SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs

Saad Ali Alfadhli1,2, Songfeng Lu3,4, Abdulaziz Fatani1,5, Haider Al-Fedhly6, Mahmut Ince1
1School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China
2Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC), Baghdad, Iraq
3Hubei Engineering Research Center on Big Data Security, School of Cyber Science & Engineering, Huazhong University of Science and Technology, Wuhan, China
4Nanjing Souwen Information Technology Co., Ltd., Nanjing, China
5Umm AlQura University, Makkah, Saudi Arabia
6Intelligent Manufacturing Systems (IMS) Centre, University of Windsor, Windsor, Canada

Tóm tắt

The basic idea behind the vehicular ad-hoc network (VANET) is the exchange of traffic information between vehicles and the surrounding environment to offer a better driving experience. Privacy and security are the main concerns for meeting the safety aims of the VANET system. In this paper, we analyse recent VANET schemes that utilise a group authentication technique and found important vulnerabilities in terms of driving safety. These systems also suffer from vulnerabilities in terms of management efficiency and computational complexity. To defeat these problems, we propose a lightweight scheme, SD2PA, based on a general hash function for VANET. The proposed scheme overcomes the non-safe driving problem that resulted from the critical driving area. Moreover, the vehicle authentication is only done once by the VANET system administrator during the vehicle’s moving, so the authentication redundancy for the entire system is reduced and system management efficiency is enhanced. The SD2PA scheme also provides anonymity to protect the vehicle’s privacy, unless an important action needs to be taken against a malicious vehicle. A deep computational cost and communicational overhead analysis indicates that SD2PA is better than related schemes, as well as efficiently meeting VANET’s security and privacy needs.

Tài liệu tham khảo

Lee JK, Jeong YS, Park JH (2015) s-ITSF: a service based intelligent transportation system framework for smart accident management. Hum Cent Comput Inf Sci 5(1):34 Papadimitratos P, Fortelle AL, Evenssen K, Brignolo R, Cosenza S (2009) Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun Mag 47(11):84–95 Alfadhli SA, Alresheedi S, Lu S, Fatani A, Ince M (2019) ELCPH: An efficient lightweight conditional privacy-preserving authentication scheme based on hash function and local group secrete key for VANET. In: Proceedings of the 2019 the world symposium on software engineering pp 32–36 Bajaj K, Limbasiya T, Das D (2020) An efficient message transmission and verification scheme for VANETs. In: International conference on distributed computing and internet technology. Springer, Cham pp 127–143 Pournaghi SM, Zahednejad B, Bayat M, Farjami Y (2018) NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput Netw 134:78–92 Grover K, Lim A, Lee S (2015) Efficient authentication approach for highly dynamic vehicular ad hoc networks. Int J Ad Hoc Ubiquit Comput 19:193–207 Guo J, Li X, Liu Z, Ma J, Yang C, Zhang J, Wu D (2020) TROVE: a context awareness trust model for VANETs using reinforcement learning. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2020.2975084 Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for VANETs with batch verification. Wireless Netw 21(5):1733–1743 Sheikh MS, Liang J, Wang W (2020) Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey. Wirel Commun Mobile Comput. https://doi.org/10.1155/2020/5129620 Malhi AK, Batra S, Pannu HS (2019) Security of vehicular ad hoc networks: a comprehensive survey. Comput Secur. https://doi.org/10.1016/j.cose.2019.101664 Manivannan D, Moni SS, Zeadally S (2020) Secure authentication and privacy-preserving techniques in Vehicular Ad hoc NETworks (VANETs). Veh Commun. https://doi.org/10.1016/j.vehcom.2020.100247 Zhang C, Lin X, Lu R, Ho PH, Shen X (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(6):3357–3368 Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for VANET. Wirel Netw 19(6):1441–1449 Alamer A, Basudan S (2020) An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing. Eng Appl Artif Intell 91:103583 Cui J, Xu W, Han Y, Zhang J, Zhong H (2020) Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Veh Commun 21:100200 Kakkasageri MS, Manvi SS (2014) Information management in vehicular ad hoc networks: a review. J Netw Comput Appl 39:334–350 Bitam S, Mellouk A, Zeadally S (2015) VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks. IEEE Wirel Commun 22(1):96–102 Xia Z, Hu Z, Luo J (2017) UPTP vehicle trajectory prediction based on user preference under complexity environment. Wirel Pers Commun 97(3):4651–4665 Yi K, Du R, Liu L, Chen Q, Gao K (2017) Fast participant recruitment algorithm for large-scale vehicle-based mobile crowd sensing. Pervasive Mobile Comput 38:188–199 Granados JÁ, Batalla JM, Togay C (2020) Redundant localization system for automatic vehicles. Mech Syst Signal Process 136:106433 Cui J, Wei L, Zhang J, Xu Y, Zhong H (2019) An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(5):1621–1632 Cui J, Tao X, Zhang J, Xu Y, Zhong H (2018) HCPA-GKA: a hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs. Veh Commun 14:15–25 Cui J, Zhang J, Zhong H, Xu Y (2017) SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans Veh Technol 66(11):10283–10295 Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68 Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X (2008) Security in vehicular ad hoc networks. IEEE Commun Mag 46(4):88–95 Lin X, Sun X, Ho PH, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456 Sun X, Lin X, Ho PH (2007) Secure vehicular communications based on group signature and ID-based signature scheme. In: 2007 IEEE international conference on communications pp 1539–1545 Guo J, Baugh JP, Wang S (2007) A group signature based secure and privacy-preserving vehicular communication framework. In: 2007 mobile networking for vehicular environments pp 103–108 Lu R, Lin X, Liang X, Shen X (2012) A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans Intell Transp Syst 13(1):127–139 Rajput U, Abbas F, Oh H (2016) A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 4:7770–7784 Zhang C, Ho PH, Tapolcai J (2011) On batch verification with group testing for vehicular communications. Wirel Netw 17(8):1851–1865 Chim TW, Yiu SM, Hui LC, Li VO (2011) SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw 9(2):189–203 Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T, Khan MK (2013) b-SPECS+ : batch verification for secure pseudonymous authentication in VANET. IEEE Trans Inf Forensics Secur 8(11):1860–1875 Shim KA (2012) CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Technol 61(4):1874–1883 Liu JK, Yuen TH, Au MH, Susilo W (2014) Improvements on an authentication scheme for vehicular sensor networks. Expert Syst Appl 41(5):2559–2564 Jianhong Z, Min X, Liying L (2014) On the security of a secure batch verification with group testing for VANET. Int J Netw Secur 16(5):355–362 Wang Y, Zhong H, Xu Y, Cui J, Guo F (2016) Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs. Secur Commun Netw 9(18):5460–5471 Zhang L, Hu C, Wu Q, Domingo-Ferrer J, Qin B (2016) Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans Comput 65(8):2562–2574 Tzeng SF, Horng SJ, Li T, Wang X, Huang PH, Khan MK (2017) Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans Veh Technol 66(4):3235–3248 Xie Y, Wu L, Zhang Y, Shen J (2016) Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chin J Electron 25(5):950–956 Zhong H, Wen J, Cui J, Zhang S (2016) Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Sci Technol 21(6):620–629 Wu L, Fan J, Xie Y, Wang J, Liu Q (2017) Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int J Distrib Sens Netw 13(3):1–13 Alazzawi MA, Lu H, Yassin AA, Chen K (2019) Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access 7:71424–71435 Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B (2017) Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust Comput 20(3):2439–2450 Zhang C, Lu R, Lin X, Ho PH, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-the 27th conference on computer communications pp 246–250 Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. Proc IEEE 99(7):1162–1182 Xie K, Ning X, Wang X, He S, Ning Z, Liu X, Wen J, Qin Z (2017) An efficient privacy-preserving compressive data gathering scheme in WSNs. Inf Sci 390:82–94 Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89 Singh SK, Rathore S, Park JH (2019) Blockiotintelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence. Fut Gener Comput Syst. https://doi.org/10.1016/j.future.2019.09.002 Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD (2014) Cuckoo filter: Practically better than bloom. In: Proceedings of the 10th ACM international on conference on emerging networking experiments and technologies. pp 75–88 Burrows M, Abadi M, Needham RM (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36