Next Article in Journal
Thermal Cameras for Overnight Measuring of Respiration in a Clinical Setting
Previous Article in Journal
State of Health for Lithium-Ion Batteries Based on Explainable Feature Fragments via Graph Attention Network and Bi-Directional Gated Recurrent Unit
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number

by
Pablo Escapa Gordón
1,*,
Vicente Matellán Olivera
1 and
Adriana Suárez Corona
2
1
Department of Mechanical, Computer and Aerospace Engineering, Universidad de León, Campus de Vegazana S/N, 24007 León, Spain
2
Department of Mathematics, Universidad de León, Campus de Vegazana S/N, 24007 León, Spain
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(19), 5954; https://doi.org/10.3390/s25195954
Submission received: 26 May 2025 / Revised: 14 September 2025 / Accepted: 20 September 2025 / Published: 24 September 2025
(This article belongs to the Section Communications)

Abstract

Establishing secure vehicular communication is essential for the development of autonomous driving capabilities and to make new functionalities possible, such as smart traffic management, or systems aimed at avoiding or mitigating traffic accidents. In this scenario, where the deployment of a Public Key Infrastructure (PKI) may be difficult, the use of identity-based cryptography is proposed as a good alternative, because this approach simplifies encryption by enabling dynamic key generation and secure communication, without requiring prior key exchanges, making it highly scalable and efficient. In this way, this paper proposes a communication protocol applicable to V2V (vehicle-to-vehicle) and V2X (vehicle-to-all) communications, replacing schemes based on PKI with identity-based cryptographic schemes using the VIN (Vehicle Identification Number) as an unequivocal vehicle identifier. This paper also describes a prototype implementation in a conventional vehicle and the performance metrics of the system. Through a defined proof of concept, we obtained various quantitative results, demonstrating the importance of the processors used for the encryption and decryption operations required. The proposed system provides secure and flexible vehicle identification, with multiple practical applications. It can enables digital authentication, support toll payments without extra hardware, and facilitate V2X communication via the VIN for improved traffic management and safety. Additionally, it can streamline processes in repair workshops and optimize fuel payment and tracking at service stations.

1. Introduction

Modern-day vehicles are no longer composed of just hydraulic and mechanical components; they are increasingly becoming closer to robots (“computers with wheels”). Technologies such as Advanced Driver Assistance Systems (ADASs) [1] and external connectivity improve driver and passenger experience, and can also enable autonomous driving and smart traffic management. In this sense, one can consider cars as hyper-sensorized and connected platforms, with three goals for people transportation: no accidents, no pollution, and no traffic jams.
To realize these goals, three core elements—connectivity, safety, and security—are indispensable for the development and deployment of autonomous vehicles. In particular, vehicular communication entails a major revolution, since information exchange among vehicles (V2V communications), with infrastructure (V2I) (vehicle to infrastructure), or in general with other agents in traffic (V2X), could help to prevent the 1.35 million deaths caused by car accidents worldwide [2] and reduce the nearly 7 million deaths caused by pollution [3].
However, the car industry needs to guarantee the security of these communications to prevent their misuse. Misidentifying vehicles can lead to faulty driving decisions, resulting in avoidable safety risks and potential accidents. The aim of this paper was to design and evaluate a secure communication protocol for vehicular networks that replaces traditional PKI-based schemes with identity-based cryptographic mechanisms, using the Vehicle Identification Number (VIN) as a unique identifier. The main contributions of this research to the body of knowledge on V2V communication include a generic IB communication protocol, the use of the VIN as a secure and practical identifier for dynamic key generation in vehicular networks, a real-world prototype implementation demonstrating the feasibility of the proposed approach in a conventional vehicle, and an analysis of performance metrics that highlights the impact of hardware processing capabilities on encryption and decryption operations. In vehicular communications, we can highlight the following standards: IEEE 802.11p [4], ETSI TS 102 637 [5], ETSI EN 302 665 [6], ISO 21217:2014 [7], IEEE 1609.2 [8], IEEE 1609.3 [9], SAE J2735 [10], ISO 15118 [11], 5G V2X [12], ITU-T Y.2060 [13], and ISO 26262 [14]. All of these standards show us how V2X communications should function, offering different technical solutions. In these standards and other proposals, various methods are used, such as identification via IP addresses, ICCID (Integrated Circuit Card Identifier), random numbers, license plate readings [15], etc. In contrast, our contribution allows vehicles to be identified by their VIN, which is the simplest and most natural form of identification. The use of cryptography in these communication protocols enables authentication, which generates trust, enables confidential communication, and prevents the exchanged information from being modified. Some traditional V2X security protocols proposed decentralizing the Certificate Authority’s (CA) tasks to reduce the communication and computation overhead, as well as the dependence on a centralized CA in PKI-based solutions.
Identity-based cryptography, introduced by Shamir [16], is an alternative to public key cryptography that avoids the use of certificates and the management and updating of Certificate Revocation Lists (CRLs). In this case, arbitrary strings, called identities, can play the role of public keys. These must unequivocally identify users, such as email addresses or social security numbers in the personal communication setting. In the vehicular communication context, the VIN, which uniquely identifies vehicles, serves as an ideal candidate for such identifiers.
In this scenario, anyone can derive the public key of a user from his identity, and his private key is computed by a Key Generation Center (KGC) from the user’s identity and the KGC’s master secret key. In the context of vehicles, this process could be performed by the international normalization bodies in charge of issuing the World Manufacturer Identifiers (WMIs) of traditional frame numbers.
Moreover, when compared to credential management systems, identity-based cryptography avoids handling and securely storing multiple credentials, since key generation is inherently tied to the identities from which the keys are derived. This makes cryptographic schemes easier to integrate and improves scalability for systems with a large number of users, as in the case of vehicles. Privacy-friendly credential management systems also usually involve multiple steps for exchanging, verifying, and validating credentials, which can introduce delays or complexities in the authentication process.
Several identity-based cryptosystems have been proposed, including encryption, digital signature, and key establishment protocols. One can highlight the schemes by A. Shamir [16], D.Boneh and Franklin [17], C. Gentry and A. Silverberg [18], R. Sakai, K. Ohgishi and M. Kasahara [19], and C. Boyd and K. R. Choo [20]. Most of these make use of pairings (bilinear maps) [21], while some avoid their use to obtain more efficient protocols [22] or so that they can resist quantum attacks [23]. For our real test, we selected D. Fiore et al.’s [22] protocol, which can be applied over any cyclic group of prime order, and for which the Diffie–Hellman problem is intractable (no known efficient algorithm can solve it). This protocol is extremely efficient and only requires one round of communication with short messages, which makes it suitable for this application.
There are several applications for the proposed communication protocol called “V2V Secure communication protocol based on digital VIN number” and its generalization to V2X communications, such as the following:
  • Digital documentation: This could allow us to authenticate a vehicle with law enforcement authorities. With a slight modification, new functionalities could be added, such as recording vehicle history, including data related to the vehicle’s repairs, owners, and technical reports.
  • Tolls: The car could communicate with infrastructure without requiring any more specific hardware, making payments easier. This would be a universal system for identifying the vehicle and communicating the necessary information independently of the highway controller (the payment process is outside of the scope of this paper).
  • Payment method: Unequivocal identification can allow vehicles to serve as payment gateways, making applications possible in places such as gas stations, fast food kiosks, etc. The integrated On Board Unit (OBU) could have a graphic console, adapted to the navigator screen, so that these kinds of transactions could be accepted.
  • V2X Identification: The information coded in the VIN provides details about a vehicle’s features. Therefore, its identification against other components is very useful for information exchange. This has multiple applications: determining the length of a vehicle, locating a pedestrian, creating digital signage, providing traffic jam solutions, etc.
  • Repair workshops: Currently, the reception process at repair workshops is often tedious because a lot of time is required to make a repair order. This period could be shortened with our communication system, since cars would be able to very quickly send the owners’ details and information about failures or servicing to the workshop’s admission area.
  • Gas stations: The system could avoid accidental fuel refills and allow a much faster payment.
The manuscript is organized in the following way: Section 2 presents a review of the state of the art in secure V2V communication protocols, highlighting the most relevant approaches and their limitations. Section 3 describes the proposed protocol in detail, specifically designed to ensure secure communication between vehicles using identity-based cryptography. Section 4 and Section 5 present the experimental validation, evaluating the feasibility and effectiveness of the protocol. Section 6 summarizes the main findings of the work, emphasizing the practical utility of the developed protocol. Finally, Section 7 discusses potential future research directions aimed at improving and extending the proposed system.

2. Related Work

As with any other type of computer system, being able to identify users is essential to develop applications that require authentication systems. In this sense, V2X applications are no exception.
Vehicular communication can be classified into two types: internal, which includes transmissions among different Electronic Control Units (ECUs), usually based on the CAN Bus (Controller Area Network) protocol [24], and external, known as V2X (vehicle-to-everything) [25], which links vehicles to the environment through radio frequencies, WiFi, or 5G connections and which is mainly defined by the IEEE 802.11P [26] and 5G [27] standards. V2X communications are usually classified as follows [28]:
  • V2V: connections among vehicles, in order to, for example, avoid collisions; vehicles can share position and speed data to interact and be able to react faster than the driver.
  • V2P (vehicle-to-pedestrian): connections between vehicles, pedestrians, or riders for detection, alert notification, and accident prevention.
  • V2I: connections between vehicles and road infrastructures to manage the priority and timing of traffic signs, optimizing the traffic.
  • V2N (Vehicle-to-network): connections between vehicles and the cloud to route traffic, to develop real-time traffic management, Beyond the Visual Line Of Sight (BVLOS) warnings, etc.
  • V2H (Vehicle-to-home): connections between vehicles and homes to implement, for example, door opening once the car is parked.
Security and privacy issues in vehicular networks have been extensively reported in the literature. Secure communication is essential for the adoption of V2X technologies, since it is required to ensure the safety and security of future connected and autonomous cars.
To carry out a complete assessment of the state of the art in V2X communications, we have organized this section into an analysis of technologies for the secure identification of vehicles, an analysis of communication standards (mainly based on WiFi and 5G), and an examination of V2V secure communication protocols.

2.1. Vehicle Identification

Vehicle identification is an essential phase in ITSs (Intelligent Traffic Systems), and so there have been many studies on the topic. Some of them rely on car license plate recognition, which was developed in 1976 at the Police Scientific Development Branch (PSDB) in the UK [29].
Johnson and Bird [30] proposed knowledge-guided boundary following and template matching for automatic vehicle identification. In 1990, Lotufo, Morgan, and Johnson [31] proposed automatic number plate recognition with optical character recognition techniques. Later, Fahmy [32] proposed Bidirectional Associative Memory (BAM) neural networks for number plate reading. In 2010, Changshui et al. [33] showed how an identification system could be used to analyze vehicle handling and stability, and subsequently, Jeevagan et al. [34] proposed the development of vehicle identification using Radio Frequency Identification (RFID).
Later, in 2018, Satsangi et al. [15] compared thresholding optical character recognition (OCR) and machine learning approaches for license plate recognition, and in 2019 [35], Kohli and Sharma studied the possibility of identifying vehicles through GSM (Global System for Mobile Communications) signals.
The use of the VIN and identity-based cryptography in car-related communication has already been proposed by Groza et al. in 2020 [36], but our work goes one step further by using this concept in a digital version.
In 2023, ref. [37] proposed a solution involving density-based traffic management using Arduino, a GSM module, and RFID. Also in 2023, ref. [38] proposed a cooperative method to identify vehicles in autonomous driving using registration numbers (VRNs). Currently, blockchain technology is also being used for vehicle identification. For instance, the proposal in [39] illustrated how its use facilitates identification through the various physical forms of vehicles. The issue of vehicle identification was also present in [40], who explained how to create an efficient authenticated key agreement scheme, titled STCLA, designed for fog-based IoV, adopting certificateless cryptography. It is also worth highlighting that the latest studies on vehicle recognition using license plates with the Yolo V8 algorithm achieved an overall recognition accuracy of 98.05 percent [41]. Our study shows that the identification of vehicles can be achieved in different ways, including identification through their license plate, through an RFID device, or even through their form, but no article has yet shown the possibility of identifying vehicles by the chassis number in digital format, in Table 1 we can see a classification.

2.2. WiFi vs. 5G Communications

After having studied vehicular connections, we can describe them as emerging networks whose principal technologies are WiFi and 5G. In this section, we will review their main characteristics, together with their advantages and disadvantages.
WiFi under the 802.11P standard, also known as WAVE (Wireless Access for the Vehicular Environment), has the key features shown in Table 2. It represents a positive development with respect to the IEEE 802.11A standard, since it has physical and MAC (Media Access Control) improvements. Their importance lies in the fact that they serve as the basis for direct V2V communications.
This kind of communication is known as DSRC (Dedicated Short Range Communication) and is ideal for providing real-time support to cooperative systems [42].
5G or Cellular C-V2X is a communication technology with a shorter range that employs current mobile phone coverage using license specter networks. It connects large spaces and can be used for V2I services that require less latency (Technology 3G and 4G LTE Release 14). The new 5G (3GPP Release 16) will be the key enabler for V2X, with three main features: ubiquitous connectivity for large sets of users, very low latency, and high-speed Gigabit connection. Its principal characteristics are presented in Table 3.
The WiFi 802.11P DSRC and 5G C-V2X standards are supported by large committees. The best way to increase road safety and decrease road fatalities is not to choose one standard, but to use a hybrid communication approach in which WiFi [5.9 GHz] and 5G [3.x GHz] technologies work together.

2.3. V2V Secure Communication Protocols Using Identity-Based Cryptography

Nowadays, countless applications, papers, patents, and research studies exist related to vehicular communications, but none of them have used the VIN in digital format as a car identifier. We will summarize the main results in this field.
V2V communication is an emerging technology that helps nearby moving vehicles communicate with each other. In this way, Vibin et al. [42] presented the design and development of a V2V communication system that collects vehicle-related data and transmits it over WiFi to the vehicles in its vicinity.
New car equipment applications like longitudinal and lateral vehicle following control systems that use radar can help to reduce traffic jams. For instance, Wei et al. [43] proposed a method to calculate the trajectory of the preceding vehicle based on its historical movement data transmitted among vehicles.
Car manufacturers, insurance companies, workshops, and telecommunications operators, etc., are aware that, in the near future, new connectivity services will create new models of business. A good example is the car manufacturing company SEAT, which has created a strategy for urban mobility called SEAT CODE [44].
Zhao et al. [45] presented a system to create car platooning by adjusting their distance according to traffic using an ECAN module to communicate with the CAN bus. Hwang et al. [46] described a new method that responds with the necessary ECUs for a specific V2V message. None of these developments were carried out from the perspective of cybersecurity. Identity-based (IB) cryptography has previously been used for V2V communications [47]. Andreica and Groza [48] identified vehicles and used this identification number to bootstrap security based on identity-based cryptographic schemes. They also introduced the use of license plates as a means to identify vehicles by applying identity-based schemes [48]. In the VANETs (Vehicle Ad hoc Networks) setting [47], Shuhaimi and Juhana [47] studied IB schemes in order to provide security and privacy for VANETs. In other situations where privacy is required, other proposals using pseudonyms (random identifiers) [49] or group signatures have been used [50]. In 2025 N. Gopinath, K. L. Narayanan, S. Sageengrana, and M. Meenaksh studied a hybrid authentication architecture for VANETs combining certificate-based and identity-based cryptography with machine-learning-based attack detection, achieving significant improvements in latency, scalability, and detection accuracy [51]. However, most of these proposals did not specify which information is used for the identity.
In some proposals, the authors specified the identity used. For example, in [48], license plates were used as identities. They are first recognized by smartphone cameras located in the vehicles. However, the string that is usually used for vehicle identification is the Vehicle Identification Number, since it is unique, while the license plate number can change if the vehicle is reregistered, for example, in a different country. This identity was used by Groza et al. [36] for car access control with a smartphone. However, they recognized the VIN using a smartphone and did not use its digital version.

3. Identity-Based V2V Secure Communication Protocol

As previously discussed, it is necessary to design and implement a secure communication protocol, where communications can be performed in a limited time. Latency and computing capacity restrictions make traditional approaches ineffective; thus, we propose a protocol that uses the identities of vehicles.
In this section, we propose a generic communication protocol between two vehicles which guarantees confidentiality, authentication, and integrity. This protocol builds on a one-round two-party Identity-Based Key Establishment Scheme and an AEAD (authenticated encryption with associated data) scheme [52], and uses the Digital Vehicle Identification Number as the identity. The protocol begins with the establishment of a session key using a one-round key exchange scheme based on identity-based authentication, followed by an AEAD scheme for message exchange between the vehicles.
There is a preliminary setup phase where the system’s public parameters and the private key of the KGC are established. The authority responsible for this management calculates each vehicle’s private key, based on its VIN and secret information, and provide this to the vehicle.
Subsequently, message exchange between the two vehicles occurs, with authentication based on their digital VINs. Vehicle B adds a Message Authentication Code (MAC) to the message sent, calculated using the shared key generated from the message sent by vehicle A. The exchange concludes with vehicle A sending an MAC, calculated using all exchanged messages, to vehicle B as a key confirmation. Once the vehicles have shared the common key, they can begin exchanging information using an authenticated encryption scheme.

3.1. The Digital Vehicle Identification Number

The VIN is the usual way to uniquely identify a vehicle for administrative purposes. It is equivalent to a passport or national ID numbers for people.
In its current format, the VIN comprises 17 characters and was standardized in 1983 by ISO 3779 [53], which defines its structure as showed in Figure 1. There are some differences between the European and American formats, and the characters can be either numbers or letters (except for I, O, Q, and Ñ). The VIN has to be easily readable and located in a safe, tamper-proof place. It is usually located under the hood or inside the vehicle, directly engraved in the frame.
Although there are many options for identifying vehicles, the main approach is obtaining the VIN directly from the car’s documents or from the vehicle frame; the problem with this method is that it is very slow and not a digital solution. It is employed, for instance, in workshops and technical inspections. Another way to achieve this is by reading the number plate, with the problematic aspect of relying on number plates, which can be changed or altered. This is used in public parking areas and by traffic control cameras. Moreover, RFID systems can automate identification when vehicles pass through tolls, but they cannot identify the car, they only identity an RFID system. Recent work has proposed a CNN-based approach combining data augmentation and multi-task learning for efficient and accurate vehicle model identification in forensic contexts, improving upon traditional manual methods. [55].
A digital version of the VIN has recently been proposed [56]. In this patent claim, this digital VIN can be accessed through the OBD2 (On-Board Diagnostics 2) diagnosis socket, mandatorily present in vehicles under the SAE J1979 standard [57] and its European counterpart, the ISO 15031 [58].
The OBD2 standard can provide us with this number using a simple and universal instruction PID 0x02 issued to any vehicle. This instruction returns the VIN extracted from the ECU in hex format.

3.2. Cryptographic Tools

To build our V2V secure communication protocol, we make use of different cryptographic tools, both symmetric and asymmetric. In this section, we describe their main features regarding security.

3.2.1. Message Authentication Codes

Integrity and authentication are essential cryptographic goals. To achieve them with symmetric cryptography tools, one can make use of Message Authentication Codes (MACs).
To achieve this, when party A sends a message to party B, A appends to the message an authentication tag, computed by the MAC algorithm as a function of the message and the shared secret key. Party B, when receiving this information, recomputes the authentication tag in the received message using the MAC with the shared key and checks whether the obtained value is equal to the received tag. In this case, one can see that the message has not been altered and has been sent by a party knowing the shared secret key.
Some efficient constructions of message authentication schemes are based on cryptographic hash functions and derive their security from these. We use the HMAC (Hash-based Message Authentication Code) construction, with the SHA-256 hash function [59].

3.2.2. Authenticated Encryption with Associated Data

AEAD is a symmetric tool that provides both confidentiality and authentication for the encrypted text, and also allows us to check the integrity and authentication of additional associated data that are sent in the clear. It was introduced by Rogaway [60].
It can be built by combining MACs and symmetric ciphers, using block cipher modes of operation. There are dedicated algorithms for this task.
In our proof of concept, we use AES-256 (Advanced Encryption Standard) with the Galois Counter Mode (AEAD_AES_256_GCM), because AES provides faster performance, lower resource usage, and high efficiency.

3.2.3. Identity-Based Key Establishment Scheme

Key establishment schemes allow two or more users to agree on a common key that can afterwards be used in a symmetric key algorithm. These protocols are usually interactive, and each round of messages that are sent at the same time is called a round.
A desired security requirement is that the protocol is authenticated; i.e., the users are sure about who they are agreeing the key with. For this, a Public Key Infrastructure might be needed, with its corresponding shortcomings.
To avoid such disadvantages, an identity-based approach can be used, where users only need to know their counterpart’s identity to establish a key in an authenticated manner. The KGC is in charge of creating the private keys corresponding to the identities and sending them to the users.
An instance of the protocol is called a session, which has different variables associated with it, indicating, for example, the session state, the peers, whether the session has aborted, the session identifier, etc.
The adversary controls all the communication and can insert, delay, modify, or intercept the messages exchanged. Moreover, it has access to different information, such as the private keys of users, session keys, or the ephemeral information of the session. A party is said to be corrupted if the adversary has obtained its private key, all its session states, and all session keys currently stored, and is controlled by the adversary.
Definition 1.
An identity-based key-agreement protocol is said to be secure if, for any probabilistic polynomial time adversary A , the following holds:
  • If two parties not corrupted by the adversary complete matching sessions, then they will compute the same session key with overwhelming probability;
  • The probability that A guesses the correct bit b when it is provided either with a random session key (if the randomly chosen bit is 1) or with the real session key (if the randomly chosen bit is 0) is at most 1 2 plus a negligible function on the security parameter.
We refer to [22] for a more formal description of the security model.
In our proof of concept, we use the protocol of Fiore et al. [22]. A description can be found in Appendix A.

3.3. Secure V2V Communication Protocol

In this section, we propose a secure communication protocol. It builds on a one-round two-party Identity-Based Key Establishment Scheme, so that two vehicles can agree on a key to be used afterwards with an AEAD scheme [52].
Before the exchange of messages, there is a setup phase, where public parameters and the master secret key of the Key Generation Center (KGC) are established. The KGC, to create a private key for a vehicle, takes its V I N v e h and the master secret key to compute S K V I N v e h . The KGC sends each vehicle its private key, as shown in Figure 2.
Afterwards, both vehicles exchange messages, authenticated based on the digital VIN, and moreover, they compute the tag generated by the MAC in the message sent by vehicle B and the common key established with vehicle A. The communication ends with vehicle A sending a tag from all the messages exchanged with the common key established, acting as key confirmation. The protocol is sketched in Figure 3.
Once the vehicles have shared a common key, they use an AEAD scheme to securely communicate.
This protocol is secure for any secure one-round two-party Identity-Based Key Establishment Scheme.
Theorem 1.
Let P be a one-round two-party Identity-Based Key Establishment Scheme which is secure in the sense of Definition 1; then, the proposed communication protocol provides confidentiality, integrity, and authentication.
In our proof-of-concept implementation, to instantiate the proposed protocol, we used the IB key establishment scheme by Fiore and Gennaro [22], which is secure under the Strong Diffie–Hellman Assumption. A description of the protocol can be found in Appendix A, and we used HMAC-SHA256.
The proposed protocol inherits the security from Fiore and Gennaro’s construction, and therefore, its security relies on the strong Diffie–Hellman assumption in the Random Oracle Model (see [22] for the security proof). This protocol is very efficient, since it does not make use of bilinear maps, which makes it suitable for this scenario. The vehicle private keys generated by the KGC are shown in Figure 4.
The communication flow of the protocol instantiated with Fiore and Gennaro’s IB Key Establishment Scheme using the VIN as identity can be seen in Figure 5.
Moreover, Figure 6 and Figure 7 show the intermediate computations performed by vehicles B and A, respectively, after receiving the other vehicle’s message.
Subsequently, we use the established key for an AEAD. In particular, we use AES-256 with the Galois Counter Mode (AEAD AES 256 GCM).
We decided to use AEAD since it combines both encryption and authentication in a single, efficient operation, which makes it a strong choice for secure communication and data protection.
In particular, we chose AES-256 with the Galois Counter Mode, since it provides faster performance, lower resource usage, high efficiency, and strong security. AES is the current standard for block ciphers and has been widely analyzed and used over many years. Moreover, AES-GCM is widely supported in both hardware and software implementations, making it a highly accessible choice. In addition, modern processors have built-in support for AES operations, which further boosts the speed of AES-GCM.

4. Proof of Concept

The general aims of the built PoC were as follows:
1.
To demonstrate that the VINs of the two cars can be read through their own CAN Bus.
2.
To validate that it is possible to create a secure WiFi communication between both cars, using the proposed protocol based on Identity-Based Cryptography, described in Section 3.3.
3.
To measure the processing time needed to send a message or to establish a common key and exchange a message using an AEAD in two different scenarios.
To summarize, the PoC demonstrated that the digital VIN is a secure and viable way to identify vehicles and showed two different applications. It was very important to know the processing time, since many uses require a near-real-time communication system. We show that the solution proposed is viable and that we could characterize its main quantitative metrics, to measure and quantify its computational performance.
The analysis of the logs obtained in the PoC enabled us to define the specific hardware needed to comply with latency requirements. It was important to assess how vehicle speed would affect the proposed system.
A prototype was implemented and tested in a real scenario. The goal of the prototype was to show that data can be sent from the CAN bus of the first vehicle to the second vehicle. To ensure secure transmission, we needed to obtain VINs through the OBD2 diagnostic port to use them as identifiers.
The method was as follows: First, once the setting is configured (all elements are in the same WiFi network) and we have connected all the elements, the VINs of both cars are read. This can be accomplished by sending the PIDs (Parameter IDs), which are codes used to request data from a vehicle, used as a diagnostic tool. In Table A1, we can see the PIDs needed to obtain the VIN. Afterwards, we establish an encrypted connection using the VINs obtained by implementing the IB-based scheme described in Figure 6 and Figure 7. This protocol generates a common key that must then be used for the AEAD. Finally, speed or GPS details can be requested and sent between both cars.

5. Experimental  Validation

5.1. Experiments

This section describes two different scenarios in which we implemented vehicular communication:
1.
The first experiment, represented in Figure 8, demonstrated the ability to use the designed OBU to read one or several CAN bus parameters. In this case, we requested the speed and direction angle of vehicle 1, which moved in the opposite direction to vehicle 2. The processing of this information could be used to develop a collision avoidance system.
2.
In the second experiment, described in Figure 9, vehicle 2 requested the position and speed of vehicle 1. This request was managed by the OBU, which had a GPS module that was able to alternatively obtain this information directly from the CAN bus (this is possible only if vehicle 1 has this option). The processing of these data will not supply enough information to know whether one vehicle can pass the other, but if these data are combined with the speed data and other details from the first vehicle like horsepower, speed gearbox, etc., one can determine the viability of this action.
We tested the proposed protocol in both scenarios. In the first, both cars were stationary and there were five meters between them, and in the second, the first car was stationary and the second was moving at 5 km/h. This allowed us to measure the computation overhead when sending various messages (speed, temperature, etc.).

5.2. Materials

The first vehicle showed in Figure 10 was a BMW X1 with VIN WBAVN71060VX14326 and equipped with a Raspberry Pi 3 and a PiCAN module, whose principal components are presented in Table 4. This set formed the OBU embedded in the first vehicle, equipping it with extra applications like encryption protocols and connectivity.
The second vehicle was equipped with an Asus laptop which connected the BMW 320D vehicle with VIN WBAUT31010F150820 through the CANalyze interface. Its main components are shown in Table 5.
The final components for this proof of concept are presented in Table 6 and consisted of a WiFi network created by a TP-Link router, and the central server from which the laptop and the Raspberry could be controlled remotely. All hardware is shown in Figure 11.

5.3. Methods

Our method was based on iterating over ten samples to test the following variables: First, both cars can read the VIN through the OBD2 port. Second, they can establish communication. Third, they can exchange public keys. Fourth, they can send messages. Fifth, they can encrypt and decrypt messages. Sixth, they can perform the complete process; that is, they are, for example, capable of sending data such as speed between them in an encrypted message with integrity and identity-based authentication. We then established the computational performance they required. We used Sysbench with the Raspberry Pi and CPU-Z with the Asus notebook.
Figure 12 shows the connections of all components in a schematic form.
For this proof of concept, we used the IEEE 802.11ac standard, which offered optimal results in establishing connections, except in terms of latency. We set up both devices as an ad hoc network, so that they could interact in a decentralized manner without needing a WiFi router [61]. This could be accomplished by activating Soft AP in the wireless network interfaces, to have direct WiFi through a peer-to-peer (P2P) WiFi. There are several studies where the deployment of V2V communication has been used, such as [62,63]. For each quantitative variable, we computed the average, variance, and standard deviation.

5.4. Experimental Results

Experiments were performed to test the proposed communication system and to measure the operating time of the system.
We applied the proposed Identity-Based Key Establishment Scheme. In Table 7 and Table 8, we can see its computational performance. As expected, the Asus laptop with a 3.2 GHz processor was much faster than the Raspberry Pi. We can also see that the vehicle speed affected the processing time. This delay was caused by the wave transport medium with the new 5G or 802.11p. However, this effect was minimal and could be adjusted to new latency requests. The test showed that the algorithm worked properly. Table 9 and Table 10 show the average, variance, standard deviation, and coefficient of variation of the measured metrics. The time obtained was the complete time needed to send information from the first vehicle to the second, such as speed. This included the time necessary for the cryptographic scheme, communication delay, and processing time in both vehicles.
The results show that the systems worked properly in the ten samples. The average performance was optimal for V2V applications, with very low standard deviation.

5.5. Discussion

To develop our tests, we established communication between vehicles, enabling us to read the speed, direction angle, and GPS coordinates from the first car through its CAN bus. Then, we encrypted these data using the proposed protocol and using the VIN of the vehicles as the public keys corresponding to their identities. Afterwards, the second vehicle could process this and decrypt the information previously sent, as we can see in Figure 13 and Figure 14.

6. Conclusions

This paper proposes a communication protocol between vehicles using identity-based cryptography, eliminating the tedious task of creating and managing certificates typically required by PKIs. The protocol uses the vehicle’s digital VIN as its identity, representing a significant advance that ensures unequivocal identification comparable to traditional methods. This approach not only simplifies the authentication process, but also enables a wide range of applications in secure vehicular communications. A proof of concept was developed to demonstrate the efficiency and practicality of the proposed protocol. The experimental results showed low processing times and minimal computational overhead for both vehicles involved, which confirmed the suitability of the protocol for real-time vehicular environments. These findings highlight the ability of the protocol to provide secure and reliable communication, without compromising performance. In general, the results validated that the identity-based protocol can effectively address key challenges in V2V communication, such as reducing certificate management complexity while maintaining strong security guarantees. This work lays a solid foundation for future enhancements and potential deployment in intelligent transportation systems, contributing to safer and more efficient vehicular networks. The proposed system enables secure and versatile vehicle identification, with multiple practical applications. It can facilitate digital documentation for authentication with authorities and vehicle history tracking. It can support seamless communication for toll payments, without extra hardware, and can serve as a payment gateway at places like gas stations and kiosks. Using the VIN for V2X identification can enhance information exchange for traffic management and safety. Additionally, it can streamline processes at repair workshops by quickly transmitting vehicle and owner information, as well as improving fuel management and payment efficiency at gas stations.

7. Future Work

It would be interesting to develop mechanisms and tools to avoid VIN spoofing in the digital format. Similarly, as new network technologies such as 5G and 802.11p are deployed, it would be interesting to test using these standards, and ideally, the tests should be performed at higher speeds to demonstrate the robustness of the developed algorithm. Moreover, It will be important to study how the algorithms need be adapted to the new latency requirements established.

Author Contributions

All authors contributed equally to the development of this work. The conception and design of the protocol was carried out collaboratively and the implementation and experimental validation was performed by P.E.G. All authors participated in writing and reviewing the manuscript and approved the final version. All authors have read and agreed to the published version of the manuscript.

Funding

Adriana Súarez Corona was partially funded by the research project PID2021-123461NBC22 funded by the Spanish Ministry of Science, Innovation and Universities. Part of the development of this protocol was funded by INCIBE (The Spanish National Cybersecurity Institute) under Challenge 2 of the Pre-Commercial Public Procurement process CPP001/23, corresponding to “R&D&I” services in the field of cybersecurity (actions 1, 2, 3, 4, 5, and 7) within the framework of the Recovery and Resilience Mechanism, Component 15, Investment 7 (MRR C15.I7).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank Universidad de León for their technical assistance.

Conflicts of Interest

The authors declare that there are no conflicts of interest related to this study.

Abbreviations

The following abbreviations are used in this manuscript:
OBD2On board diagnostics 2
ECUElectronic control unit
IBCIdentity-based cryptography

Appendix A. Fiore et Gennaro Protocol

Set up: The Key Generation Center (KGC) selects a finite group G of prime order q, a random generator of the group g G , and an exponent x Z q . Two hash functions H 1 : { 0 , 1 } * Z q and H 2 : Z q × Z q { 0 , 1 } are also selected. The public parameters are M P K = ( G , q , g , y = g x , H 1 , H 2 ) , and the master secret key will be the exponent x.
Key Derivation: To compute the private key of a user with identity I D , the KGC computes it as the Schnorr’s signature of the string I D under public key y, i.e., r I D = g k I D , where k I D Z q and s I D = k I D + x H 1 ( I D ; r I D ) mod q .
Key Agreement: A and B choose ephemeral private exponents t A , t B Z q . They exchange the following messages:
A     B t A , r A Z q t B , r B Z q
A ,   r A ,   u A = g t A
B ,   r B ,   u B = g t B
z 1 = ( u B r B y H 1 ( B , r B ) ) t A + s A z 1 = ( u A r A y H 1 ( A , r A ) ) t B + s B z 2 = u B t A z 2 = u A t B
K A B = H 2 ( z 1 , z 2 )

Appendix B. VIN Gathering

To obtain the VIN, we can send a broadcast message (0x7DF) with the following details: a parameter ID (PID) request (0x09) for the VIN (0x02), with a length of 2 bytes.
The VIN string has 17 characters, while the CAN data frame can only have 8 bytes. Therefore, the ECU will answer with a (0x7E8) message with the information (0x1014), indicating an extended message with a length of 0x14 = 20 bytes. To complete this information, the ECU waits for a second request ID (0x7E0) with data 0x30 followed by seven times 0x00. When the ECU receives the second set of data, it replies with two new 0x7E8 frames. The first byte is set to 0x21 and the second one is set to 0x22, with the first “2” indicating that there are two more data frames and the second character (1 or 2) representing the sequence number of the data frame. The information obtained is shown in hexadecimal.
In our case, the values (57 42 41 56 4E 37 31 30 36 30 56 58 31 34 33 32 36), when interpreted in ASCII, indicate that the VIN is WBAVN71060VX14326, which corresponds to the BMW brand and the X1 model. Figure A1 shows the process to obtain the VIN.
Table A1. VIN gathering through OBD2.
Table A1. VIN gathering through OBD2.
InterfaceIdentifierLengthData Frame
can07DF802 09 02 00 00 00 00 00
can07E8810 14 49 02 01 57 42 41
can07E0830 00 00 00 00 00 00 00
can07E8821 56 4E 37 31 30 36 30
can07E8822 56 58 31 34 33 32 36
Figure A1. Digital VIN script.
Figure A1. Digital VIN script.
Sensors 25 05954 g0a1

References

  1. González, L.; Vaca, M.; Lattarulo, R.; Calvo, I.; Perez, J.; Ruiz, A. Análisis de riesgos de ciberseguridad en arquitectura de vehículos automatizados. XXXIX Jornadas Autom. 2018, 5–7. [Google Scholar] [CrossRef]
  2. OMS. 10 datos sobre la seguridad vial en el mundo. 2017. Available online: https://prevencionar.com/2018/03/15/10-datos-sobre-la-seguridad-vial-en-el-mundo/ (accessed on 8 March 2021).
  3. OPS/OMS. OMS estima que 7 millones de muertes ocurren cada año debido a la contaminación atmosférica. 2017. Available online: https://www.paho.org/hq/index.php?option=com_content&view=article&id=9406:2014-7-million-deaths-annually-linked-air-pollution&Itemid=135&lang=es (accessed on 8 March 2021).
  4. IEEE 802.11p; IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments (WAVE). IEEE: New York, NY, USA, 2010.
  5. ETSI TS 102 637; Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 1: Functional Requirements. ETSI: Valbonne, France, 2019.
  6. ETSI EN 302 665; Intelligent Transport Systems (ITS); Communications Architecture. ETSI: Valbonne, France, 2010.
  7. ISO 21217:2014; Intelligent Transport Systems—Communications Access for Land Mobiles (CALM)—Architecture. ISO: Geneva, Switzerland, 2014.
  8. IEEE 1609.2; IEEE Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management Messages. IEEE: New York, NY, USA, 2016.
  9. IEEE 1609.3; IEEE Standard for Wireless Access in Vehicular Environments—Networking Services. IEEE: New York, NY, USA, 2016.
  10. SAE J2735; Dedicated Short Range Communications (DSRC) Message Set Dictionary. SAE International: Warrendale, PA, USA, 2020.
  11. ISO 15118; Road Vehicles—Vehicle to Grid Communication Interface. ISO: Geneva, Switzerland, 2019.
  12. 3GPP 5G V2X; Technical Specification for 5G Vehicle-to-Everything Communication. 3GPP: Sophia Antipolis, France, 2020.
  13. ITU-T Y.2060; Overview of the Internet of Things. ITU-T: Geneva, Switzerland, 2012.
  14. ISO 26262; Road Vehicles—Functional Safety. ISO: Geneva, Switzerland, 2018.
  15. Satsangi, M.; Yadav, M.; Sudhish, P.S. License Plate Recognition: A Comparative Study on Thresholding OCR and Machine Learning Approaches. In Proceedings of the 2018 International Conference on Bioinformatics and Systems Biology (BSB), Allahabad, India, 26–28 October 2018; pp. 1–6. [Google Scholar]
  16. Shamir, A. Identity-based cryptosystems and signature schemes. In Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1984; Volume 3, pp. 47–53. [Google Scholar]
  17. Boneh, D.; Franklin, M. Identity-Based encryption from the Weil pairing. SIAM J. Comput. 2003, 32, 586–615. [Google Scholar] [CrossRef]
  18. Gentry, C.; Silverberg, A. Hierarchical ID-based cryptography. In Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 1–5 December 2002; Volume 2501, de LNCS. pp. 548–566. [Google Scholar]
  19. Sakai, R.; Ohgishi, K.; Kasahara, M. Cryptosystems based on pairing. In Proceedings of the Symposium on Cryptography and Information Security, Okinawa, Japan, 26–28 January 2000. [Google Scholar]
  20. Boyd, C.; Choo, K.R. Security of Two-Party Identity-Based Key Agreement. In Proceedings of the First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, 28–30 September 2005; pp. 229–243. [Google Scholar]
  21. Chen, L.; Cheng, Z.; Smart, N.P. Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 2007, 6, 213–241. [Google Scholar] [CrossRef]
  22. Fiore, D.; Gennaro, R. Identity-based key exchange protocols without pairings. In Transactions on Computational Science X; Springer: Berlin/Heidelberg, Germany, 2010; pp. 42–77. [Google Scholar] [CrossRef]
  23. Peng, C.; Chen, J.; Zhou, L.; Choo, K.R.; He, D. CsiIBS: A post-quantum identity-based signature scheme based on isogenies. J. Inf. Secur. Appl. 2020, 54, 102504. [Google Scholar] [CrossRef]
  24. Canbus. What Is CAN Bus? 2015. Available online: https://www.csselectronics.com/pages/can-bus-simple-intro-tutorial (accessed on 25 April 2018).
  25. SNS Telecom & IT. The V2X (Vehicle-to-Everything) Communications Ecosystem: 2019–2030—Opportunities, Challenges, Strategies & Forecasts. 2019. Available online: https://www.snstelecom.com/v2x (accessed on 25 April 2018).
  26. Technologies, K. Solutions for 802.11p Wireless Access in Vehicular Environments (WAVE) Measurements. 2016. Available online: https://innovation-destination.com/2018/01/29/adas-v2x-trumps-self-driving-2/ (accessed on 17 November 2019).
  27. Naik, G.; Choudhury, B.; Park, J.M. IEEE 802.11bd 5G NR V2X: Evolution of radio access technologies for V2X communications. IEEE Access 2019, 7, 70169–70184. [Google Scholar] [CrossRef]
  28. Feng, Y.; He, D.; Niu, L.; Yang, M.; Guan, Y. The Overview of Chinese Cooperative Intelligent Transportation System Vehicular Communication Application Layer Specification and Data Exchange Standard 1. 2017. Available online: https://discovery.researcher.life/article/the-overview-of-chinese-cooperative-intelligent-transportation-system-vehicular-communication-application-layer-specification-and-data-exchange-standard/c07f45aa845c3590bd8e079c3a3c5149 (accessed on 13 September 2025).
  29. Qadri, M.T.; Asif, M. Automatic number plate recognition system for vehicle identification using optical character recognition. In Proceedings of the 2009 International Conference on Education Technology and Computer, Singapore, 17–20 April 2009; pp. 335–338. [Google Scholar] [CrossRef]
  30. Johnson, A.S.; Bird, B.M. Number-plate Matching for Automatic Vehicle Identification. In Proceedings of the IEE Colloquium on Electronic Images and Image Processing in Security and Forensic Science, London, UK, 22 May 1990. [Google Scholar]
  31. Lotufo, R.A.; Morgan, A.D.; Johnson, A.S. Automatic Number-Plate Recognition. In Proceedings of the IEE Colloquium on Image analysis for Transport Applications, London, UK, 16 February 1990; V01.035, pp. 6/1–6/6. [Google Scholar]
  32. Fahmy, M.M.M. Automatic Number-plate Recognition: Neural Network Approach. In Proceedings of the VNIS’94 Vehicle Navigation and Information System Conference, Yokohama, Japan, 31 August 1994–2 September 1994. [Google Scholar]
  33. Changshui, W.; Ming, Y.; Yuanming, G.; Bin, Q.Y. Analysis of Vehicle Handling and Stability in Frequency Domain Based on System Identification Method. In Proceedings of the 2010 WASE International Conference on Information Engineering, Beidai, China, 14–15 August 2010; pp. 365–368. [Google Scholar] [CrossRef]
  34. Jeevagan, N.; Santosh, P.; Berlia, R.; Kandoi, S. RFID based vehicle identification during collisions. In Proceedings of the IEEE Global Humanitarian Technology Conference (GHTC 2014), San Jose, CA, USA, 10–13 October 2014; pp. 716–720. [Google Scholar] [CrossRef]
  35. Kohli, S.; Sharma, M. Real-time Extraction and Transmission of Vehicle Registration using GSM transmission technique. In Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019; pp. 1–5. [Google Scholar]
  36. Groza, B.; Andreica, T.; Berdich, A.; Murvay, P.S.; Gurban, E.H. Prestvo: Privacy enabled smartphone based access to vehicle on-board units. IEEE Access 2020, 8, 119105–119122. [Google Scholar] [CrossRef]
  37. Chithra, V.; Akash, A.; Rao, K.N.; Sivaram, V.; Tharun, D.; Naveen, B.M. Density-based traffic control and stolen vehicle detection using Arduino and RFID. In Proceedings of the 2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS), Chennai, India, 14–15 December 2023; pp. 1–8. [Google Scholar] [CrossRef]
  38. Tang, Z.; He, J.; Zheng, J. Cooperative vehicle identification for safe connected autonomous driving. In Proceedings of the 2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Dalian, China, 10–12 August 2023; pp. 1–4. [Google Scholar] [CrossRef]
  39. Wang, S.; Yang, D.; Sheng, H.; Shen, J.; Zhang, Y.; Ke, W. A Blockchain-Enabled Distributed System for Trustworthy and Collaborative Intelligent Vehicle Re-Identification. IEEE Trans. Intell. Veh. 2024, 9, 3271–3282. [Google Scholar] [CrossRef]
  40. Ma, Y.; Li, X.; Shi, W.; Cheng, Q. STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles. IEEE Trans. Veh. Technol. 2024, 73, 4830–4841. [Google Scholar] [CrossRef]
  41. Wang, P.; Gong, C.; Quan, Y.; Jin, X.; Du, M.; Wang, L. Research on License Plate Recognition Method Based on LPRNet and Improved YOLOv8. In Proceedings of the 2024 39th Youth Academic Annual Conference of Chinese Association of Automation (YAC), Dalian, China, 7–9 June 2024; pp. 1819–1824. [Google Scholar] [CrossRef]
  42. Vibin, V.; Sivraj, P.; Vanitha, V. Implementation of In-Vehicle and V2V Communication with Basic Safety Message Format. In Proceedings of the 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 11–12 July 2018; pp. 637–642. [Google Scholar] [CrossRef]
  43. Wei, S.; Zou, Y.; Zhang, X.; Zhang, T.; Li, X. An integrated longitudinal and lateral vehicle following control system with radar and vehicle-to-vehicle communication. IEEE Trans. Veh. Technol. 2019, 68, 1116–1127. [Google Scholar] [CrossRef]
  44. Seat. SEAT:CODE. 2019. Available online: https://code.seat/ (accessed on 1 January 2020).
  45. Zhao, S.; Zhang, T.; Wu, N.; Ogai, H.; Tateno, S. Vehicle to vehicle communication and platooning for EV with wireless sensor network. In Proceedings of the 2015 54th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), Hangzhou, China, 28–30 July 2015. [Google Scholar] [CrossRef]
  46. Hwang, H.Y.; Oh, S.M.; Shin, J. CAN gateway for fast vehicle to vehicle (V2V) communication. In Proceedings of the 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 28–30 October 2015. [Google Scholar] [CrossRef]
  47. Shuhaimi, N.I.; Juhana, T. Security in Vehicular Ad-Hoc Network with Identity-Based Cryptography Approach: A survey. In Proceedings of the 2012 7th International Conference on Telecommunication Systems, Services and Applications (TSSA), Denpasar-Bali, Indonesia, 30–31 October 2012; pp. 276–279. [Google Scholar]
  48. Andreica, T.; Groza, B. Secure V2V Communication with Identity-based Cryptography from License Plate Recognition. In Proceedings of the Sixth International Conference on Internet of Things, Management and Security (IOTSMS), Granada, Spain, 22–25 October 2019; pp. 366–373. [Google Scholar]
  49. Al-shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network. Symmetry 2020, 12, 1687. [Google Scholar] [CrossRef]
  50. Wasef, A.; Shen, X. Efficient group signature scheme supporting batch verification for securing vehicular networks. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–5. [Google Scholar] [CrossRef]
  51. Gopinath, N.; Narayanan, K.L.; Sageengrana, S.; Meenakshi, M. HAA: A Novel Hybrid Authentication Scheme for VANETs Integrating Certificate-Based and Identity-Based Cryptography with Advanced Attack Detection. In Proceedings of the 2025 International Conference on Computing and Communication Technologies (ICCCT), Chennai, India, 16–17 April 2025; pp. 1–6. [Google Scholar] [CrossRef]
  52. CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. 2012. Available online: http://competitions.cr.yp.to/caesar.html (accessed on 10 March 2021).
  53. UNE-ISO 3779:2011; Vehículos de Carretera. Número de identificación de los vehículos (VIN). Contenido y Estructura. 2017. Available online: https://www.une.org/encuentra-tu-norma/busca-tu-norma/norma?c=N0047944 (accessed on 8 March 2021).
  54. Vanier, J. App-vin-reader. GitHub. 2016. Available online: https://github.com/carloop/app-vin-reader/blob/master/src/app-vin-reader.cpp (accessed on 8 March 2021).
  55. Zhong, M. Research on vehicle identification method of Judicial Expertise based on deep learning algorithm. In Proceedings of the 2025 5th International Symposium on Computer Technology and Information Science (ISCTIS), Xi’an, China, 16–18 May 2025; pp. 63–66. [Google Scholar] [CrossRef]
  56. Gordón, P.E. ES1249504 Número de bastidor/chasis de un automóvil en formato digital. 2021. Available online: https://patentscope.wipo.int/search/en/detail.jsf;jsessionid=EC3B477650F5D25814CA6F00BDC554B2.wapp2nA?docId=ES299105622&_cid=P20-KCVZ3H-27158-3 (accessed on 20 December 2021).
  57. SAE International. J1979: E/E Diagnostic Test Modes. 2012. Available online: https://www.sae.org/standards/content/j1979_201202/ (accessed on 10 March 2021).
  58. ISO 15031-3:2016; Road Vehicles—Communication Between Vehicle and External Equipment for Emissions-Related Diagnostics—Part 3: Diagnostic Connector and Related Electrical Circuits: Specification and Use. International Organization for Standardization: Geneva, Switzerland, 2016. Available online: https://www.iso.org/standard/64636.html (accessed on 8 March 2021).
  59. Bellare, M.; Canetti, R.; Krawczyk, H. Keying hash functions for message authentication. In Proceedings of the 16th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 1996; Advances in Cryptology–CRYPTO’96. Koblitz, N., Ed.; Volume 1109 of Lecture Notes in Computer Science. Springer: Berlin, Germany, 1996; pp. 1–15. [Google Scholar]
  60. Rogaway, P. Authenticated-encryption with associated-data. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, 18–22 November 2002; pp. 98–107. [Google Scholar] [CrossRef]
  61. Muñoz, F.; Porta, J.; Contreras, M. Redes Ad-Hoc. 2013. Available online: http://profesores.elo.utfsm.cl/~agv/elo322/1s14/projects/reports/G16/Redes%20Ad-Hoc.pdf (accessed on 10 March 2021).
  62. Vinel, A. 3GPP LTE versus IEEE 802.11p/WAVE: Which technology is able to support cooperative vehicular safety applications? IEEE Wirel. Commun. Lett. 2012, 1, 125–128. [Google Scholar] [CrossRef]
  63. Araniti, G.; Campolo, C.; Condoluci, M.; Iera, A.; Molinaro, A. LTE for vehicular networking: A survey. IEEE Commun. Mag. 2013, 51, 148–157. [Google Scholar] [CrossRef]
Figure 1. VIN decoding [54].
Figure 1. VIN decoding [54].
Sensors 25 05954 g001
Figure 2. Generic V2V communication protocol. Vehicle private keys.
Figure 2. Generic V2V communication protocol. Vehicle private keys.
Sensors 25 05954 g002
Figure 3. Generic V2V communication protocol. Communication flow.
Figure 3. Generic V2V communication protocol. Communication flow.
Sensors 25 05954 g003
Figure 4. V2V communication protocol based on [22]. Vehicle private keys.
Figure 4. V2V communication protocol based on [22]. Vehicle private keys.
Sensors 25 05954 g004
Figure 5. V2V communication protocol based on [22]. Communication flow.
Figure 5. V2V communication protocol based on [22]. Communication flow.
Sensors 25 05954 g005
Figure 6. V2V communication protocol based on [22]. B’s computations.
Figure 6. V2V communication protocol based on [22]. B’s computations.
Sensors 25 05954 g006
Figure 7. V2V communication protocol based on [22]. A’s computations.
Figure 7. V2V communication protocol based on [22]. A’s computations.
Sensors 25 05954 g007
Figure 8. First experiment: a collision avoidance system.
Figure 8. First experiment: a collision avoidance system.
Sensors 25 05954 g008
Figure 9. Second experiment: overtaking.
Figure 9. Second experiment: overtaking.
Sensors 25 05954 g009
Figure 10. Vehicles used in the experiments.
Figure 10. Vehicles used in the experiments.
Sensors 25 05954 g010
Figure 11. Hardware used in the experimental validation [54].
Figure 11. Hardware used in the experimental validation [54].
Sensors 25 05954 g011
Figure 12. Schematics of the experiment.
Figure 12. Schematics of the experiment.
Sensors 25 05954 g012
Figure 13. Speed value received [54].
Figure 13. Speed value received [54].
Sensors 25 05954 g013
Figure 14. Detailed speed value received [54].
Figure 14. Detailed speed value received [54].
Sensors 25 05954 g014
Table 1. Comparison.
Table 1. Comparison.
TechnologyCited ReferencesDisadvantagesID System
OCR[15,29,30,31,32,36]It is not reliable 100 × 100Plates
GSM[35,38]Limited authenticationICCID
RFID[34,37,38]Limited rangeRandom
Table 2. WiFi 802.11P Features.
Table 2. WiFi 802.11P Features.
StandardWiFi Based on 802.11P
RangeFrom 100 to 1000 m
Band5.9 GHz
ChannelsSeven channels, each 10 MHz wide
ModulationOFDM
Transfer rate3, 4, 5, 6, 9, 12, 18, 24, and 25 Mbps in 10 MHz channels; up to 54 Mbps in 20 MHz channels
Subcarrier52 subcarriers BPSK, QPSK, 16-QAM, or 64-QAM
Specific channelsSix for service and one for control
Table 3. 5G C-V2X Features.
Table 3. 5G C-V2X Features.
Standard3GPP 5G
RangeMore than 1000 m
Bandwidth700 MHz, 3,6, 26 GHz
Channels100 MHz per operator
ModulationOFDM
Transfer rate100 Mbps, 1, 3, or 10 Gbps depending on the bandwidth
Table 4. Components used for the proof of concept in the first vehicle.
Table 4. Components used for the proof of concept in the first vehicle.
TypeManufacturerModel
HardwareRaspberry Pi Foundation, Cambridge, UKPi 3
HardwareSK Pang Electronics Ltd, Essex, UKSkpang PiCAN
HardwareUputronics Ltd, Bingley, UKUputronics GPS/RTC
Operating SystemRaspberry Pi FoundationRaspbian Lite
HardwareOemOBD2 interface
VehicleBMW AG, Munich, GermanyBMW X1 WBAVN71060VX14326
Table 5. Components used for the proof of concept in the second vehicle.
Table 5. Components used for the proof of concept in the second vehicle.
TypeManufacturerModel
HardwareVector Informatik GmbH, Stuttgart, GermanyCANalyze CIA DS102-2
Operating SystemMicrosoft Corporation, Redmond, WA, USAWindows 10
HardwareASUSTeK Computer Inc., Taipei, TaiwanF510D
HardwareOemobd2 interface
VehicleBMW AG, Munich, GermanyBMW 320D WBAUT31010F150820
Table 6. Components, server, and WiFi.
Table 6. Components, server, and WiFi.
TypeManufacturerModel
HardwareASUSTeK Computer Inc., Taipei, TaiwanAsus Cloned PC i5-3470, 3.20 GHz, 16 Gb RAM, hard disk SSD
Operating SystemMicrosoft Corporation, Redmond, WA, USAWindows 10
SoftwareVMware, Inc., Palo Alto, CA, USAVMware Workstation Player
HardwareTP-Link Technologies Co., Ltd., Shenzhen, ChinaArcher C6–AC1200
Table 7. Execution time at 0 km/h.
Table 7. Execution time at 0 km/h.
Vehicle InitiatesVehicle ReceivesEstablished ConnectionProcessing Time A (s)Processing Time B (s)Iteration
ABOK0.09820.28121
ABOK0.09870.28142
ABOK0.09890.28213
ABOK0.09950.27994
ABOK0.09880.27885
ABOK0.09830.28226
ABOK0.09810.27187
ABOK0.09860.28198
ABOK0.09820.27879
ABOK0.09830.281310
Table 8. Execution time at 5 km/h.
Table 8. Execution time at 5 km/h.
Vehicle InitiatesVehicle ReceivesEstablished ConnectionProcessing Time A (s)Processing Time B (s)Iteration
ABOK0.09850.28421
ABOK0.09910.28182
ABOK0.09920.28323
ABOK0.09960.28774
ABOK0.10010.29015
ABOK0.09820.28456
ABOK0.09830.27217
ABOK0.09880.28228
ABOK0.09880.27919
ABOK0.09870.284510
Table 9. Processing times in seconds at 0 km/h.
Table 9. Processing times in seconds at 0 km/h.
AB
Average0.098560.27993
Variance1.684 × 10−78.8281 × 10−6
Standard deviation0.0004103660.002971212
Table 10. Processing times in seconds at 5 km/h.
Table 10. Processing times in seconds at 5 km/h.
AB
Average0.098930.28294
Variance3.121 × 10−72.14544 × 10−5
Standard deviation0.0005586590.004631889
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Escapa Gordón, P.; Matellán Olivera, V.; Suárez Corona, A. Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number. Sensors 2025, 25, 5954. https://doi.org/10.3390/s25195954

AMA Style

Escapa Gordón P, Matellán Olivera V, Suárez Corona A. Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number. Sensors. 2025; 25(19):5954. https://doi.org/10.3390/s25195954

Chicago/Turabian Style

Escapa Gordón, Pablo, Vicente Matellán Olivera, and Adriana Suárez Corona. 2025. "Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number" Sensors 25, no. 19: 5954. https://doi.org/10.3390/s25195954

APA Style

Escapa Gordón, P., Matellán Olivera, V., & Suárez Corona, A. (2025). Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number. Sensors, 25(19), 5954. https://doi.org/10.3390/s25195954

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop