Skip to main content

Advertisement

Log in

PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Vehicle-to-Vehicle (V2V) broadcast communication plays a crucial role in ensuring road safety in Intelligent Transport System (ITS) domain, but ensuring the authenticity and integrity of exchanged messages used by safety applications presents challenges. While the Timed Efficient Stream Loss-tolerant Authentication (TESLA) offers low computation overhead as it is primarily built on symmetric cryptographic primitives like MAC and hash chain technique, its inherent authentication delay may exceed the tolerable latency for future safety applications. To address these issues, we propose the Prompt Verification (PV) model, a modified version of TESLA which eliminates authentication delay by broadcasting the verification key with the message. Although the PV model provides benefits such as faster message verification and prevention of memory-based DoS attacks, it introduces a vulnerability exploitable by malicious users. To mitigate this vulnerability, we conduct a comprehensive analysis, evaluating its significance through a developed threat model and risk analysis framework. Our findings underscore the substantial risk posed by impersonation attacks, which could endanger lives and property. To counter these risks, we propose to integrate PV with TESLA, complemented by RSSI based message consistency checking scheme (RMCCS) for enhanced lightweight false message detection. Simulation results demonstrate an 85% reduction in authentication delays compared with standard TESLA and existing schemes, along with increased resilience against impersonation attacks. The PV+TESLA model, integrated with RMCCS, offers a robust solution for securing safety messages in V2V broadcast communication systems, showcasing its practical viability and effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data Availability

No datasets were generated or analysed during the current study.

References

  1. Li, P., Xin-Lin, H., Hu, F.: How to jointly predict and select idle channels? IEEE Trans. Veh. Technol.Veh. Technol. (2024). https://doi.org/10.1109/TVT.2024.3399211

    Article  Google Scholar 

  2. Decarli, N., Bartoletti, S., Bazzi, A., Stirling-Gallacher, R.A., Masini, B.M.: Performance characterization of joint communication and sensing with beyond 5 G NR-V2X sidelink. IEEE Trans. Veh. Technol.Veh. Technol. (2024). https://doi.org/10.1109/TVT.2024.3365770

    Article  Google Scholar 

  3. Sedar, R., Kalalas, C., Francisco, V.-G., Alonso, L., Jesus, A.-Z.: A comprehensive survey of V2X cybersecurity mechanisms and future research paths. IEEE Open J Commun Soc 4, 325–391 (2023)

    Article  Google Scholar 

  4. Boualouache, A., Bouziane, B., Tang, Q., Abdelaziz, A.K., Sylvain, C., Sidi-Mohammed, S., Pardo, E., Yacine, G.-D., Langar, R., Engel, T.: 5G vehicle-to-everything at the cross-borders: security challenges and opportunities. IEEE Internet Things Mag 6, 114–119 (2023)

    Article  Google Scholar 

  5. Huang, J., Fang, D., Qian, Y., Hu, R.: Recent advances and challenges in security and privacy for V2X communications. IEEE Open J Veh Technol 1, 244–266 (2020)

    Article  Google Scholar 

  6. Maaloul, S., Aniss, H., Kassab, M., Berbineau, M.: Classification of C-ITS services in vehicular environments. IEEE Access 9, 117868–117879 (2021)

    Article  Google Scholar 

  7. Alshaeri, A., Younis, M.: Efficient distributed authentication for intelligent transportation systems using mobile devices. IEEE Trans. Intell. Transp. Syst.Intell. Transp. Syst. (2024). https://doi.org/10.1109/TITS.2024.3376517

    Article  Google Scholar 

  8. Lyu, C., Pande, A., Zhang, Y., Gu, D., Mohapatra, P.: Enabling fast and privacy-preserving broadcast authentication with efficient revocation for inter-vehicle connections. IEEE Trans. Mob. Comput.Comput. (2023). https://doi.org/10.1109/TMC.2023.3275218

    Article  Google Scholar 

  9. Eledlebi, K., Yeun, C., Damiani, E., Al-Hammadi, Y.: Empirical studies of TESLA protocol: properties, implementations, and replacement of public cryptography using biometric authentication. IEEE Access, 21941–21954 (2022)

  10. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA Cryptobytes 5 (2005)

  11. Muhammad, M., Safdar, G.: 5G-based V2V broadcast communications: a security perspective.” Array 11, 100084 (2021)

  12. Neish, A., Todd, W., Per, E.: Parameter selection for the TESLA keychain. In Proceedings of the 31st international technical meeting of the satellite division of the institute of navigation (ION GNSS+ 2018), pp. 2155–2171 (2018)

  13. Jahanian, M.H., Farshad, A., Amir, H.J.: Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets. In IEEE 6th international conference on information and communication systems (ICICS), pp. 222–227 (2015)

  14. Eledlebi, K., Ahmed, A.A., Chan, Y.Y., Ernesto, D., Victor, M., Yousof, A.-H.: Enhanced Inf-TESLA protocol: a continuous connectivity and low overhead authentication protocol via IoT devices. IEEE Access 10, 54912–54921 (2022)

    Article  Google Scholar 

  15. 3GPP.: Service requirements for enhanced V2X scenarios (release 15). In 3rd generation partnership project, Technical Report. 3GPP TR 22.186 V15.0.0 (2017)

  16. Muhammad, M., Safdar, G.A.: V2X application server and vehicle centric distribution of commitments for V2V message authentication. Ad Hoc Netw 167, 103701 (2025)

  17. Muhammad, M., Paul, K., Adel, A., Junaid, A., Andreas, K.: RMCCS: RSSI-based message consistency checking scheme for V2V communications. In Proceedings of the 18th international conference on security and cryptography (SECRYPT), pp. 722–727 (2021)

  18. Issac, G.A., Mary, A.J.: Validation scheme for VANET. In IEEE 2nd international conference on signal processing and communication (ICSPC), pp. 11–15 (2019)

  19. Lyu, C., Gu, D., Zhang, X., Sun, S., Tang, Y.: Efficient, fast and scalable authentication for VANETS. In IEEE wireless communications and networking conference (WCNC) (2013)

  20. Lyu, C., Gu, D., Zeng, Y., Mohapatra, P.: PBA: prediction-based authentication for vehicle-to-vehicle communications. IEEE Trans. Dependable Secure Comput.Comput. 13(1), 71–83 (2016)

    Article  Google Scholar 

  21. Lalli, M., Graphy, G.S.: Prediction based dual authentication model for VANET. In International conference on computing methodologies and communication (ICCMC) (2017)

  22. Eledlebi, K., Chan, Y.Y., Ernesto, D., Al-Hammadi, Y.: Empirical studies of TESLA protocol: properties, implementations, and replacement of public cryptography using biometric authentication. IEEE Access 10, 21941–21954 (2022)

    Article  Google Scholar 

  23. Studer, A., Fan, B., Bhargav, B., Adrian, P.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw.Commun Netw 11(6), 574–588 (2009)

    Article  Google Scholar 

  24. Câmara, S., Dhananjay, A., Victoria, P., Carmo, L.: Multicast delayed authentication for streaming synchrophasor data in the smart grid. In ICT systems security and privacy protection: 31st IFIP TC 11 international conference (2016)

  25. Hathal, W., Haitham, C., Zhili, S., Carsten, M.: Certificateless and lightweight authentication scheme for vehicular communication networks. IEEE Trans. Veh. Technol.Veh. Technol. 69(12), 16110–16125 (2020)

    Article  Google Scholar 

  26. Sun, M., Li, M., Gerdes, R.: A data trust framework for VANETs enabling false data detection and secure vehicle tracking. In IEEE conference on communications and network security (CNS), pp. 1–9 (2017)

  27. Hussain, R., Lee, J., Zeadally, S.: Trust in VANET: a survey of current solutions and future research opportunities. IEEE Trans. Intell. Transp. Syst. 22 (5), 2553–2571 (2020)

  28. E.-T. 102-731: Intelligent transport systems (ITS); security; security services and architecture. ETSI (2010)

  29. Sarker, A., Shen, H.: A data-driven misbehavior detection system for connected autonomous vehicles. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(2), 1–21 (2018)

  30. Ruj, S., Marcos, A. C., Zhen, H., Amiya, N., Ivan, S.: On data-centric misbehavior detection in VANETs. In IEEE vehicular technology conference (VTC Fall), pp. 1–5 (2011)

  31. ETSI: Intelligent transport systems (ITS); vehicular communications; basic set of applications; local dynamic map (LDM); rationale for and guidance on standardization. ETSI TR 102 863 vol. V1.1.1 (2011)

  32. ETSI: Intelligent transport systems (ITS); vehicular communications; basic set of applications; definitions ETSI TR 102 638. V.1.1.1. ETSI (2009)

  33. ETSI: Intelligent transport systems (ITS); V2X applications; part 2: intersection collision risk warning (ICRW) application requirements specification ETSI TS 101 539-2 V1.1.1. ETSI (2018)

  34. Ahmad, F., Asma, A.: A novel context-based risk assessment approach in vehicular networks. In 30th International conference on advanced information networking and applications workshops (WAINA), pp. 466–474 (2016)

  35. Kadhirvelan, S.P., Andrew, S.-R.: Threat modelling and risk assessment within vehicular systems. Master’s Thesis, Chalmers University of Technology (2014)

  36. NXP. RoadLINK® SAF5400 single chip modem for V2X. https://www.nxp.com/products/wireless/dsrc-safety-modem/roadlink-saf5400-single-chip-modem-for-v2x:SAF5400

  37. Monga, R., Deepak, M.: Sumo (simulation of urban mobility) and osm (open street map) implementation. In 11th international conference on system modeling & advancement in research trends (SMART), IEEE, pp. 534–538 (2022)

  38. Van Der, H., Rens, W., Thomas, L., Frank, K.: Veremi: a dataset for comparable evaluation of misbehavior detection in VANETS. In Security and privacy in communication networks: 14th international conference, SecureComm 2018. Singapore, Springer International Publishing, pp. 318–337 (2018)

  39. Liu, X., Lily, Y., Ignacio, A., Kathiravetpillai, S., Arvind, M., Fabian, O., Cornelius, B., Manoj, S., Leonardo, G.B.: MISO-V: misbehavior detection for collective perception services in vehicular communications. In 2021 IEEE intelligent vehicles symposium (IV), pp. 369–376 (2021)

Download references

Author information

Authors and Affiliations

Authors

Contributions

We confirm that listed authors have made following contributions. Mujahid Muhammad wrote initial draft, performed simulations and initial results followed by formal security analysis. Ghazanfar Ali Safdar thoroughly revised the manuscript, added diagrams related to prompt verification vulnerability assessment, refined discussion and analysis section, added and refined paper structure for ease of reading, and improved overall paper presentation including detailed discussion about the results. Ghazanfar Ali Safdar finally has made the paper ready for submission and is the corresponding author too.

Corresponding author

Correspondence to Ghazanfar Ali Safdar.

Ethics declarations

Competing interest

The authors declare no competing interests.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muhammad, M., Safdar, G.A. PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks. J Netw Syst Manage 33, 32 (2025). https://doi.org/10.1007/s10922-025-09910-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-025-09910-7

Keywords