privacy requirements
Mesh:
Year: 2022 PMID: 35270843 PMCID: PMC8914974 DOI: 10.3390/s22051696
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The structure of the VANET.
Figure 2Overall flowchart of the proposed scheme.
Notations and their description.
| Notations | Descriptions |
|---|---|
|
| Two large prime numbers |
|
| A large prime number |
|
| The elliptic curve |
|
| The additive group based on E |
|
| The base generator P∈ G |
|
| The three functions of the one-way hash |
| The identity and password of the vehicle | |
| The private and public key of the system | |
| The pseudo-identity of the vehicle | |
| ⊕ | The XOR operator |
|
| The list of pseudo-identities |
|
| The random secret value |
| ‖ | The concatenation operation |
|
| The list of signature keys |
Figure 3Input parameters and assigned values for the illustrative examples.
Figure 4List of pseudonym-IDs and the corresponding signature keys.
Figure 5Broadcasting message signature tuple in the VANET.
Figure 6The process of the system resisting attacks.
Comparison of the security issues.
| [ | [ | [ | Proposed | |
|---|---|---|---|---|
| SC-1 | ✓ | ✗ | ✗ | ✗ |
| SC-2 | ✓ | ✓ | ✗ | ✗ |
| SC-3 | ✗ | ✗ | ✓ | ✗ |
Figure 7VANET simulation.
Simulation experiment parameters.
| Parameters | Value |
|---|---|
| Simulation time | 200 s |
| Playground size | x = 3463 m, y = 4270 m and z = 50 m |
| Mac layer | IEEE 1609.4 |
| Physical layer | IEEE 802.11p |
| Maximum transmission | 20 mW |
| Bit rate | 6 Mbps |
| Number of vehicles | 500 |
| Minimum speed | 30 Km/H |
| Maximum speed | 60 Km/H |
Figure 8Signing and verifying messages in OMNeT++.
Figure 9Data flow for sending and receiving messages.
The computation cost of the five authentication schemes.
| Scheme |
|
|
|
|---|---|---|---|
| Jianhong et al. [ |
|
|
|
| He et al. [ |
|
|
|
| Wu et al. [ |
|
|
|
| Cui et al. [ |
|
|
|
| Our scheme |
|
|
|
Figure 10The computation cost’s speed.
Improvement of computation overhead comparison.
| Scheme |
|
| |
|---|---|---|---|
| Jianhong et al. [ | 96.9% | 94.5% | 97.8% |
| He et al. [ | 66.7% | 33.4% | 90.3% |
| Wu et al. [ | 49.9% | 50% | 94.9% |
| Cui et al. [ | 49% | 33.3% | 90.2% |
Figure 11Average delay to a sign message in OMNeT++.
Figure 12Average delay to verify a message in OMNeT++.
Comparison of communication costs.
| Schemes | Single Message (Bytes) | Batch Messages (Bytes) |
|---|---|---|
| Jianhong et al. [ | 388 | 388 n |
| He et al. [ | 144 | 144 n |
| Wu et al. [ | 148 | 148 n |
| Cui et al. [ | 84 | 84 n |
| Our scheme | 104 | 104 n |