Skip to main content
Log in

Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”

  • regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The advent of the Internet of Things has enriched the network field with new themes, among which we find the Internet of Vehicles (IoV). IoV improved the various smart traffic applications for management or security. It makes vehicles autonomously deal with the unexpected by sharing various resources like critical information, computing resources, etc. Nonetheless and as a user of current network technologies, IoV suffers from the same vulnerabilities of these technologies, which makes it vulnerable to various kinds of attacks that affect security and privacy. To overcome these new challenges, researchers have considered different IoV authentication protocols. However, most of them are compromised and contain real security problems. Dealing with IoV authentication protocol security flaws is a real challenge. Recently, Jiang et al. (Comput Commun 173:45–55, 2021) designed a three-factor authentication protocol for IoV environment. The proposed protocol combines lightweight operations that include elliptic curve cryptography, hash function, physically unclonable function, concatenation on one side, and XOR operation on the other side. Contrariwise, it contains several flaws. In this paper, we detailed the security analysis of Jiang et al. protocol that proves the limit of security guarantees between only user and data center due to the possibility for an adversary to deduce a session key shared between vehicle sensor and data center and between vehicle sensor and user. Moreover, regarding these limitations, we propose an improvement to remedy all the said security pitfalls.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Qureshi, K.N., Din, S., Jeon, G., Piccialli, F.: Internet of vehicles: key technologies, network model, solutions and challenges with future aspects. IEEE Trans. Intell. Transp. Syst. 22(3), 1777–1786 (2021). https://doi.org/10.1109/TITS.2020.2994972

    Article  Google Scholar 

  2. Zhou, J., Tian, D., Wang, Y., Sheng, Z., Duan, X., Leung, V.C.: Reliability-optimal cooperative communication and computing in connected vehicle systems. IEEE Trans. Mob. Comput. 19(5), 1216–1232 (2020). https://doi.org/10.1109/TMC.2019.2907491

    Article  Google Scholar 

  3. Jiang, Q., Zhang, X., Zhang, N., Tian, Y., Ma, X., Ma, J.: Three-factor authentication protocol using physical unclonable function for IoV. Comput. Commun. 173, 45–55 (2021)

    Article  Google Scholar 

  4. Cheng, J., Yuan, G., Zhou, M., Gao, S., Liu, C., Duan, H., Zeng, Q.: Accessibility analysis and modeling for IoV in an urban scene. IEEE Trans. Veh. Technol. 69(4), 4246–4256 (2020). https://doi.org/10.1109/TVT.2020.2970553

    Article  Google Scholar 

  5. Wang, J., Jiang, C., Han, Z., Ren, Y., Hanzo, L.: Internet of vehicles: sensing-aided transportation information collection and diffusion. IEEE Trans. Veh. Technol. 67(5), 3813–3825 (2018). https://doi.org/10.1109/TVT.2018.2796443

    Article  Google Scholar 

  6. Saleem, M.A., Mahmood, K., Kumari, S.: Comments on “AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment”. IEEE Internet Things J. 7(5), 4671–4675 (2020). https://doi.org/10.1109/JIOT.2020.2975207

  7. Saleem, M.A., Hamshad, S., Ahmed, S., Ghaffar, Z., Mahmood, K.: Security analysis on “A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems’’. IEEE Syst J 2, 1–3 (2021). https://doi.org/10.1109/JSYST.2021.3073537

    Article  Google Scholar 

  8. Mahmood, K., Shamshad, S., Kumari, S., Khan, M.K., Obaidat, M.S.: Comment on “lightweight secure message broadcasting protocol for vehicle-to-vehicle communication’’. IEEE Syst. J. 15(1), 1366–1368 (2021). https://doi.org/10.1109/JSYST.2020.3029895

    Article  Google Scholar 

  9. Akram, M.A., Mahmood, K., Kumari, S., Xiong, H.: Comments on “toward secure and provable authentication for internet of things: realizing industry 4.0. IEEE Internet Things J 7(5), 4676–4681 (2020). https://doi.org/10.1109/JIOT.2020.2977475

    Article  Google Scholar 

  10. Shamshad, S., Mahmood, K., Kumari, S., Khan, M.K.: Comments on “Insider attack protection: Lightweight password-based authentication techniques using ECC’’. IEEE Syst. J. 15(1), 877–880 (2021). https://doi.org/10.1109/JSYST.2020.2986377

    Article  Google Scholar 

  11. Wazid, M., Bagga, P., Das, A.K., Shetty, S., Rodrigues, J.J.P.C., Park, Y.: AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J. 6(5), 8804–8817 (2019). https://doi.org/10.1109/JIOT.2019.2923611

    Article  Google Scholar 

  12. Butun, I., Österberg, P., Song, H.: Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 22(1), 616–644 (2020). https://doi.org/10.1109/COMST.2019.2953364

    Article  Google Scholar 

  13. Masood, A., Lakew, D.S., Cho, S.: Security and privacy challenges in connected vehicular cloud computing. IEEE Commun. Surv. Tutor. 22(4), 2725–2764 (2020). https://doi.org/10.1109/COMST.2020.3012961

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ilyes Ahmim.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmim, I., Ghoualmi-Zine, N., Ahmim, A. et al. Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”. Int. J. Inf. Secur. 21, 1019–1026 (2022). https://doi.org/10.1007/s10207-022-00595-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-022-00595-6

Keywords

Navigation