ABSTRACT
Internet of Vehicles (IoV) is the emerging domain in the Intelligent Transportation System (ITS), which facilitate synergic decision from the human being involved in the network and has been a focus of research in the past few years. IoV has the capabilities of large-scale data sensing, collection, and sharing of information between vehicles to the roadside unit and other smart nodes in the environment, allowing dynamic and spontaneous communication. However, these communications in IoV are more prone to security attacks and still face enormous challenges in the aspect of security and privacy. This paper presents an effective and lightweight Secure MAC-based Mutual Authentication Protocol (SMMAP) for IoV and a mechanism for secure communication between vehicles and other smart units of IoV. We provide a rigorous proof of security and authenticity for the proposed SMMAP scheme using the BAN logic. Qualitative and quantitative analysis has been concluded in the paper, which depicts that the SMMAP has better performance than other existing state-of-the-art schemes.
- [1]Dimitrakopoulos, George, and Panagiotis Demestichas. "Intelligent transportation systems." IEEE Vehicular Technology Magazine 5, no. 1 (2010): 77-84.Google ScholarCross Ref
- [2]Yousefi, Saleh, Mahmoud Siadat Mousavi, and Mahmood Fathy. "Vehicular ad hoc networks (VANETs): challenges and perspectives." In 2006 6th International Conference on ITS Telecommunications, pp. 761-766. IEEE, 2006.Google Scholar
- [3]Sikarwar, Himani, Ankur Nahar, and Debasis Das. "LABVS: Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV)." In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1-6. IEEE, 2020.Google Scholar
- [4]Sikarwar, Himani, Debasis Das, and Sumit Kalra. "Efficient Authentication Scheme Using Blockchain in IoT Devices." In International Conference on Advanced Information Networking and Applications, pp. 630-641. Springer, Cham, 2020.Google ScholarCross Ref
- [5]Sharma, Nishant, Naveen Chauhan, and Narottam Chand. "Security challenges in Internet of Vehicles (IoV) environment." In 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 203-207. IEEE, 2018.Google ScholarCross Ref
- [6]Ang, Li-Minn, Kah Phooi Seng, Gerald K. Ijemaru, and Adamu Murtala Zungeru. ”Deployment of UIoV for Smart Cities: Applications, Architecture, and Challenges.” IEEE Access 7 (2018): 6473-6492.Google ScholarCross Ref
- [7]Feldman, Paul. "A practical scheme for non-interactive verifiable secret sharing." In 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427-438. IEEE, 1987.Google Scholar
- [8]Lyu, Chen, Dawu Gu, Yunze Zeng, and Prasant Mohapatra. "PBA: Prediction-based authentication for vehicle-to-vehicle communications." IEEE transactions on dependable and secure computing 13, no. 1 (2016): 71-83.Google Scholar
- [9]Liu, Jingwei, Qingqing Li, Rong Sun, Xiaojiang Du, and Mohsen Guizani. "An Efficient mutual Authentication Scheme for Internet of Vehicles." In 2018 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2018.Google Scholar
- [10]N. Lo and J. Tsai, ”An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings,” in IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1319-1328, May 2016.Google ScholarDigital Library
- [11] Benyamina, Zakarya, Khelifa Benahmed, and Fateh Bounaama. "ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks." Computer Networks 164 (2019): 106899.Google ScholarDigital Library
- [12] Azees, Maria, Pandi Vijayakumar, and Lazarus Jegatha Deboarh. "EAAP: Efficient mutual authentication with conditional privacy-preserving scheme for vehicular ad hoc networks." IEEE Transactions on Intelligent Transportation Systems 18, no. 9 (2017): 2467-2476.Google ScholarDigital Library
- [13] Shao, Jun, Xiaodong Lin, Rongxing Lu, and Cong Zuo. "A threshold mutual authentication protocol for VANETs." IEEE Transactions on vehicular technology 65, no. 3 (2015): 1711-1720.Google ScholarCross Ref
- [14] Zhao, Zhen, Jie Chen, Yueyu Zhang, and Lanjun Dang. "An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks." KSII Transactions on Internet & Information Systems 9, no. 10 (2015).Google Scholar
- [15] Xiong, Hu, Konstantin Beznosov, Zhiguang Qin, and Matei Ripeanu. "Efficient and spontaneous privacy-preserving protocol for secure vehicular communication." In 2010 IEEE International Conference on Communications, pp. 1-6. IEEE, 2010.Google Scholar
- [16]Boneh, Dan, Xavier Boyen, and Hovav Shacham. "Short group signatures." In Annual International Cryptology Conference, pp. 41-55. Springer, Berlin, Heidelberg, 2004.Google Scholar
- [17]Zhang, Chenxi, Rongxing Lu, Xiaodong Lin, P-H. Ho, and Xuemin Shen. "An efficient identity-based batch verification scheme for vehicular sensor networks." In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246-250. IEEE, 2008.Google Scholar
- [18] Lee, Cheng-Chi, and Yan-Ming Lai. "Toward a secure batch verification with group testing for VANET." Wireless networks 19, no. 6 (2013): 1441-1449.Google ScholarDigital Library
- [19]Liu, Jingwei, Qingqing Li, Rong Sun, Xiaojiang Du, and Mohsen Guizani. "An Efficient mutual Authentication Scheme for Internet of Vehicles." In 2018 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2018.Google Scholar
- [20] Pournaghi, Seyed Morteza, Behnam Zahednejad, Majid Bayat, and Yaghoub Farjami. "NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET." Computer Networks 134 (2018): 78-92.Google ScholarDigital Library
- [21] Bayat, Majid, Mostafa Barmshoory, Majid Rahimi, and Mohammd Reza Aref. "A secure authentication scheme for VANETs with batch verification." Wireless networks 21, no. 5 (2015): 1733-1743.Google ScholarDigital Library
- [22]Chen, Chien-Ming, Bin Xiang, Yining Liu, and King-Hang Wang. "A secure authentication protocol for Internet of vehicles." IEEE Access 7 (2019): 12047-12057.Google ScholarCross Ref
- [23]Canetti, Ran, and Hugo Krawczyk. "Analysis of key-exchange protocols and their use for building secure channels." In International conference on the theory and applications of cryptographic techniques, pp. 453-474. Springer, Berlin, Heidelberg, 2001.Google Scholar
- [24]Bleeker, Annette, and Lambert Meertens. "A semantics for BAN logic." In Proceedings of the DIMACS workshop on design and formal verification of security protocols. 1997.Google Scholar
Index Terms
- SMMAP: Secure MAC-based Mutual Authentication Protocol for IoV
Recommendations
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing
Intelligent transportation systems seek to maximize the usage of data generated by the vehicles for road users assistance. Combining vehicular ad hoc network with cloud computing makes it easy for the fixed infrastructures along the roads to collect and ...
Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards
In 2004, Das et al. proposed a dynamic identity-based remote user authentication scheme using smart cards. This scheme allows users to choose and change their passwords freely, and the server does not maintain any verification table. Das et al. claimed ...
A Secure and Efficient Deniable Authentication Protocol
ICIE '09: Proceedings of the 2009 WASE International Conference on Information Engineering - Volume 02A deniable authentication can be used to provide secure negotiation on the Internet. Although many deniable authentication protocols have been proposed, most of them are interactive or vulnerable to various cryptanalytic attacks. To find a secure and ...
Comments