skip to main content
10.1145/3571306.3571431acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

SMMAP: Secure MAC-based Mutual Authentication Protocol for IoV

Authors Info & Claims
Published:04 January 2023Publication History

ABSTRACT

Internet of Vehicles (IoV) is the emerging domain in the Intelligent Transportation System (ITS), which facilitate synergic decision from the human being involved in the network and has been a focus of research in the past few years. IoV has the capabilities of large-scale data sensing, collection, and sharing of information between vehicles to the roadside unit and other smart nodes in the environment, allowing dynamic and spontaneous communication. However, these communications in IoV are more prone to security attacks and still face enormous challenges in the aspect of security and privacy. This paper presents an effective and lightweight Secure MAC-based Mutual Authentication Protocol (SMMAP) for IoV and a mechanism for secure communication between vehicles and other smart units of IoV. We provide a rigorous proof of security and authenticity for the proposed SMMAP scheme using the BAN logic. Qualitative and quantitative analysis has been concluded in the paper, which depicts that the SMMAP has better performance than other existing state-of-the-art schemes.

References

  1. [1]Dimitrakopoulos, George, and Panagiotis Demestichas. "Intelligent transportation systems." IEEE Vehicular Technology Magazine 5, no. 1 (2010): 77-84.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2]Yousefi, Saleh, Mahmoud Siadat Mousavi, and Mahmood Fathy. "Vehicular ad hoc networks (VANETs): challenges and perspectives." In 2006 6th International Conference on ITS Telecommunications, pp. 761-766. IEEE, 2006.Google ScholarGoogle Scholar
  3. [3]Sikarwar, Himani, Ankur Nahar, and Debasis Das. "LABVS: Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV)." In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1-6. IEEE, 2020.Google ScholarGoogle Scholar
  4. [4]Sikarwar, Himani, Debasis Das, and Sumit Kalra. "Efficient Authentication Scheme Using Blockchain in IoT Devices." In International Conference on Advanced Information Networking and Applications, pp. 630-641. Springer, Cham, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5]Sharma, Nishant, Naveen Chauhan, and Narottam Chand. "Security challenges in Internet of Vehicles (IoV) environment." In 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 203-207. IEEE, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6]Ang, Li-Minn, Kah Phooi Seng, Gerald K. Ijemaru, and Adamu Murtala Zungeru. ”Deployment of UIoV for Smart Cities: Applications, Architecture, and Challenges.” IEEE Access 7 (2018): 6473-6492.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7]Feldman, Paul. "A practical scheme for non-interactive verifiable secret sharing." In 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427-438. IEEE, 1987.Google ScholarGoogle Scholar
  8. [8]Lyu, Chen, Dawu Gu, Yunze Zeng, and Prasant Mohapatra. "PBA: Prediction-based authentication for vehicle-to-vehicle communications." IEEE transactions on dependable and secure computing 13, no. 1 (2016): 71-83.Google ScholarGoogle Scholar
  9. [9]Liu, Jingwei, Qingqing Li, Rong Sun, Xiaojiang Du, and Mohsen Guizani. "An Efficient mutual Authentication Scheme for Internet of Vehicles." In 2018 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2018.Google ScholarGoogle Scholar
  10. [10]N. Lo and J. Tsai, ”An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings,” in IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1319-1328, May 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Benyamina, Zakarya, Khelifa Benahmed, and Fateh Bounaama. "ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks." Computer Networks 164 (2019): 106899.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Azees, Maria, Pandi Vijayakumar, and Lazarus Jegatha Deboarh. "EAAP: Efficient mutual authentication with conditional privacy-preserving scheme for vehicular ad hoc networks." IEEE Transactions on Intelligent Transportation Systems 18, no. 9 (2017): 2467-2476.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Shao, Jun, Xiaodong Lin, Rongxing Lu, and Cong Zuo. "A threshold mutual authentication protocol for VANETs." IEEE Transactions on vehicular technology 65, no. 3 (2015): 1711-1720.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Zhao, Zhen, Jie Chen, Yueyu Zhang, and Lanjun Dang. "An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks." KSII Transactions on Internet & Information Systems 9, no. 10 (2015).Google ScholarGoogle Scholar
  15. [15] Xiong, Hu, Konstantin Beznosov, Zhiguang Qin, and Matei Ripeanu. "Efficient and spontaneous privacy-preserving protocol for secure vehicular communication." In 2010 IEEE International Conference on Communications, pp. 1-6. IEEE, 2010.Google ScholarGoogle Scholar
  16. [16]Boneh, Dan, Xavier Boyen, and Hovav Shacham. "Short group signatures." In Annual International Cryptology Conference, pp. 41-55. Springer, Berlin, Heidelberg, 2004.Google ScholarGoogle Scholar
  17. [17]Zhang, Chenxi, Rongxing Lu, Xiaodong Lin, P-H. Ho, and Xuemin Shen. "An efficient identity-based batch verification scheme for vehicular sensor networks." In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246-250. IEEE, 2008.Google ScholarGoogle Scholar
  18. [18] Lee, Cheng-Chi, and Yan-Ming Lai. "Toward a secure batch verification with group testing for VANET." Wireless networks 19, no. 6 (2013): 1441-1449.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19]Liu, Jingwei, Qingqing Li, Rong Sun, Xiaojiang Du, and Mohsen Guizani. "An Efficient mutual Authentication Scheme for Internet of Vehicles." In 2018 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2018.Google ScholarGoogle Scholar
  20. [20] Pournaghi, Seyed Morteza, Behnam Zahednejad, Majid Bayat, and Yaghoub Farjami. "NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET." Computer Networks 134 (2018): 78-92.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Bayat, Majid, Mostafa Barmshoory, Majid Rahimi, and Mohammd Reza Aref. "A secure authentication scheme for VANETs with batch verification." Wireless networks 21, no. 5 (2015): 1733-1743.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22]Chen, Chien-Ming, Bin Xiang, Yining Liu, and King-Hang Wang. "A secure authentication protocol for Internet of vehicles." IEEE Access 7 (2019): 12047-12057.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23]Canetti, Ran, and Hugo Krawczyk. "Analysis of key-exchange protocols and their use for building secure channels." In International conference on the theory and applications of cryptographic techniques, pp. 453-474. Springer, Berlin, Heidelberg, 2001.Google ScholarGoogle Scholar
  24. [24]Bleeker, Annette, and Lambert Meertens. "A semantics for BAN logic." In Proceedings of the DIMACS workshop on design and formal verification of security protocols. 1997.Google ScholarGoogle Scholar

Index Terms

  1. SMMAP: Secure MAC-based Mutual Authentication Protocol for IoV

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICDCN '23: Proceedings of the 24th International Conference on Distributed Computing and Networking
      January 2023
      461 pages
      ISBN:9781450397964
      DOI:10.1145/3571306

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 January 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)53
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format