Skip to main content
Log in

VANET authentication protocols: security analysis and a proposal

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Wireless communication among vehicular ad hoc network (VANET) entities is secured through cryptography, which is used for authentication as well as to ensure the overall security of messages in this environment. Authentication protocols play a significant role and are therefore required to be free of vulnerabilities that allow entity impersonation, unauthorized entry, and general misuse of the system. A resourceful adversary can inflict serious damage to VANET systems through such vulnerabilities. We consider several VANET authentication protocols in the literature and identify vulnerabilities. In addition to the commonly considered vulnerabilities in VANETs, we observe that the often-overlooked relay attack is possible in almost all VANET authentication protocols. Relay attacks have the potential to cause damage in VANETs through misrepresentation of vehicle identity, telematic data, traffic-related warnings, and information related to overall safety in such networks. We discuss possible countermeasures to address identified vulnerabilities. We then develop an authentication protocol that uses ambient conditions to secure against relay attacks and other considered vulnerabilities. We include security proof for the proposed protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Mohar SS, Goyal S, Kaur R (2022) Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics. J Supercomput 332:22

    Google Scholar 

  2. Ahmed S, Shamshad S, Ghaffar Z, Mahmood K, Kumar N, Parizi RM, Choo K-KR (2021) Signcryption based authenticated and key exchange protocol for EI-Based V2G environment. IEEE Trans Smart Grid 12(6):5290–5298

    Article  Google Scholar 

  3. Mahmood K, Shamshad S, Kumari S, Khan MK, Obaidat MS (2020) Comment on lightweight secure message broadcasting protocol for Vehicle-to-Vehicle communication. IEEE Syst J 15(1):1366–1368

    Article  Google Scholar 

  4. Shamshad S, Saleem MA, Obaidat MS, Shamshad U, Mahmood K, Ayub MF, On the security of a lightweight privacy-preserving authentication protocol for VANETs. IEEE Int Conf Artif Intell Smart Syst (ICAIS), 1766-1770, 2021

  5. Shamshad S, Obaidat MS, Saleem MA, Shamshad U, Mahmood K, (2021) Security analysis on an efficient and provably secure authenticated key agreement protocol for Fog-based Vehicular Ad-Hoc Networks. Int Conf Artif Intell Smart Syst (ICAIS), 1754-1759

  6. Umar M, Islam SKH, Mahmood K, Ahmed S, Ghaffar Z, Saleem MA (2021) Provable secure identity-based anonymous and privacy-preserving inter-vehicular authentication protocol for VANETS using PUF. IEEE Trans Veh Technol 70(11):12158–12167

    Article  Google Scholar 

  7. Krishnan PR, Kumar PAR (2021) A collaborative strategy for detection and eviction of Sybil attacker and Sybil nodes in VANET. Int J Commun Syst 34(3):4621

    Google Scholar 

  8. Haydari A, Yilmaz Y (2018) Real-time detection and mitigation of DDoS attacks in intelligent transportation systems. IEEE Int Conf Intell Trans Syst (ITSC), 157-163

  9. Greenberg A (2015) Hackers remotely kill a Jeep on the highway-with me in it.WIRED. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

  10. A. Greenberg, Securing driverless cars from hackers is hard. Ask the ex-Uber guy who protects them. https://www.wired.com/ 2017/04/ubers-former-top-hacker-securing-autonomous-cars-really-hard-problem/

  11. Golson J (2016) Car hackers demonstrate wireless attack on Tesla Model S.http://www.theverge.com/2016/9/19/12985120/teslamodel-s-hack-vulnerability-keen-labs

  12. Nie S, Liu L, Du Y,Free-fall: hacking tesla from wireless to CAN bus. In: Proceedings of the Black Hat USA 2017, Las Vegas, 1-16, 2017

  13. Miller C, Valasek C, Adventures in automotive networks and control units. http://illmatics.com/car_hacking.pdf

  14. Watchdog C (2019) Kill switch: Why connected cars can be killing machines and how to turn them off.https://www.consumerwatchdog.org/sites/default/files/2019-07/KILL

  15. Mikavika B, Kostić-Lyubisavljević A (2021) Blockchain-based solutions for security, privacy, and trust management in vehicular networks: a survey. J Supercomput 77:9520–9575

    Article  Google Scholar 

  16. Saravanan M, Kumar SM (2021) Improved authentication in vanets using a connected dominating set-based privacy preservation protocol. J Supercomput 77:14630–14651

    Article  Google Scholar 

  17. Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68

    Article  Google Scholar 

  18. Nayak RP, Sethi S, Bhoi SK, Mohapatra D, Sahoo RR, Sharma PK, Putha D (2022) TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network. J Supercomput 78:7948–7981

    Article  Google Scholar 

  19. Beth T, Desmedt Y(1990) Identification tokens - or: solving the chess grandmaster problem. Advances in Cryptology-CRYPTO’90, Springer LNCS 537, 169-177

  20. Ali I, Lawrence T, Omala AA, Li F (2020) An efficient hybrid signcryption scheme conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Trans Veh Technol 69(10):11266–11280

    Article  Google Scholar 

  21. Ali I, Chen Y, Ullah N, Kumar R, He W (2021) An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Trans Veh Technol 70(2):1278–1291

    Article  Google Scholar 

  22. Alladi T, Chakravarty S, Chamola V, Guizani M (2020) A lightweight authentication and attestation scheme for in-transit vehicles in IoV scenario. IEEE Trans Veh Technol 69(12):14188–14197

    Article  Google Scholar 

  23. Asaar MR, Salmasizadeh M, Susilo W, Majidi A (2018) A secure and efficient authentication technique for vehicular ad-Hoc networks. IEEE Trans Veh Technol 67(6):5409–5423

    Article  Google Scholar 

  24. Liu Y, Wang L, Chen H-H (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3697–3710

    Article  Google Scholar 

  25. Azees M, Vijayakumar P, Deborah LJ (2017) EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18(9):2467–2476

    Article  Google Scholar 

  26. Feng Q, He D, Zeadally S, Liang K (2020) BPAS: blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans Industr Inf 16(6):4146–4155

    Article  Google Scholar 

  27. Chen C-M, Deng X, Gan W, Chen J, Islam SKH (2021) A secure blockchain-based group key agreement protocol for IoT. J Supercomput 77:9046–9068

    Article  Google Scholar 

  28. He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681–2691

    Article  Google Scholar 

  29. Ma Z, Zhang J, Guo Y, Liu Y, Liu X, He W (2020) An efficient decentralized key management mechanism for VANET with blockchain. IEEE Trans Veh Technol 69(6):5836–5849

    Article  Google Scholar 

  30. Singh PK, Agarwal A, Nakum G, Rawat DB, Nandi S (2020) MPFSLP: masqueraded probabilistic flooding for source-location privacy in VANETs. IEEE Trans Veh Technol 69(10):11383–11393

    Article  Google Scholar 

  31. Tzeng S-F, Horng S-J, Li T, Wang X, Huang P-H, Khan MK (2017) Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans Veh Technol 66(4):3235–3248

    Article  Google Scholar 

  32. Vijayakumar P, Azees M, Kannan A, Deborah LJ (2016) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):1015–1028

    Article  Google Scholar 

  33. H. Tan, D. Choi, P. Kim, S. Pan, I. Chung, “Comments on “Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks”. ” IEEE Transactions on Intelligent Transportation Systems, 19(7), 2149-2151, July 2018

  34. Azees M (2019) Reply to comments on “Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(9):3595

    Article  Google Scholar 

  35. Wu W-C (2017) A secret push messaging service in VANET clouds. Journal of Supercomputing 73:3085–3097

    Article  Google Scholar 

  36. L. Gong, R. Needham, R. Yahalom, “Reasoning about belief in cryptographic protocols.” Proceedings of the IEEE Symposium on Security and Privacy, 234-248, 1990

Download references

Acknowledgements

We thank the ten anonymous reviewers for their constructive comments and suggestions that helped us improve the content and presentation of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Otto B. Piramuthu.

Ethics declarations

Conflict of interest:

None.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Piramuthu, O.B., Caesar, M. VANET authentication protocols: security analysis and a proposal. J Supercomput 79, 2153–2179 (2023). https://doi.org/10.1007/s11227-022-04736-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04736-5

Keywords

Navigation