Next Article in Journal
No Cell Left behind: Automated, Stochastic, Physics-Based Tracking of Every Cell in a Dense, Growing Colony
Next Article in Special Issue
Overview of Distributed Machine Learning Techniques for 6G Networks
Previous Article in Journal
Using Explainable Machine Learning to Explore the Impact of Synoptic Reporting on Prostate Cancer
Previous Article in Special Issue
Resource Allocation for Intelligent Reflecting Surfaces Assisted Federated Learning System with Imperfect CSI
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Authentication Protocol Based on Zero-Knowledge Proof

by
Nikita Konstantinovich Chistousov
1,*,
Igor Anatolyevich Kalmykov
1,
Daniil Vyacheslavovich Dukhovnyj
1,
Maksim Igorevich Kalmykov
1 and
Aleksandr Anatolyevich Olenev
2
1
Department of Information Security of Automated Systems, North-Caucasus Federal University Stavropol, 1 Pushkina Str., 355017 Stavropol, Russia
2
Stavropol State Pedagogical Institute, 417 Lenina Str., 355009 Stavropol, Russia
*
Author to whom correspondence should be addressed.
Algorithms 2022, 15(2), 50; https://doi.org/10.3390/a15020050
Submission received: 23 December 2021 / Revised: 21 January 2022 / Accepted: 27 January 2022 / Published: 30 January 2022
(This article belongs to the Special Issue Algorithms for Communication Networks)

Abstract

:
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.

1. Introduction

Ensuring confidentiality in modern information systems is a very relevant topic at present. This is due to the expansion of the scope of wireless data-processing and transmission systems, in which an intruder can intercept, read, and modify the transmitted data. Therefore, the use of authentication protocols that effectively resist attacks on information systems has been proposed when projects such as low-orbit satellite communication systems (LOSCS) for the OneWeb global space Internet [1,2], automatic object identification systems using RFID [3,4,5,6], and the Internet of Things [7,8,9] are being developed.
A special place among information systems, on which the comfort of modern society largely depends, is occupied by intelligent transportation systems (ITS), particularly the automotive self-organizing network Vehicular Ad Hoc Network (VANET). The use of VANET makes it possible to increase the efficiency and comfort of vehicle movement by providing the vehicle owner with information about the current state of traffic, dangerous sections on the road, and relevant services [10]. This real-time management leads to a reduction in the number of road accidents.
As a rule, VANET consists of [11]:
  • Roadside Units (RSU);
  • On Board Unit (OBU);
  • Certificate Authority (CA);
  • Service Provider (SP).
OBU devices are placed on board the vehicles and used to transmit information about the vehicle’s speed of movement and its main parameters. In addition, the owner of the vehicle has access to the Internet and related services with the help of OBU. To carry out this data exchange, stationary RSU devices are used, and form a network. The Certificate Authority is a trusted party and designed to generate and deliver secret and public keys for OBUs and RSUs. The Service Provider provides them with the appropriate services using the appropriate OBU’s rights verification mechanism.
However, VANET has vulnerabilities, determined by the wireless data transmission channel [12,13,14], while providing the comfortable and safe movement of vehicles. Authentication protocols allow us to eliminate some of the vulnerabilities and attacks aiming to obtain confidential information. The analysis of works [15,16,17,18] showed that the authentication protocol should have the following properties:
  • The protocol should have high cryptographic strength without the use of symmetric and asymmetric ciphers, with minimal time spent on its execution;
  • The protocol should ensure the confidentiality of the vehicle’s route;
  • The protocol should have a mechanism that allows the vehicle’s owner to change the level of confidentiality depending on the intensity of traffic.

Our Impact

  • Based on the properties described above, an authentication protocol has been developed that can adapt its characteristics to the intensity of traffic on the road. Its basis is a zero-knowledge authentication protocol (ZKAP), which will ensure the high confidentiality of the route and anonymity of the vehicle owner. At the same time, this protocol spent minimal time on vehicle identification compared to other ZKAPs, which allows us to increase the volume of traffic and transmit useful information between OBUs and RSUs.
  • A mechanism has been developed that allows the owner of the vehicle to change the parameters of the authentication protocol. If the traffic intensity on the road is low, then the OBU uses a maximal level of confidentiality. The vehicle’s owner reduces the level of confidentiality to a minimal value if the amount of network traffic between OBUs and RSUs increases in response to greater traffic intensity on the road. Since there is no exchange of useful information during OBU and RSU authentication, a reduction in the level of confidentiality reduces the time needed to determine the status of the vehicle. This will lead to an increase in the amount of transmitted useful information.
The structure of the article is as follows. Section 2 is devoted to the analysis of known authentication methods used to ensure VANET’s confidentiality. Section 3 is devoted to the analysis of zero-knowledge authentication protocols. Section 4 is devoted to the development of a scheme to adapt the level of confidentiality in the authentication protocol. Section 5 is devoted to the development of a scheme to verify the authority of the driver of the vehicle for the Service Provider. Section 6 is devoted to analysis of the research results.

2. Analysis of Authentication Protocols Used to Ensure Confidentiality in VANET

Since the computing power of the OBU is relatively small to ensure a high level of confidentiality in the authentication protocol, with minimal time spent on its execution, the use of Vehicular Cloud Computing (VCC) is proposed in a number of works [18,19,20,21,22]. The main advantage of this approach is the reduction in the time required for the authentication of OBU and RSU. In addition, VCC provides a number of services, such as data storage, vehicle maintenance, road condition and their loading in real-time, as well as vehicle traffic management, road accidents data, etc.
However, the use of multi-factor authentication proposed in [18] has a disadvantage, which is associated with an increase in the time spent on user identification, since this procedure uses several types of data. In references [19,20,21], the use of symmetric and asymmetric ciphers to increase the level of confidentiality is proposed. In [22] an authentication protocol is proposed that uses identifiers. However, this does not ensure the anonymity of the protocol participants.
In references [23,24,25], electronic digital signatures are used for authentication. However, the disadvantage of this authentication method is the need to deliver public and secret keys to each RSU and OBU.
In references [26], an approach was proposed in which vehicles located near one RSU form a single group. In this case, the OBUs data keys will be known to this RSU. The disadvantage of this solution is that if the RSU is compromised, OBUs keys will become available to an attacker.
In references [27,28,29], the authors justified the expediency of using encryption systems with secret keys in the authentication protocol. The purpose of these works is to increase the speed of the prover’s authentication. The disadvantages of such authentication protocols include the possibility of intercepting secret keys when they are delivered to RSUs and OBUs.
In reference [30], the message authentication code (MAC) is proposed for vehicle authentication. The prover generates a message authentication code (MAC) using a shared, secret key. The verifier verifies the prover using MAC and then receives the transmitted message. The advantage of this method is the minimal time spent on authentication. However, this method has low resistance to a number of attacks aiming to replace MAC. As a result, the intruder will be able to intercept all incoming and outgoing traffic passing through the user’s system and obtain the confidential data contained therein.
In references [31,32], ring signatures are proposed for authentication. In this case, the signatory must obtain the public keys of all other participants in order to generate a signature. Then, he uses all the public keys and his private key. As a result, the verifier does not know exactly who signed the message, but is aware that the signatory is included in the list of legal users. The disadvantage of this authentication method is the need for each legal owner to receive the keys of all vehicle owners.
The principles of building an authentication system that uses an optimized signature generation and verification scheme based on lattice-based cryptography are considered in [33]. This approach allows for signatures to be generated based on asymmetric encryption using lattice theory problems. The advantage of this approach is an 18% reduction in the length of the blind signature and 30% reduction in the signature generation time. However, the disadvantage of this authentication system is the lack of an accurate method to assess the complexity of lattice algorithms in relation to existing types of attack. Therefore, this authentication method has no formal proof of security.
The results of the analysis allow us to draw the following conclusions: 1. The use of encryption systems allows for a sufficiently high level of confidentiality when authenticating vehicles in VANET, but requires the creation of an additional key management system. At the same time, compromising the keys will lead to a decrease in the level of protection of the transmitted data in VANET. 2. The development of zero-knowledge authentication protocol, which ensures a high level of vehicle confidentiality without the use of encryption methods, is an urgent task.

3. Zero-Knowledge Authentication Protocols: Advantages and Disadvantages

The presence of the verifier (V) and the prover (P) is required for authentication using the zero-knowledge protocol. The prover must prove to the verifier that he owns a certain secret without disclosing it during the execution of the protocol. The protocol is built in such a way that the verifier can verify the truth of the prover’s answers without knowing its secret [34].
One of the first ZKAPs was the Fiat–Shamir protocol [35]. The protocol must be executed within 40 rounds to ensure high imitability. The Feige–Fiat–Shamir ZKAP can reduce the time spent on authentication. Increasing the number of questions to 5 bits reduces the number of rounds to 8 [34,36]. Feige–Fiat–Shamir protocols are used in smart cards [37,38], the Internet of Things [39], and RFID automatic object identification systems [40,41] due to their high imitability. In reference [42], it was shown that the use of Feige–Fiat–Shamir ZKAP in IoT devices provides high imitability with the use of a 20-bit key and 20 rounds of authentication.
The Schnorr ZKAP has a higher authentication speed [43]. This result was achieved by reducing the number of rounds in the protocol. However, this protocol does not provide a minimal authentication time. This is due to the fact that the considered protocols use high prime numbers, of 512 digits and more, to ensure a high level of confidentiality. This leads to an increase in the time spent performing the authentication procedure. This problem can be solved by developing the ZKAP, which uses session keys. This will reduce the number of authentication steps, providing a high level of confidentiality with a lower bit depth for the processed data.

4. ZKAP Using Session Keys

Assume that only OBUs and RSUs work in the VANET network. In reference [44], the authors proposed an authentication scheme in which OBUs fully trust RSUs. In this case, only the OBU needs to be authenticated. However, this scheme has a disadvantage. The RSU can control the vehicle’s route when this authentication scheme is used. Therefore, during the development of an authentication protocol, we proceed from the condition that both sides do not trust each other.
Assume that the vehicle manufacturer loads a secret key, O p r i v a t e , into each OBU. When the VANET network is deployed, every RSU has its own secret key R p r i v a t e , which is loaded into the appropriate RSU. These keys can be changed periodically using Certificate Authority.
Certificate Authority places a large prime number D and the number u (the primitive root modulo D) in the public domain to organize the authentication process.
OBU and RSU independently choose random numbers:
O B U :   W < D 1 ,   R S U :   Y < D 1
These numbers are used to calculate the OBU and RSU session keys, respectively. The use of a pseudo-random function (PRF) is proposed [45] to obtain session keys. Then,
O B U :     W ( i ) = u 1 W ( i 1 ) + O private mod D
R S U :     Y ( i ) = u 1 Y ( i 1 ) + R private mod D
where W ( i 1 ) ,     Y ( i 1 ) are session keys, which were used on ( i 1 ) -th authentication session: W ( 0 ) = W ,     Y ( 0 ) = Y .
Consider the ZKAP, which provides a maximal level of confidentiality. Assume that OBU is the prover and RSU is the verifier.
Authentication protocol O B U ( P r o v e r ) R S U ( V e r i f e r ) .
At the beginning of the authentication session, the prover calculates its true index:
1.   O B U :     X ( i ) = u O p r i v a t e u W ( i ) mod D
where X ( i ) is the true index of OBU; i is authentication session number.
Then, the OBU starts calculating its “noisy” index. To do this, it first generates numbers Δ O p r i v a t e ( i ) ,   Δ W ( i ) :
2.   O B U :     { Δ O p r i v a t e ( i ) ,   Δ W ( i ) } < D 1
where Δ O p r i v a t e ( i ) ,   Δ W ( i ) are random numbers for “noisy” keys.
“Noisy” keys are calculated using expressions (6):
3.   O B U :       O p r i v a t e * ( i ) = ( O p r i v a t e +   Δ O p r i v a t e ( i ) ) mod φ ( D ) , 4.   O B U :       W * ( i ) = ( W ( i ) + Δ W ( i ) ) mod φ ( D ) ,
where O p r i v a t e * ( i ) ,   W * ( i ) are “noisy” key values; φ ( D ) is Euler’s totient function of the prime number D.
After that, OBU calculates its “noisy” index:
5.   O B U :     X * ( i ) = u O p r i v a t e * ( i ) u W * ( i ) mod D
where X * ( i ) OBU’s “noisy” index; i is authentication session number.
The authentication process includes the following procedures. When an OBU appears in the range of the RSU, the latter generates a random number:
6.   R S U :     K ( i ) < D 1
This number serves as a question from the verifier in the developed protocol. The number K(i) is passed to the prover (OBU).
R S U O B U :     K ( i )
Having received the number–question K(i) from the verifier, the prover proceeds to calculate the answers. These answers depend on both the question and the secret and session keys.
7.   G 1 ( i ) = ( O p r i v a t e * ( i ) K ( i ) O p r i v a t e ) mod φ ( D ) .
8.   G 2 ( i ) = ( W * ( i ) K ( i ) W ( i ) ) mod φ ( D ) .
The true and “noisy” OBU’s indexes, as well as the answers to the questions, the prover transmits to the RSU in the form of a signal:
9.   O B U :     S O B U ( i ) = ( X ( i ) | | X * ( i ) | | G 1 ( i ) | | G 2 ( i ) ) . 10.   O B U R S U :     S O B U ( i ) .
After receiving a signal from the prover (OBU), RSU calculates the expression
11.   R S U :     S ( i ) = X K ( i ) ( i ) u G 1 ( i ) u G 2 ( i ) mod D
If the answers to the question–number given by OBU are correct, then S ( i ) = X * ( i ) . This means that the OBU has passed authentication. After authentication, RSU can arrange a communication session with SP to provide the necessary service to the vehicle owner. At the same time, RSU cannot obtain information about the vehicle itself, or calculate its route, which ensures the confidentiality of the VANET network.
Since OBU and RSU do not trust each other, the authentication protocol must be executed in the other direction. In this case, RSU acts as a prover, and OBU acts as a verifier.
Authentication protocol R S U ( P r o v e r ) O B U ( V e r i f e r ) .
1.   R S U :     F ( i ) = u R p r i v a t e u Y ( i ) mod D
where F(i) is the true index of RSU; i is authentication session number.
2.   R S U :     { Δ R p r i v a t e ( i ) ,   Δ Y ( i ) } < D 1
3.   R S U :     R p r i v a t e * ( i ) = ( R p r i v a t e +   Δ R p r i v a t e ( i ) ) mod φ ( D ) , 4.   R S U :     Y * ( i ) = ( Y ( i ) + Δ Y ( i ) , ) mod φ ( D ) .
5.   R S U :     F * ( i ) = u R p r i v a t e * ( i ) u Y * ( i ) mod D
where F*(i) is the “noisy” index of RSU.
6.   O B U :     Q ( i ) < D 1 ,   O B U R S U :     Q ( i ) .
7.   R S U :     T 1 ( i ) = ( R p r i v a t e * ( i ) Q ( i ) R p r i v a t e ) mod φ ( D ) ,
where T1(i) is the first answer to the posed question Q(i).
8.   R S U :     T 2 ( i ) = ( Y * ( i ) Q ( i ) Y ( i ) ) mod φ ( D )
where T2(i) is the second answer to the posed question Q(i).
9.   R S U :     S R S U ( i ) = ( F ( i ) | | F * ( i ) | | T 1 ( i ) | | T 2 ( i ) ) . 10.   R S U O B U :     S R S U ( i ) .
11.   R S U :     H ( i ) = F Q ( i ) ( i ) u T 1 ( i ) u T 2 ( i ) mod D
If H ( i ) = F * ( i ) , then RSU is authenticated. After two-way authentication, RSU can receive information from OBU, bring the situation on the road to the vehicle, and provide warnings about dangerous areas, as well as accidents on the highway. In addition, RSU can provide a channel for communication with SP. This will allow the vehicle owner to receive the necessary service in real-time. Thanks to the developed protocol, RSU does not have the opportunity to obtain information about the vehicle, or calculate its route. This ensures VANET’s confidentiality. The authentication protocol can also be implemented between two OBUs. In this case, the roles of prover and verifier are performed by two different OBUs.
Analysis of the developed ZKAP shows that its cryptographic strength is determined by the computational complexity of solving the Diffie–Hellman problem (DHP). The use of a zero-knowledge authentication protocol allows us to ensure a level of confidentiality comparable to the confidentiality of encryption algorithms and electronic digital signatures. The authentication process takes place without the use of secret keys and a secure communication channel, unlike encryption algorithms and electronic digital signatures. Therefore, an open communication channel is used in VANET for authentication by the developed protocol. This channel will be used after authentication to transfer information packets between OBUs and RSU and provide various services.

5. Development of a Scheme for Adapting the Authentication Protocol to the Road Traffic Intensity

There is no exchange of information between RSU and OBU during the execution of the two-way authentication. As a result, the transmitted data traffic between OBU and RSU is reduced. At the same time, as the traffic flow increases, the time spent on authenticating all OBUs greatly increases. This has a negative impact on traffic safety, as the amount of information that OBUs receive from the RSU about the situation on the road and accidents on the highway is reduced. Therefore, the development of a scheme to adapt authentication protocol parameters to traffic intensity is an urgent task.
Analysis of the developed protocol shows that it has the potential to increase the authentication speed by reducing the level of confidentiality. This result is achieved by reducing the secret parameters in the authentication protocol. A maximal level of confidentiality is achieved by simultaneous use of secret and session keys for OBU and RSU. The implementation of authentication protocols was discussed earlier. A reduction in the confidentiality to a minimal level by rejecting session keys allows us to reduce the needed time to perform an authentication operation. This will increase the traffic of the messages transmitted between OBUs and RSUs.
Consider ZKAP, which provides a minimal level of confidentiality. Assume that OBU is the prover and RSU is the verifier.
Authentication protocol O B U ( P r o v e r ) R S U ( V e r i f e r ) .
1.   O B U :     X ( i ) = u O p r i v a t e mod D
where X ( i ) is the true index of OBU; i is authentication session number.
2.   O B U :     { Δ O p r i v a t e ( i ) } < D 1
where Δ O p r i v a t e ( i ) is random number for “noisy” OBU’s secret key.
3.   O B U :       O p r i v a t e * ( i ) = ( O p r i v a t e +   Δ O p r i v a t e ( i ) ) mod φ ( D ) ,
where O p r i v a t e * ( i ) is the “noisy” value of OBU’s secret key; φ ( D ) is Euler’s totient function of the prime number D.
4.   O B U :     X * ( i ) = u O p r i v a t e * ( i ) mod D
where X * ( i ) is the “noisy” index of OBU.
When OBU appears in the range of RSU, the latter generates a random number and passes it to the OBU
5.   R S U :     K ( i ) < D 1
6.   R S U O B U :     K ( i )
7.   G 1 ( i ) = ( O p r i v a t e * ( i ) K ( i ) O p r i v a t e ) mod φ ( D ) .
where G1(i) is the answer to the posed question K(i).
8.   O B U :     S O B U ( i ) = ( X ( i ) | | X * ( i ) | | G 1 ( i ) ) . 9.   O B U R S U :     S O B U ( i ) .
10.   R S U :     S ( i ) = X K ( i ) ( i ) u G 1 ( i ) mod D
If the answers to the question–number given by OBU are correct, then S ( i ) = X * ( i ) . This means that OBU is authenticated.
Authentication protocol R S U ( P r o v e r ) O B U ( V e r i f e r ) .
1.   R S U :     F ( i ) = u R p r i v a t e mod D
where F(i) is the true index of RSU; i is authentication session number.
2.   R S U :     { Δ R p r i v a t e ( i ) } < D 1
where Δ R p r i v a t e ( i ) is random number for “noisy” RSU’s secret key.
3.   R S U :     R p r i v a t e * ( i ) = ( R p r i v a t e +   Δ R p r i v a t e ( i ) ) mod φ ( D ) .
where R p r i v a t e * ( i ) is the “noisy” value of RSU’s secret key.
4.   R S U :     F * ( i ) = u R p r i v a t e * ( i ) mod D
where F*(i) is the “noisy” index of RSU.
5.   O B U :     Q ( i ) < D 1 ,   O B U R S U :     Q ( i ) ,
where Q ( i ) is a random question–number for the authentication of RSU.
6.   R S U :     T 1 ( i ) = ( R p r i v a t e * ( i ) Q ( i ) R p r i v a t e ) mod φ ( D ) ,
where T1(i) is the answer to the posed question Q(i).
7.   R S U :     S R S U ( i ) = ( F ( i ) | | F * ( i ) | | T 1 ( i ) ) . 8.   R S U O B U :     S R S U ( i ) .
9.   R S U :     H ( i ) = F Q ( i ) ( i ) u T 1 ( i ) mod D ,
If H ( i ) = F * ( i ) , then RSU is authenticated. The analysis of Equations (20)–(33) shows that a reduction in the time spent calculating the true and “noisy” RSU’s and OBU’s indexes to verify the correctness of the answer to the posed question, as well as a reduction in the number of answers themselves, can increase the speed of the authentication procedure. However, this reduces the confidentiality of the authentication protocol by reducing the bit depth of the signals S O B U ( i ) ,     S R S U ( i ) . Thanks to this adaptation of the project, the efficiency of OBUs and RSUs increases with a high density of vehicles on the road.
As was described earlier, the strength of the developed authentication protocol is determined by the computational complexity of solving the Diffie–Hellman problem (DHP). The security of the scheme to reduce the level of confidentiality in the developed protocol is based on the reducibility of its exposure to, and solving of, computationally complex problems. According to the concept of evidence-based security, it is as difficult to solve the problem of exposing (security violation) the cryptographic schemes (algorithms, primitives) used in the protocol as it is to expose the protocol.

6. Analysis of the Results of the Conducted Research

The VANET model was developed to analyze the parameters of the developed adaptive authentication protocol. NS-2 was chosen as the simulation system, in which code modification is allowed. The VANET model consists of 10 RSUs. The maximal number of OBUs per RSU is 100. Each OBU and RSU uses the developed adaptive authentication protocol. Communication channel is a discrete communication channel without interference. The radius of the interaction zone of the OBU and RSU is 1 km. RSUs are 2 km apart to provide direct visibility. The data transfer rate between OBU and RSU is 1 Mbit/s. The time-to-live (TTL) of VANET network is 1. Minimal packet size is 50 bytes. Maximal packet size is 200 bytes.
The cryptographic strength of the developed adaptive authentication protocol will be determined by the bit depth of the signals S O B U ( i ) ,     S R S U ( i ) coming from the prover. We will use the probability of selecting the prover signal to assess the cryptographic strength of the adaptive protocol:
P = 1 M j 2 log 2 D ,
where M j is the number of parts in signals S O B U ( i ) ,     S R S U ( i ) .
Consider the use of a 32-bit modulus in the developed authentication protocol. The number of parts of S O B U ( i ) ,     S R S U ( i ) is M j = 4 with a maximal level of confidentiality. Then, the probability of selecting the prover signal is P max ( 32 ) = 5.82 10 11 . If the level of confidentiality is reduced to a minimum, the number of parts of S O B U ( i ) ,     S R S U ( i ) will be reduced to M j = 3 . In this case, the probability of selecting the prover signal is P min ( 32 ) = 7.76 10 11 . Thus, the transition from maximal level of confidentiality to minimal one leads to a decrease in the cryptographic strength of the protocol by 1.33 times.
However, the authentication protocol using the 32-bit modulus D does not provide a high level of confidentiality. This is confirmed by a software implementation that allows us to determine the password’s resistance to brute force [46]. If a 56-bit password is used, it will be cracked after 2 h. If the password length is 64 bits, then the time interval required to crack the password increases to 2 days. Therefore, it is obvious that the bit depth of modulus D should not be less than 64 bits. Therefore, when using a 64-bit modulus and maximal level of confidentiality for the developed protocol, the probability of selecting the prover signal is P max ( 64 ) = 1.35 10 20 . When the level of confidentiality is reduced to a minimum, the probability of selecting the prover signal is P min ( 64 ) = 1.81 10 20 . Increasing the size of modulus D to 64 bits allowed for a confidentiality level that was more than eight orders of magnitude higher compared to the 32-bit authentication protocol.
The FPGA Artix-7 xc7a12ticsg325-1L was used to evaluate the effectiveness of the developed adaptive authentication protocol. The clock frequency was 100 MHz. Testing was conducted on the Vivado HLS 2019 platform. The bit depth of the modulus D used in the protocol was 32. The multiplicative operation was based on a binary algorithm, which was used to exponentiate an integer modulo D. The following parameters were selected to determine the maximal possible time spent on authentication: modulus D = 4,294,967,291, an exponent ranging from 20 to 30. With the use of a binary algorithm to exponentiate an integer, the calculation time of the true digest was T1 = 14,200 ns and the calculation time of the noisy digest was T2 = 15,650 ns. The transmission time of the question was T3 = 32,000 ns. The calculation time of the answer to the question was T4 = 400 ns. The transmission time of the answer to the question was T5 = 96,000 ns. The answer check time was T6 = 28,530 ns. The total execution time of the authentication protocol with a minimal level of confidentiality was T min ( 32 ) = 185.780   μ s .
The figure shows the dependence of the volume of information traffic on the intensity of road traffic when using a 32-bit authentication protocol.
The analysis of Figure 1 allows us to draw the following conclusions. If the OBU density per 1 km is 30, then, for the authentication protocol with a maximal level of confidentiality, the volume of information traffic was 126,012.3 bytes. A reduction in the level of confidentiality to a minimal level allowed us to increase information traffic by 1.015 times, bringing its volume to the value of 127,816.3 bytes. If we increase the OBU density per 1 km three times, then the volume of information traffic is 115,892.8 bytes, with a maximal level of confidentiality. A reduction in the level of confidentiality to a minimal one allows us to increase information traffic by almost 5%, bringing its volume to 121,305 bytes.
Figure 2 shows the dependence of the average number of packets per OBU when using a 32-bit authentication protocol with a maximal level of confidentiality.
The analysis of Figure 2 allows us to draw the following conclusions. If the density of an OBU per 1 km does not exceed 30, then the average number of packets of 50 bytes per OBU is 84. When increasing a packet size to 150 bytes, the average number of packets per OBU is 27. We receive 16 packets with a packet size of 250 bytes. If the density of OBU per 1 km increases by three times, then the average number of packets per OBU will be 25 with a packet size of 50 bytes. The average number of packets per OBU is seven, with a packet size of 150 bytes. We receive four packets with a packet size of 250 bytes.
The average number of packets per OBU will be greater when a minimal level of confidentiality is used in the authentication protocol. Figure 3 shows the dependence of the average number of packets per OBU when using a 32-bit authentication protocol with a minimal level of confidentiality.
If the density of an OBU does not exceed 30 per 1 km, then the average number of 50-byte packets per OBU is 85. When the packet size is increased to 150 bytes, the average number of packets per OBU is 28. We obtain 17 packets with a packet size of 250 bytes. If the density of OBU per 1 km increases by three times, then the average number of packets per OBU will be 27, with a packet size of 50 bytes. The average number of packets per OBU is eight, with a packet size of 150 bytes. We obtain five packets with a packet size of 250 bytes.
The experimental results shown in Figure 2 and Figure 3, obtained using a 32-bit protocol, differ slightly from each other. This is because this protocol has a low computational complexity. Therefore, changing the protocol parameters (reducing modular exponentiation operations, the number of answers to the question and the bit depth of the prover’s signal) has a negligible effect on the authentication time in the case of a transition from a maximal confidentiality level to a minimal one. Therefore, the experimental results presented in Figure 2 and Figure 3 do not allow us to fully assess the effectiveness of the developed authentication protocol.
However, a 32-bit modulus cannot be used because it has low resistance to brute force attacks. At the same time, the implementation time of such an attack is very short. Let us increase the bit depth of the modulus used in the developed zero-knowledge authentication protocol. The time spent checking the status of the OBU and RSU increased with the transition to a 64-bit authentication protocol. For a minimal level of confidentiality, the calculation time of the true digest was T1 = 54,000 ns, and the calculation time of the noisy digest was T2 = 55,600 ns. The transmission time of the question was T3 = 64,000 ns. The calculation time of the answer to the question was T4 = 800 ns. The transmission time of the answer to the question was T5 = 132,000 ns. The answer check time was T6 = 108,180 ns. The total execution time of the authentication protocol with a minimal level of confidentiality is T min ( 64 ) = 414.580   μ s .
When the level of confidentiality is switched to a maximal one, the time spent on protocol execution increases by 1.95 times, reaching the value of T min ( 64 ) = 808.070   μ s . Figure 4 shows the volume of information traffic’s dependence on the road traffic intensity when executing a 64-bit protocol.
The analysis of Figure 4 allows us to draw the following conclusions. If the OBU density per 1 km is 30, then, for the authentication protocol with maximal level of confidentiality, the volume of information traffic is 124,702.9 bytes. A reduction in the level of confidentiality to a minimal one allows us to increase information traffic by 1.025 times, bringing its volume to the value of 127,811.6 bytes. If we increase the OBU density per 1 km by three times, then the volume of information traffic is 11,1964.8 bytes, with a maximal level of confidentiality. A reduction in the confidentiality level to a minimal one allows us to increase information traffic by 1.09 times, bringing its volume to 121,290 bytes.
Figure 5 shows the dependence of the average number of packets per OBU when using a 64-bit authentication protocol with a maximal level of confidentiality.
The analysis of Figure 5 allows us to draw the following conclusions. If the density of an OBU per 1 km does not exceed 30, then the average number of packets of 50 bytes per OBU is 81. When the packet size is increased to 150 bytes, the average number of packets per OBU is 25. We obtain 11 packets with a packet size of 250 bytes. If the density of OBU per 1 km increases by three times, then the average number of packets per OBU will be 22, with a packet size of 50 bytes. The average number of packets per OBU is five, with a packet size of 150 bytes. We obtain two packets, with a packet size of 250 bytes.
When a minimal confidentiality level is used for the authentication protocol, the average number of packets per OBU will be greater. Figure 6 shows the dependence of the average number of packets per OBU when using a 64-bit authentication protocol with a minimal level of confidentiality.
If the density of an OBU per 1 km does not exceed 30, then the average number of packets of 50 bytes per OBU is 83. When the packet size is increased to 150 bytes, the average number of packets per OBU is 27. We obtain 14 packets, with a packet size of 250 bytes. If the density of OBU per 1 km increases by three times, then the average number of packets per OBU will be 26, with a packet size of 50 bytes. The average number of packets per OBU is seven, with a packet size of 150 bytes. We obtain four packets, with a packet size of 250 bytes.
Analysis of the results showed that the time spent increases 1.048 times when switching from a 32-bit protocol to a 64-bit protocol. This is because when using 32- and 64-bit modulus, the time required to transmit the question and answer ranges from 0.68 (with a minimal level of confidentiality) to 0.25 (with a maximal level of confidentiality) of the entire protocol execution time. Obviously, it is possible to increase the volume of information traffic by changing the level of confidentiality with a modulus of size of 128 bits or more. This is the most promising future research direction. In addition, there is no scheme in the presented adaptive protocol that can authenticate the vehicle, to provide it with appropriate services using the Service Provider.

7. Conclusions

The article analyzes the main methods used to increase vehicles’ confidentiality when using VANET. Based on this research, it was concluded that it is advisable to use authentication protocols based on zero-knowledge proof, since they have a high cryptographic strength without the use of symmetric and asymmetric ciphers. The analysis of these protocols showed that they have a low authentication speed, since they have several rounds. To eliminate this disadvantage, an authentication protocol has been developed that requires a minimal number of operations to determine the prover’s status. A scheme was developed to adapt the level of confidentiality in the authentication protocol. The use of this scheme allows for a reduction in the level of confidentiality, to reduce the computational complexity of the protocol and increase the volume of information traffic when data exchanges occur between OBU and RSU. FPGA Artix-7 xc7a12ticsg325-1L was used to evaluate the effectiveness of the developed adaptive authentication protocol. The results showed that when a 64-bit modulus and maximal level of confidentiality are used for the developed protocol, the probability of selecting the verifier signal is P max ( 64 ) = 1.35 10 20 .
The article presents the most promising methods to improve the efficiency of the developed adaptive authentication protocol. These include the use of a larger-sized modulus (128 bits), as well as the development of a scheme that would allow for authentication of the vehicle, to provide it with appropriate services by the Service Provider.

Author Contributions

Conceptualization, I.A.K.; Data curation, N.K.C., M.I.K. and A.A.O.; Formal analysis, I.A.K.; Investigation, N.K.C., I.A.K., M.I.K. and A.A.O.; Methodology, I.A.K.; Project administration, I.A.K.; Software, N.K.C. and D.V.D.; Supervision, I.A.K.; Validation, D.V.D.; Visualization, D.V.D.; Writing—original draft, I.A.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Russian Foundation for Basic Research (Moscow), grant number 20-37-90009.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. OneWeb. Available online: https://oneweb.net/ (accessed on 25 October 2021).
  2. Henri, Y. The OneWeb Satellite System. In Handbook of Small Satellites; Springer: Cham, Switzerland, 2020; pp. 1–10. [Google Scholar]
  3. Debiao, H.; Sherali, Z. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography. IEEE Internet Things J. 2014, 2, 72–83. [Google Scholar]
  4. Liu, Z.; Zhang, W.; Wu, C. A Lightweight Code-Based Authentication Protocol for RFID Systems. In Proceedings of the International Conference Applications and Techniques Information Security, Beijing, China, 4–6 November 2015; Volume 557, pp. 114–128. [Google Scholar]
  5. Srinivas, J.; Ashok, K.D.; Athanasios, V.V. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Inform. 2020, 16, 7081–7093. [Google Scholar]
  6. Michail, S.; Ming, T.O.; Ravivarma, V.S.; Junya, N.; Ren, O.; Jing, H.K. Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains. IEEE Access. 2019, 7, 7273–7285. [Google Scholar]
  7. Xiong, C. Secured System Architecture for the Internet of Things Using a Two Factor Authentication Protocol; University of Ottawa: Ottawa, ON, Canada, 2020; p. 144. [Google Scholar]
  8. Kang, J.; Park, G.; Park, J.H. Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments. J. Supercomput. 2016, 72, 4319–4336. [Google Scholar] [CrossRef]
  9. Soewito, B.; Marcellinus, Y. IoT security system with modified Zero Knowledge Proof algorithm for authentication. Egypt. Inform. J. 2021, 22, 269–276. [Google Scholar] [CrossRef]
  10. Elhoseny, M.; Shankar, K. Energy Efficient Optimal Routing for Communication in VANETs via Clustering Model. Emerg. Technol. Connect. Internet Veh. Intell. Transp. Syst. Netw. 2019, 242, 1–14. [Google Scholar]
  11. Hamdi, M.M.; Audah, L.; Abduljabbar, S.; Hamid, A. A Review of Applications, Characteristics and Challenges in Vehicular Ad Hoc Networks (VANETs). In Proceedings of the 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, 26–28 June 2020; pp. 1–7. [Google Scholar]
  12. Zeadally, S.; Hunt, R.; Chen, Y.-S.; Irwin, A.; Hassan, A. Vehicular ad hoc networks (VANETS): Status, results, and challenges. Telecommun. Syst. 2012, 50, 217–241. [Google Scholar] [CrossRef]
  13. Sheikh, M.S.; Liang, J. A Comprehensive Survey on VANET Security Services in Traffic Management System. Wirel. Commun. Mob. Comput. 2019, 2019, 23. [Google Scholar] [CrossRef] [Green Version]
  14. Arif, M.; Wang, G.; Geman, O.; Balas, V.E.; Tao, P.; Brezulianu, A.; Chen, J. SDN-based VANETs, Security Attacks, Applications, and Challenges. Appl. Sci. 2020, 10, 3217. [Google Scholar] [CrossRef]
  15. Sundareswaran, V.; Aravindhar, J. A Secured Data Transmission in VANET using Dual Group Keys and Frequent Data Identification. Taga J. 2017, 14, 2042–2051. [Google Scholar]
  16. Kang, J.; Elmehdwi, Y.; Lin, D. SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Singapore, 8–10 August 2018; Volume 238, pp. 823–837. [Google Scholar]
  17. Daeinabi, A.; Rahbar, A.G. Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks. Multimed. Tools Appl. 2013, 66, 325–338. [Google Scholar] [CrossRef]
  18. Hegde, N.; Manvi, S.S. MFZKAP: Multi Factor Zero Knowledge Proof Authentication for Secure Service in Vehicular Cloud Computing. In Proceedings of the 2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP), Gangtok, India, 25–28 February 2019; pp. 1–6. [Google Scholar]
  19. Whaiduzzaman, M.; Sookhak, M.; Gani, A.; Buyya, R. A survey on vehicular cloud computing. J. Netw. Comput. Appl. 2014, 40, 325–344. [Google Scholar] [CrossRef]
  20. Chen, Y.; Sion, R. On securing untrusted clouds with cryptography. In Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, New York, NY, USA, 4 October 2010; Volume 23, p. 109114. [Google Scholar]
  21. Alizadeh, M.; Abolfazli, S.; Zamani, M.; Baharun, S.; Sakurai, K. Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. 2016, 61, 59–80. [Google Scholar] [CrossRef]
  22. Li, H.; Dai, Y.; Tian, L.; Yang, H. Identity-Based Authentication for Cloud Computing. In Proceedings of the IEEE International Conference on Cloud Computing, Bangalore, India, 21–25 September 2009; Volume 5931, pp. 157–166. [Google Scholar]
  23. Lipton, B. Zero-Knowledge Proof and Authentication Protocols. In Proceedings of the IEEE Conference on Computer Communications, Phoenix, AZ, USA, 10–15 April 2016; pp. 1903–1911. [Google Scholar]
  24. Liu, X.; Yang, Y.; Xu, E.; Jia, Z. An Authentication Scheme in VANETs Based on Group Signature. In Proceedings of the International Conference on Intelligent Computing, Mukalla, Yemen, 15–16 December 2019; Volume 11643, pp. 346–355. [Google Scholar]
  25. Yue, X.; Chen, B.; Wang, X.; Duan, Y.; Gao, M.; He, Y. An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures. IEEE Access 2018, 6, 62584–62600. [Google Scholar] [CrossRef]
  26. Hao, Y.; Cheng, Y.; Ren, K. Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs. In Proceedings of the IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM), New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–5. [Google Scholar]
  27. Rasheed, A.A.; Mahapatra, R.N.; Hamza-Lup, F.G. Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2019, 21, 867–881. [Google Scholar] [CrossRef]
  28. Al-Mutiri, R.; Al-Rodhaan, M.; Tian, Y. Improving vehicular authentication in VANET using cryptography. Int. J. Commun. Netw. Inf. Secur. 2018, 10, 248–255. [Google Scholar]
  29. Alaya, B.; Sellami, L. Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks. J. Inf. Secur. Appl. 2021, 58, 102779. [Google Scholar] [CrossRef]
  30. Pandi, V.; Maria, A.; Victor, C.; Jegatha, D.; Balamurugan, B. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 2017, 20, 2439–2450. [Google Scholar]
  31. Jinhui, L.; Yong, Y.; Jianwei, J.; Shijia, W.; Peiru, F.; Houzhen, W.; Huanguo, Z. Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks. Tsinghua Sci. Technol. 2019, 24, 575–584. [Google Scholar]
  32. Pravin, M.; Vijay, K.Y.; Shekhar, V.; Sridhar, V. Efficient Lattice-Based Ring Signature for Message Authentication in VANETs. IEEE Syst. J. 2020, 14, 5463–5474. [Google Scholar]
  33. Liquan, C.; Tianyang, T.; Kunliang, Y.; Mengnan, Z.; Yingchao, W. V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System. Secur. Commun. Netw. 2021, 2021, 867–881. [Google Scholar] [CrossRef]
  34. Stallings, W. Cryptography and Network Security: Principles and Practice, 6th ed.; Pearson: New York, NY, USA, 2013. [Google Scholar]
  35. Schneier, B. Applied Cryptography—Protocols, Algorithms, and Source Code in C, 2nd ed.; John Wiley & Sons: New York, NY, USA, 1996. [Google Scholar]
  36. Kahate, A. Cryptography and Network Security; Tata McGraw-Hill Education: New York, NY, USA, 2013. [Google Scholar]
  37. Dousti, M.S.; Jalili, R. An efficient statistical zero-knowledge authentication protocol for smart cards. Int. J. Comput. Math. 2015, 93, 453–481. [Google Scholar] [CrossRef]
  38. Kumari, S.; Chaudhry, S.A.; Wu, F.; Li, X. An improved smart card based authentication scheme for session initiation protocol. Peer-Peer Netw. Appl. 2017, 10, 92–105. [Google Scholar] [CrossRef]
  39. Walshe, M.; Epiphaniou, G.; Al-Khateeb, H.; Hammoudeh, M.; Katos, V.; Dehghantanha, A. Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Netw. 2019, 95, 101988. [Google Scholar] [CrossRef]
  40. Assidi, H.; Ayebie, E.B.; Souidi, E.M. Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. In Proceedings of the International Conference on Information Security and Cryptology, Seoul, Korea, 28–30 November 2018; Volume 10779, pp. 267–283. [Google Scholar]
  41. Doss, R.; Trujillo-Rasua, R.; Piramuthu, S. Secure attribute-based search in RFID-based inventory control systems. Decis. Support Syst. 2020, 132, 113270. [Google Scholar] [CrossRef]
  42. Dixit, M.K. A Secure Way of Cloud Supported user Identification for Internet of Things using Feige–Fiat–Shamir Identification Scheme. J. Web Dev. Web Des. 2021, 6, 24–30. [Google Scholar]
  43. Al-Adhami, A.H.; Ambroze, M.; Stengel, I.; Tomlinson, M. An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP. In Proceedings of the 2019 2nd Scientific Conference of Computer Sciences (SCCS), Baghdad, Iraq, 27–28 March 2019; pp. 87–92. [Google Scholar]
  44. Zhang, C.; Lin, X.; Lu, R.; Ho, P.-H. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. In Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China, 19–23 May 2008; pp. 1451–1457. [Google Scholar]
  45. Dodis, Y.; Yampolskiy, A. A Verifiable Random Function with Short Proofs and Keys. Int. Workshop Public Key Cryptogr. 2005, 3386, 416–431. [Google Scholar]
  46. Secure Password Check. Available online: https://password.kaspersky.com (accessed on 17 October 2021).
Figure 1. Dependence of the volume of information traffic on road traffic intensity with a 32-bit protocol.
Figure 1. Dependence of the volume of information traffic on road traffic intensity with a 32-bit protocol.
Algorithms 15 00050 g001
Figure 2. Dependence of the average number of packets per OBU on road traffic intensity with maximal level of confidentiality and a 32-bit protocol.
Figure 2. Dependence of the average number of packets per OBU on road traffic intensity with maximal level of confidentiality and a 32-bit protocol.
Algorithms 15 00050 g002
Figure 3. Dependence of the average number of packets per OBU on road traffic intensity with minimal level of confidentiality and a 32-bit protocol.
Figure 3. Dependence of the average number of packets per OBU on road traffic intensity with minimal level of confidentiality and a 32-bit protocol.
Algorithms 15 00050 g003
Figure 4. Dependence of the volume of information traffic on road traffic intensity with a 64-bit protocol.
Figure 4. Dependence of the volume of information traffic on road traffic intensity with a 64-bit protocol.
Algorithms 15 00050 g004
Figure 5. Dependence of the average number of packets per OBU on road traffic intensity with maximal level of confidentiality and a 64-bit protocol.
Figure 5. Dependence of the average number of packets per OBU on road traffic intensity with maximal level of confidentiality and a 64-bit protocol.
Algorithms 15 00050 g005
Figure 6. Dependence of the average number of packets per OBU on road traffic intensity with a minimal level of confidentiality and a 64-bit protocol.
Figure 6. Dependence of the average number of packets per OBU on road traffic intensity with a minimal level of confidentiality and a 64-bit protocol.
Algorithms 15 00050 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chistousov, N.K.; Kalmykov, I.A.; Dukhovnyj, D.V.; Kalmykov, M.I.; Olenev, A.A. Adaptive Authentication Protocol Based on Zero-Knowledge Proof. Algorithms 2022, 15, 50. https://doi.org/10.3390/a15020050

AMA Style

Chistousov NK, Kalmykov IA, Dukhovnyj DV, Kalmykov MI, Olenev AA. Adaptive Authentication Protocol Based on Zero-Knowledge Proof. Algorithms. 2022; 15(2):50. https://doi.org/10.3390/a15020050

Chicago/Turabian Style

Chistousov, Nikita Konstantinovich, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov, and Aleksandr Anatolyevich Olenev. 2022. "Adaptive Authentication Protocol Based on Zero-Knowledge Proof" Algorithms 15, no. 2: 50. https://doi.org/10.3390/a15020050

APA Style

Chistousov, N. K., Kalmykov, I. A., Dukhovnyj, D. V., Kalmykov, M. I., & Olenev, A. A. (2022). Adaptive Authentication Protocol Based on Zero-Knowledge Proof. Algorithms, 15(2), 50. https://doi.org/10.3390/a15020050

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop