Next Article in Journal
The Perspective Projects Promoting Sustainable Mobility by Active Travel to School on the Example of the Southern Poland Region
Previous Article in Journal
Examining the Provincial-Level Difference and Impact Factors of Urban Household Electricity Consumption in China—Based on the Extended STIRPAT Model
Previous Article in Special Issue
An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU)

by
Mahmood A. Al-Shareeda
1,
Selvakumar Manickam
1,*,
Badiea Abdulkarem Mohammed
2,
Zeyad Ghaleb Al-Mekhlafi
2,
Amjad Qtaish
2,
Abdullah J. Alzahrani
2,
Gharbi Alshammari
2,
Amer A. Sallam
3 and
Khalil Almekhlafi
4
1
National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang 11800, Malaysia
2
College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia
3
Engineering and Information Technology College, Taiz University, Taiz 6803, Yemen
4
CBA-Yanbu, Taibah University, Al Madinah 42353, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(16), 9961; https://doi.org/10.3390/su14169961
Submission received: 21 May 2022 / Revised: 8 August 2022 / Accepted: 8 August 2022 / Published: 11 August 2022
(This article belongs to the Special Issue Vehicular Networks and Sustainability)

Abstract

:
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data about road conditions, since the message transmission rate and the downloading service rate have been considerably brighter. The data shared by vehicles are vulnerable to privacy and security issues. Notably, the existing schemes require expensive components, namely a road-side unit (RSU), to authenticate the messages for the joining process. To cope with these issues, this paper proposes a provably secure efficient data-sharing scheme without RSU for 5G-enabled vehicular networks. Our work included six phases, namely: TA initialization (TASetup) phase, pseudonym-identity generation (PIDGen) phase, key generation (KeyGen) phase, message signing (MsgSign) phase, single verification (SigVerify) phase, and batch signatures verification (BSigVerify) phase. The vehicle in our work has the ability to verify multiple signatures simultaneously. Our work not only achieves privacy and security requirements but also withstands various security attacks on the vehicular network. Ultimately, our work also evaluates favourable performance compared to other existing schemes with regards to costs of communication and computation.

1. Introduction

With the continuous increasing demand for fifth-generation (5G) technology, research on the management of vehicle-to-everything (V2X) communication has emerged. Unlike the conventional vehicular networks, the V2X communication provides networks, things, users, and vehicles with reliable connectivity, manageable, operable, controllable, and high-quality [1,2,3,4].
The characteristics of 5G-enabled vehicular networks have a wide high bandwidth and coverage area. Based on data shared by 5G wireless, during peak periods, the data transmission rate can approach 20 Gb/s, while the average data transfer rate is over 100 Mb/s [5,6,7,8]. The capacity of the supported network is 1000 times that of conventional networks, and it can give a more steady connection [9,10,11].
Each vehicle in V2X communication is usually fitted with several expensive sensors, such as cameras of high-resolution, radars of microwave, and lidars of multi-beam, to get comprehensive and reliable data within urban or highway areas [12,13,14,15,16,17]. Moreover, each vehicle has installed wireless devices, namely onboard units (OBUs), to share large amounts of traffic-related information with others and connect technologies of heterogeneous wireless access during the outside world [18,19,20].
There are mainly two categories of data shared by vehicles in V2X communication [21,22]. One is calamities noticed by users, such as nearby hotel ratings and parking lot occupancy. The other is that information is collected by sensors when the vehicle crosses the road environment, such as conditions of the poor road, congestion of traffic, and extreme weather. With these data shared, vehicles offer the driver and passenger a comfortable driving experience, satisfactory transport access, and a safe driving environment.
Given the fact the 5G-enabled vehicular network exploits wireless channels, the data shared by vehicles have security and privacy vulnerabilities [23]. The third-party has the ability to change, delete, and alter the data shared by the vehicle to cause damage to the road environment. Meanwhile, when an attacker exposes any personal data of the user (e.g., location or identity), it will cause criminal charges. Therefore, several scholars have focused on achieving security and privacy requirements for vehicular networks by proposing sophisticated data-sharing schemes.
Nevertheless, these schemes require expensive components called road-side units (RSUs) to cooperate in the mutual authentication phase, which raises the latency of the vehicular networks. Besides, studies [11,24] have proven that a compromised RSU causes leakage of secret information preserved in the RSU.
Hence, the main motivation of this paper is to reduce the massive overhead of performance system in terms of communication and computation costs by proposing a lightweight operations instead of bilinear pair and map-to-point function operations. Our proposed solution does not use RSU to authenticate the vehicle during mutual authentication process. Our proposed solution applies the 5G technology to the fast exchange of messages among vehicles. This work is carried out in our simulation experiments with regards to network simulator (OMNeT++) and traffic simulator (SUMO) to analyze the results. The major contributions of our work can be listed as follows:
  • We retrospectively analyze the taxonomy of existing schemes for vehicular networks. Furthermore, some security vulnerabilities of these schemes are highlighted. Then, we present the vehicular network architecture with regard to the system model and security goals.
  • We propose a provably secure with an efficient data-sharing scheme for 5G-enabled vehicular networks. To improve efficiency further, our work does not use an expansive component called RSU for the authentication process.
  • We implement simulation experiments over a simulation platform (traffic generation simulator and network generation simulator), displaying that the performance efficiency of our work in terms of computation and communication costs has been enhanced compared with the existing works.
The remainder of our work is organized as follows: Section 2 reviews the taxonomy of the existing schemes. Section 3 introduces vehicular network architecture. The six algorithms of the proposed scheme are provided in Section 4. The security analysis and performance comparison of our work are presented in Section 5 and Section 6, respectively. Section 7 shows the conclusions of our work.

2. Related Work

In this section, we retrospectively analyze some related work focusing on data-sharing among vehicles for vehicular networks. The taxonomy of existing schemes is as below. Additionally, we provide a critical analysis of the related work as well.

2.1. Massive Certificate-Based (MCB) Schemes

The fundamental concept of Massive Certificate-Based (MCB) schemes is that TA is responsible for issuing and preloading massive numbers of certificates (roughly 44,000) and their relevant pair-keys (private and public) to participating vehicles. These certificates are assigned based on level of the anonymity to archive security and privacy for vehicular networks.
Several scholars [25,26,27,28,29,30,31,32,33] have proposed MCB schemes for vehicular networks. However, there are three main drawbacks of the MCB schemes: (i) massive certificate arrangement burden for TA owing to the huge pool of anonymous certificates and the relevant pair-keys are needed; (ii) storage arrangement burden owing to limit vehicle storage, and (iii) massive computation and communication overheads owing to the need to verify certification in the investigation methods.

2.2. Group Signature-Based (GSB) Schemes

Chaum and van Heyst [34] first proposed the fundamental concept of group signatures in 1991. The group members are permitted to sign information anonymously on behalf of all members.
Several scholars [35,36,37,38,39] have proposed GSB schemes to overcome the drawbacks arising MCB schemes in a vehicular network. However, there are two main drawbacks of the GSB schemes: (i) the massive size of the Certification revocation list (CRL) owing to the number of blocked vehicle’s number is growing; and (ii) massive overheads of communication and computation owing to the two pairing-based operations that are needed.

2.3. Pseudonym Identity-Based (PIB) Schemes

To overcome the limitations concerning the two above (MCB and GSB) schemes, several scholars proposed Pseudonym Identity-Based (PIB) schemes to provide high-level security in vehicular networks.
In 2015, He et al. [40] first used elliptic curve cryptography rather than pairing-based cryptography to provide efficient performance and secure communications. In the scheme presented by He et al. [40], the private key of the system is saved on each vehicle. Nevertheless, if the vehicle is compromised by an adversary, the whole system is insecure. In 2017, Zhang et al. [41] designed a mutual authentication and preservation scheme to achieve distributed aggregate for the vehicular network. In the scheme designed by Zhang et al. [41], RSU is accountable for producing secret shares for vehicles within its communication area. In the same year, Azees et al. [42] designed an anonymous authentication by helping RSU to secure communication in vehicular networks. In 2018, Pournaghi et al. [43] combined the TPD of RSU and TPD of vehicles to achieve high-level security. In their scheme, the TA is saved with two private keys on the TPD of RSU. Therefore, RSU is responsible for temporarily computing the specific timestamp and generating the signature key of the vehicle. In 2019, Alazzawi et al. [44] designed a pseudonym-based system to achieve a robust integrity scheme. The scheme proposed by Alazzawi et al. [44] has not achieved likability requirements, since only one pseudonym identity is used within all travailing. Furthermore, the system’s secret key is saved on the RSU without using the TPD, which makes it an easy task for the attacker to disclose the key. In the same year, Bayat et al. [45] designed a pseudonym-based to design a RSU-based authentication scheme. RSU is responsible for preloading a pool of signature keys and pseudonym-IDs to each vehicle.
Ali and Li [46] proposed an authentication data-sharing scheme by using RSU to authenticate a large number of messages for vehicle-to-infrastructure (V2I) communication. This scheme replaced map-to-point hash functions by general one-way hash functions to sign message and verify signature. Nevertheless, this scheme uses bilinear pair operations, which are considered time-consuming and complicated.
Al-Shareeda et al. [47] designed a data-sharing scheme by using bilinear pair cryptography and cryptographic hash function. This scheme applies RSU to generate a signature key for the corresponding pseudonym-ID for authentic vehicles. This scheme is vulnerable to a massive overhead of performance costs as it uses complicated operations and is time-consuming.
Alshudukhi et al. [48] applied elliptic curve cryptography to propose an authentication data-sharing scheme for vehicular network. The TA in this scheme saves the system’s private key to each RSU. Once a vehicle wants to join the system, RSU computes and preloads security parameters to vehicles. However, since this scheme uses a large number of multiplication point operations based on ECC, the performance costs is challenged.
Ali et al. [49] constructed a hybrid signcryption based on and public key infrastructure and certificateless cryptosystem to provide security criteria in a single logical phase. This scheme uses bilinear pair operations to sign messages and verify signatures, which causes a massive overhead of performance system.

2.4. Critical Analysis

The summation of related work is as follows. The majority of existing schemes are based on three classes of approaches: (i) Massive certificate-based (MCB) schemes, (ii) Group signature-based (GSB) schemes, and (iii) Pseudonym identity-based (PIB) schemes. The first two approaches required high overhead costs to sign messages and verify signatures, which is not suitable for deployment in vehicular networks. In contracts, the third approach is called pseudonym identity-based (PIB) schemes, proposed by the researcher to address the overhead costs of the system. Our work is based on the third approach to address the existing scheme based on PIB schemes by applying 5G technology and avoiding using RSU.
Since the existing PIB schemes apply RSU to participate authentication process, if they make assumptions that no other things can discover the secrets in a TPD of a vehicle, if a vehicle is corrupted in one RSU, the third party can calculate the RSU’s master key.

3. Vehicular Network Architecture

This section presents the vehicular network architecture with regard to the system model and security goals in our work for 5G-enabled vehicular networks.

3.1. System Model

As presented in Figure 1, the three main entities are called: trusted authority (TA), 5G-base station (5G-BS), and onboard unit (OBU) for 5G-enabled vehicular networks. The main work of these entities is explained in the following steps.
  • Trusted Authority (TA): TA is trustworthy by all entities in the 5G-enabled vehicular networks and has sufficient resources with regards to storage, communication, and computation. The TA is also in charge of generating the initial parameters of the network and registering the vehicles.
  • 5G-base Station (5G-BS): is a radio receiver and has sufficient fast-moving and broad-spectrum in 5g-enabled vehicular networks. The main task of 5G-BS is to connect vehicles and TA. The 5G-BS does not save or compute the data regarding vehicular networks.
  • Onboard Unit (OBU): Each enrolled vehicle has one onboard unit (OBU) for sending and receiving information about the surrounding environment. Each OBU has TPD to preserve sensitive data and do computation processes for cryptographic operations. OBU is a considered as a terminal node in networks which enjoys all types of services for 5G technology. Therefore, this work adds a security algorithm in a secure processing service (SPS) layer in each node for the simulation, as shown in Figure 2. The main reason behind using the SPS layer is to implement an authentication process that is higher than the MAC and physical layer.

Device-to-Device (D2D) Communication

The D2D wireless network in 5G technology is determined as direct communication among vehicles (terminal nodes) without passing via infrastructure node. In a traditional network, all data must go through the infrastructure node called the base station, even if it is inside the range of D2D communication. As a result, D2D communication can considerably increase the network’s spectral efficiency in this instance.

3.2. Security Goals

In this section, the security requirements should be achieved in our work.
  • Authentication and Integrity: To make sure that the message transmitted has been carried out by a registered vehicle. Besides, the message has not been tampered with.
  • Privacy Preserving: The original identity of the message broadcasting vehicle must be protected and the message should not disclose the identity to other units so that an attacker cannot utilize their identity for themselves.
  • Traceability: When issuing a forged message, the vehicle has the traceable to its signer and that power must lie with the TA.
  • Replaying Resistance: Our work should be capable of resisting replay attackers to avoid repeating the message sent by the registered vehicle.

4. Proposed Scheme

To address limitations in the existing schemes, this paper proposes a provably secure efficient data-sharing scheme for 5G-enabled vehicular networks. Our work has six phases, namely: TA initialization (TASetup) phase, pseudonym-ID generation (PIDGen) phase and key generation (KeyGen) phase, message signing (MsgSign) phase, single verification (SigVerify) phase, and batch signatures verification (BSigVerify) phase.
Our work is based on the scheme proposed by [50]. However, unlike the scheme proposed by [50], the proposed scheme uses 5G-BS to provide high-efficiency data-sharing among vehicles. This paper carried out the simulation experiments with regard to network simulators and traffic simulators (SUMO) to analyze the results of these phases. Furthermore, the proposed scheme does not need an expensive component (RSU) to authenticate the messages. Vehicles in our work can renew the security groups by sending a request to TA through 5G-BS wirelessly, which avoids repeat parameters used. The proposed scheme should be divided into the following phases:
  • TASetup: The TA executes TASetup phase to obtain security parameter η . The network parameters Y and the private (secret) keys α and β are returned on this algorithm. The system parameters Y are considered as an implicit input to all methods explained below.
  • PIDGen and KeyGen: The TA executes the PIDGen and KeyGen algorithms to return the pseudonym-ID P I D i and the signature key S K i , respectively.
  • MsgSign: The registered vehicle V i executes MsgSign algorithm. The safety-related message M i for a pseudonym-ID P I D i is taken as input for returning the signature δ i .
  • SigVerify: The verifying vehicle V j executes SigVerify algorithm. Once receiving a signature δ i on a safety-related message M i for a pseudonym-ID P I D i from a vehicle V i , if the signature δ i is legitimate, it results true; otherwise, it outputs false.
  • BSigVerify: The verifying vehicle V j executes SigVerify algorithm. Once receiving a batch of n signature ( δ 1 , δ 2 , . δ n ) on n safety-related messages ( M 1 , M 2 , . , M n ) for n pseudonym-IDs ( P I D 1 , P I D 2 , . , P I D n ) from n vehicles ( V 1 , V 2 , , V n ) simultaneously, if the signatures ( δ 1 , δ 2 , . δ n ) are legitimate, it results true; otherwise, it results false.

4.1. TASetup

The TA executes the TASetup algorithm to return the network parameters Y and the private (secret) keys α and β as the following steps.
  • Given a network parameter η Z + , TA selects a generator g based on a group G of the order prime q.
  • Four cryptographic general hash functions, H 1 , H 2 , H 3 and H 4 , are chosen by TA and set as H 1 : G × G Z q * , H 2 : [ 0 , 1 ] * Z q * , H 3 : [ 0 , 1 ] * × [ 0 , 1 ] * × G × G × [ 0 , 1 ] * Z q * and H 4 : G Z q * .
  • TA sets the randomly picked number α Z q * as a private (secret) key, then measures its corresponding public key ξ P u b α = g α for private key extraction.
  • TA sets the randomly picked number β Z q * as a private (secret) key, then measures its corresponding public key ξ P u b β = g β for traceability.
  • The network public parameters are set as Y = { g , G , q , H 1 , H 2 , H 3 , H 4 , ξ P u b α , ξ P u b β } . Note that private (secret) keys α and β are only known to TA.
Since our work is based on 5G technology, it is an easy task to renew the groups to avoid repeating them during the next steps. The renew process executes between vehicle and TA through 5G-BS.

4.2. PIDGen and KeyGen

To achieve mutual authentication and privacy-preservation in our work, the pseudonym-IDs ( P I D s ) that are particularly concerned with the relevant original identities O I D s should be used by following these steps:
  • User submits the original identity O I D of his/her vehicle to TA via secure communication. TA is responsible for testing the validity of O I D .
  • Once confirmed the authenticity of O I D , TA sets a group of the randomly selected values { ω i , l , ω i , 2 , … ω i , n } Z q * as a private key and then measures the relevant public keys P K i * = { P K i , l , P K i , 2 , P K i , n } , where P K i , l = g ω i , l and l { 1 , 2 n } .
  • TA then computes a group of P I D s for vehicle V i as P I D i * = { P I D i , l , P I D i , 2 , , P I D i , n } , where P I D i , l = O I D i H 1 ( P K i , l β , ξ P u b β ) and l { 1 , 2 n } .
  • Once calculating the P I D i * , TA sets randomly selected values S K i * = { S K i , l , S K i , 2 , . S K i , n } as a signature keys, where S K i , l = α . H 2 ( P I D i , l ) and l { 1 , 2 n } .
  • Ultimately, TA preloads the network parameters Y and groups { P K i * , P I D i * , S K i * } to TPD of vehicle V i through a secure channel.

4.3. MsgSign

Prior to sending the safety-related messages to public channel in 5G-enabled vehicular network, vehicle V i signs them to achieve integrity and authentication. The message-signature tuples on one message M i [ 0 , 1 ] * by participating vehicle V i is demonstrated as the following steps.
  • Vehicle V i sets the randomly selected a signature key S K i , l , a relevant P K i , l and pseudonym-ID P I D i , l from the groups P K i * , P I D i * , and S K i * , respectively.
  • Vehicle V i sets the randomly picked value d i Z q * and calculates D i = g d i .
  • Vehicle V i signs message M i [ 0 , 1 ] * as Θ i = H 3 ( M i , D i , T i , P I D i , l , P K i , l ) , where T i is a freshness timestamp.
  • Vehicle V i computes signature δ i = ( H 4 ( D i ) S K i , l . Θ i ) . d i 1 .
  • Finally, vehicle V i broadcasts the message-signature tuples { M i , P K i , l , P I D i , l , D i , T i , δ i } to others in 5G-enabled vehicular networks.

4.4. SigVerify

Once the verifying vehicle V j has acquired a single tuple signed by V i , the following steps should be executed.
  • Upon receiving the message-signature tuples { M i , P K i , l , P I D i , l , D i , T i , δ i } , the verifying vehicle V j tests the brightness of timestamp T i . Verifying vehicle V j rejects the message if it is not valid.
  • If T i is fresh, verifying vehicle V j then calculates H 2 ( P I D i , l ) and Θ i = H 3 ( M i , D i , T i , P I D i , l , P K i , l ) .
  • Finally, verifying vehicle V j checks whether Equation (1) holds or not.
    D i δ i . ξ P u b α H 2 ( P I D i , l ) . Θ i = ? g H 4 ( D i )
If Equation (1) is achieved, then the verifying vehicle V j accepts the message M i ; otherwise, the V j rejects it. The correctness of the SigVerify’s Equation is explained as follows:
D i δ i . ξ P u b α H 2 ( P I D i , l ) . Θ i = ( g d i ) ( H 4 ( D i ) S K i , l . Θ i ) . d i 1 . ( g α ) H 2 ( P I D i , l ) . Θ i = g d i . ( H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i ) . d i 1 . g α . H 2 ( P I D i , l ) . Θ i = g d i . d i 1 . H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i . g α . H 2 ( P I D i , l ) . Θ i = g H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i . g α . H 2 ( P I D i , l ) . Θ i = g H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i + α . H 2 ( P I D i , l ) . Θ i = g H 4 ( D i )

4.5. BSigVerify

Upon receiving n message-signature tuples { M i 1 , P I D i , l 1 , P K i , l 1 , D i 1 , T i 1 , δ i 1 } , { M i 2 , P I D i , l 2 , P K i , l 2 , D i 2 , T i 2 , δ i 2 } ,…, { M i n , P I D i , l n , P K i , l n , D i n , T i n , δ i n } simultaneously. Verifying vehicle V j uses the system public parameters Y = { g , G , q , H 1 , H 2 , H 3 , H 4 , ξ P u b α , ξ P u b β } to verify batch messages as the following steps.
  • Verifying vehicle V j tests the validity of { T 1 , T 2 T n } , and drops the messages if some of them are not valid.
  • Verifying vehicle V j sets the randomly selected n values { γ 1 , γ 2 γ n } , where γ i R [ 1 , 2 m ] for m = 80 and i = 1 , 2 , n is typically acceptable [51].
  • Verifying vehicle V j then calculates H 2 ( P I D i , l ) and Θ i = H 3 ( M i , D i , T i , P I D i , l , P K i , l ) , where i = 1 , 2 , n .
  • Finally, verifying vehicle V j checks whether Equation (2) holds or not.
    g i = 1 n ( γ i . H 4 ( D i ) ) = ? i = 1 n D i γ i . δ i . ξ P u b α γ i . H 2 ( P I D i , l ) . Θ i
If Equation (2) is achieved, then the verifying vehicle V j accepts the messages; otherwise, the V j discards them. The correctness of the BSigVerify’s Equation is explained as follows:
i = 1 n D i γ i . δ i . ξ P u b α γ i . H 2 ( P I D i , l ) . Θ i = i = 1 n ( g γ i . d i ) ( H 4 ( D i ) S K i , l . Θ i ) . d i 1 . ( g γ i . α ) H 2 ( P I D i , l ) . Θ i = i = 1 n g γ i . d i . ( H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i ) . d i 1 . g γ i . α . H 2 ( P I D i , l ) . Θ i = i = 1 n g γ i . d i . d i 1 . H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i . g γ i . α . H 2 ( P I D i , l ) . Θ i = i = 1 n g γ i . H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i . g γ i . α . H 2 ( P I D i , l ) . Θ i = i = 1 n g γ i . H 4 ( D i ) α . H 2 ( P I D i , l ) . Θ i + γ i . α . H 2 ( P I D i , l ) . Θ i = g i = 1 n γ i . H 4 ( D i )

5. Security Analysis

In this section, the security definition, provable security, and security level of our work are analyzed in the following subsections.

5.1. Security Definition

The security model for the proposed scheme is provided by a game activated between a polynomial-time adversary A and a challenger I . In the model, adversary A can access polynomially bounded queries oracle adaptively to challenger I as the following steps.
Setup: In this process, a TASetup algorithm of the 5G-enabled vehicular networks is simulated. I runs the TASetup algorithm to compute the network parameters Y and the private (secret) keys α and β . Once receiving this query, I sends Y to A .
H i = 1 , 2 , 3 , 4 : When sending the information query I Q , I sets the randomly selected number θ i Z q * and saves ( I Q , θ i ) in the list L i . Then, I returns θ i to A .
GenerateVeh: When receiving the original identity O I D i of vehicle V i , I computes pseudonym-IDs P I D i * and signature keys S K i * of vehicle V i . Then I saves { O I D i , P I D i * , S K i * } in the list L v e h .
CorruptVeh: When receiving the original identity O I D i of vehicle V i , I sends pseudonym-IDs P I D i * and signature keys S K i * of vehicle V i to A .
SignatureGen: When submitting pseudonym-ID P I D i and message M by A , I produces and returns the relevant the message-signature tuples to A .
Upon performing the above queries, A forges the signature δ i * of safety-related message M i * related with original identity O I D i * of vehicle V i * .
Forgery: When the below steps are achieved, A wins the game.
  • δ i * is a legal signature of the message M .
  • A signature of M has not been queried in the CorruptVeh and SignatureGen.
Let the function A d v Ω . A S c h e m e indicate the advantage of A in breaking the proposed scheme Ω .
Definition 1. 
The proposed scheme Ω for 5G-enabled vehicular networks is chosen-message and chosen-identity secure, when the function A d v Ω . A S c h e m e is negligible for A .

5.2. Provable Security

According to Definition 1, the selected message and chosen identity of our work utilizing the random oracle model (ROM) are analyzed. Figure 3 shows a game between a challenger I and an attacker A .
Theorem 1. 
Supposing that the underlying DLP is unsolvable, the proposed scheme for 5G-enabled vehicular networks is secure in the ROM.
Proof. 
Suppose that an attacker of polynomial-time A can forge a legal the message-signature tuples { M i , P K i , l , P I D i , l , D i , T i , δ i } by an advantage of non-negligible A d v Ω . A S c h e m e , then challenger I could resolve DLP with advantage of non-negligible via working the A as a subroutine. Consider ξ P u b α = g α be an example of the DLP, and main work of the A is to calculate α . Initially, I produces Y = { g , G , q , H 1 , H 2 , H 3 , H 4 , ξ P u b α , ξ P u b β } to A . Then A runs oracle-queries adaptively modeled by I as the following steps. □
Oracle ( H 1 ) : I initializes the form of { ϱ , ξ P u b β , μ 1 } in the list L H 1 firstly. Once a query { ϱ , ξ P u b β } is issued by A , I tests whether the form of { ϱ , ξ P u b β , μ 1 } existing in the list L H 1 . If exists, I produces μ 1 = H 1 ( ϱ , ξ P u b β ) to A , otherwise, I sets the randomly selected nonce μ 1 Z q * , produces to μ 1 = H 1 ( ϱ , ξ P u b β ) to A and puts { ϱ , ξ P u b β , μ 1 } to the list L H 1 .
Oracle ( H 2 ) : I initializes the form of { λ , μ 2 } in the list L H 2 firstly. Once a query { λ } is issued by A , I tests whether the form of { λ , μ 2 } existing in the list L H 2 . If exists, I produces μ 2 = H 2 ( λ ) to A , otherwise, I sets the randomly selected nonce μ 2 Z q * , produces to μ 2 = H 2 ( λ ) to A and puts { λ , μ 2 } to the list L H 2 .
Oracle ( H 3 ) : I initializes the form of { M i , D i , T i , P I D i , l , P K i , l , μ 3 } in the list L H 3 firstly. Once a query { M i , D i , T i , P I D i , l , P K i , l } is issued by A , I tests whether the form of { M i , D i , T i , P I D i , l , P K i , l , μ 3 } existing in the pool L H 2 . If exists, I produces μ 3 = H 3 ( M i , D i , T i , P I D i , l , P K i , l ) to A , otherwise, I sets the randomly selected nonce μ 3 Z q * , produces to μ 3 = H 3 ( M i , D i , T i , P I D i , l , P K i , l ) to A and puts { M i , D i , T i , P I D i , l , P K i , l , μ 3 } to the list L H 3 .
Oracle ( H 4 ) : I initializes the form of { D i , μ 4 } in the list L H 4 firstly. Once a query { D i } is issued by A , I tests whether the form of { D i , μ 4 } existing in the list L H 4 . If exists, I produces μ 4 = H 4 ( D i ) to A , otherwise, I sets the randomly selected nonce μ 4 Z q * , produces to μ 4 = H 4 ( D i ) to A and puts { D i , μ 4 } to the list L H 4 .
Oracle(GenerateVeh):  I initializes the form of { O I D i , η , S K i , P I D i , P K i } in the list L v e h firstly. Once sending a query { O I D i , η , S K i , P I D i , P K i } to by I , A tests whether the form of { O I D i , η , S K i , P I D i , P K i } existing in the pool L v e h . If exists, I results P K i to A , otherwise, I runs the following two points.
  • If O I D i = O I D i * , I sets the randomly selected three values η i , μ 1 and μ 2 , calculates P K i = g η i and holds { S K i , P I D i } . I saves { O I D i , η , S K i , P I D i , P K i } , { ϱ , ξ P u b β , μ 1 } and { λ , μ 2 } in the list L v e h , L H 1 and L H 2 respectively. Finally, I returns P K i to A .
  • If O I D i O I D i * , I sets the randomly selected three values η i , μ 1 and μ 2 , calculates P K i = g η i , P I D i = O I D i μ 1 and S K i = α . μ 2 . I saves { O I D i , η , S K i , P I D i , P K i } , { ϱ , ξ P u b β , μ 1 } and { λ , μ 2 } in the list L v e h , L H 1 and L H 2 respectively. Ultimately, I results P K i to A .
Oracle(CorruptVeh):  I invokes { O I D i , η , S K i , P I D i , P K i } from L v e h and produces { S K i , P I D i } to A .
Oracle(SignatureGen): When receiving a query with pseudonym-ID P I D i and message M i from A , I sets the randomly selected three values d i , μ 3 and μ 4 and calculates D i = g d i , δ i = ( H 4 ( D i ) S K i , l . Θ i ) . d i 1 . I saves { M i , D i , T i , P I D i , l , P K i , l , μ 3 } and { D i , μ 4 } in the list L H 3 and L H 4 , respectively. Finally, I returns the message-signature tuples { M i , P K i , l , P I D i , l , D i , T i , δ i } to A .
At last, A outputs the message-signature tuples { M i , P K i , l , P I D i , l , D i , T i , δ i } to I . If P I D i P I D i * , then I ends the game. I verifies whether Equation (3) holds.
D i δ i . ξ P u b α H 2 ( P I D i , l ) . Θ i = ? g H 4 ( D i )
When it is wrong, then I breaks the game by using forking lemma in [52]. When the I attempts the process with a various chosen H 2 , then A can result in another valid message-signature tuple { M i , P I D i , l , P K i , l , D i , T i , δ i * } with the advantage A d v Ω . A S c h e m e 1 9 . Therefore, it obtains the following equation.
D i δ i * . ξ P u b α H 2 ( P I D i , l ) . Θ i * = ? g H 4 ( D i )
Based on Equations (3) and (4), it can be concluded as follows.
D i δ i δ i * = ? ξ P u b α H 2 ( P I D i , l ) . ( Θ i Θ i * )
D i δ i . Θ i * δ i * . Θ i = ? g H 4 ( D i ) . ( Θ i * Θ i )
Thus, according to the above two equations, it can be respectively concluded as follows.
  • D i δ i δ i * = ? g H 4 ( D i ) . ( Θ i * Θ i ) , ( g ) d i . ( δ i δ i * ) = ? ( g ) x . H 2 ( P I D i , l ) . ( Θ i * Θ i )
    d i . δ i δ i * = ? α . H 2 ( P I D i , l ) . ( Θ i * Θ i )
  • D i δ i . Θ i * δ i * . Θ i = ? g H 4 ( D i ) . ( Θ i * Θ i ) , g d i . ( δ i . Θ i * δ i * . Θ i ) = ? g H 4 ( D i ) . ( Θ i * Θ i )
    d i . ( δ i . Θ i * δ i * . Θ i ) = ? H 4 ( D i ) . ( Θ i * Θ i )
Based on the above two equations, I results H 4 ( D i ) . H 2 ( P I D i , l ) 1 ( δ i δ i * ) . ( δ i . Θ i * δ i * . Θ i ) 1 as the output of the DLP. The following events to resolve the DLP by I are analyzed.
  • E V p i d indicates the event that P I D i * = P I D i .
  • E V f a b r i c a t e indicates the event that I can fabricate two legal signatures.
Let N H 2 indicates the value of H 2 oracle queries. Therefore, it outputs P r o b [ E V p i d ] = 1 N H 2 , P r o b [ E V f a b r i c a t e | E V p i d ] 1 9 . The advantage and A d v Ω . A S c h e m e that A could resolve the DLP is as follows.
P r o b [ E V f a b r i c a t e E V p i d ] = P r o b [ E V f a b r i c a t e | E V p i d ] . P r o b [ E V p i d ] 1 9 . A d v Ω . A S c h e m e . 1 N H 2 = A d v Ω . A S c h e m e 9 N H 2 .
Thus, I resolves the DLP with an advantage of non-negligible A d v Ω . A S c h e m e 9 N H 2 owing to the bounded N H 2 and non-negligible A d v Ω . A S c h e m e . Hence, this completes the security proof for the proposed scheme.

5.3. Security Requirements

Our work should be achieved the security goals (Section 3.2) concerning security requirements as follows.
  • Authentication and Integrity: Once the vehicle sending the message-signature tuples { M i , P K i , l , P I D i , l , D i , T i , δ i } to others, the checker in our work checks the correctness D i δ i . ξ P u b α H 2 ( P I D i , l ) . Θ i = ? g H 4 ( D i ) for testing the tuple’s integrity and authenticity. According to Theorem 1 in Section 5.2, there is no attacker A of polynomial-time that could impersonate/generate a legitimate message if the DLP is hardness.
  • Privacy Preserving: In the PIDGen and KeyGen phase, the vehicle’s true identity is hidden in the P I D i * = { P I D i , l , P I D i , 2 , , P I D i , n } by TA, where P I D i , l = O I D i H 1 ( P K i , l β , ξ P u b β ) and l { 1 , 2 , . . n } . To disclose the vehicle’s true identity O I D i from P I D i , l = O I D i H 1 ( P K i , l β , ξ P u b β ) , A requires to calculate ξ P u b β = g β based on β Z q * . Nevertheless, this process contradicts the hardness of CDHP. Thus, our work satisfies privacy preserving.
  • Traceability: By tracing the origin of messages sent, the TA is able to revoke and block the enrollment of any attacker that attempts to broadcast forge messages or disturb the system in 5G-enable vehicular networks. Once receiving the forge message, the vehicle reports it to the TA to verify its aid and, if available in the list, calculates the O I D i as O I D i = P I D i , l H 1 ( β . P K i , l β , ξ P u b β ) utilizing master key β . Thus, the function of traceability is provided by our work.
  • Replaying Resistance: Our work can resist replay attacks by utilizing timestamp T i in the message-signature tuples { M i , P K i , l , P I D i , l , D i , T i , δ i } . It denotes the signing time of tuples. Let T r i is the arrival time of the message. It requires to verify if T r i T i Δ T . When this condition holds, then there is no replay attacks.

5.4. Security Level

In this section, we show the security level of our work compared to the existing schemes in terms of privacy and security requirements. Therefore, we summarize and compare the security and piracy requirements of our work with the existing works He et al. [40], Azees et al. [42], Pournaghi et al. [43], and Bayat et al. [45] in Table 1. Thereby, all related works require RSU aid. Schemes of Azees et al. [42] and Bayat et al. [45] are vulnerable to replay attacks. Azees et al.’s scheme [42] is not satisfied by mutual authentication. As a result of Table 1, it can be concluded that our work achieves better security properties as compared to other works tabulated in that table.

6. Performance Comparison

In this section, the performance comparison of our work is evaluated with regard to costs of communication and computation. Meanwhile, the performance of our work is compared with schemes He et al. [40], Azees et al. [42], Pournaghi et al. [43], and Bayat et al. [45] via an experiment of simulation.
As presented in Figure 4, this work utilizes traffic generation simulator and network generation simulator such as OpenStreetMap [53], GatcomSUMO [54], SUMO [55] OMNeT++ [56], VEINS [57], Simu5G [58], and MIRACL [59,60] to execute experiments of simulation for 5G-enabled vehicular networks. OpenStreetMap is a very real trusted map website. GatcomSUMO is a java-based program utilized to facilitate the connection between the generation of traffic (SUMO) and the generation of the network (OMNeT++). SUMO is a road traffic simulation with a highly portable. OMNeT++ is a open-architecture for networks. Veins are joined with the generation of road traffic and the generation of networks. INET is a framework OMNeT++ suited for wired, wireless, and mobile networks. Simu5G is suited for a 5G-enabled vehicular network. MIRACL is a cryptographic library utilized to run operations based on cryptography algorithms. Table 2 lists the parameters of the simulation experiment.

6.1. Computation Costs

For a fair evaluation, the notations with the costs of the execution time of some cryptographic operations are tabulated in Table 3. This paper considers the computation overheads of generating pseudonym-IDs, signed message, and verification process, and compares them with existing schemes in Table 4.
In the MsgSign phase of the scheme of He et al. [40], the user needs to run three operations with regard to ECC scalar multiplication and three operations with regard to general hash function. Hence, the cost of computation of the MsgSign phase is 3 t m u l + 3 t h 2.0156 ms. In the SigVerify phase of He et al.’s scheme [40], the user needs to run five operations with regard to scalar multiplication, one operation with regard to addition point and two operations with regard to hash function. Hence, the cost of computation of the SigVerify phase is 5 t m u l + t a d d + 2 t h 3.3622 ms. In the BSigVerify phase of He et al.’s scheme [40], the vehicle needs to run (2 + 3n) operations with regard to scalar multiplication, (2n − 1) operations with regard to addition point and (2n) operations with regard to hash function. Hence, the cost of computation of the BSigVerify phase is ( 2 + 3 n ) t m u l + ( 2 n 1 ) t a d d + ( 2 n ) t h 1.3405 + 2.0236 n ms.
In the MsgSign phase of Azees et al.’s scheme [42], the user needs to run one operation with regard to BP scalar multiplication and one operation with regard to general hash function. Hence, the cost of computation of the MsgSign phase is 1 T m u l + 1 t h 1.5655 ms. In the SigVerify phase of Azees et al.’s scheme [42], the user needs to run two operations with regard to bilinear pair, five operations with regard to scalar multiplication, and two operations with regard to addition point. Hence, the cost of computation of the SigVerify phase is 2 T b p + 5 T m u l + 2 T a d d 19.661 ms. In the BSigVerify phase of Azees et al.’s scheme [42], the user needs to run (1 + n) operations with regard to bilinear pair, (5n) operations with regard to scalar multiplication, and (2n) operations with regard to addition point. Hence, the cost of computation of the BSigVerify phase is ( 1 + n ) T b p + ( 5 n ) T m u l + ( 2 n ) T a d d 5.811 + 13.6592 n ms.
In the MsgSign phase of Pournaghi et al.’s scheme [43], the user needs to run three operations with regard to scalar BP multiplication, one operation with regard to addition point, two operations with regard to general hash function, and one operation with regard to MapToPoint hash function. Hence, the cost of computation of the MsgSign phase is 3 T m u l + 1 T a d d + 2 t h + 1 T M T P 8.8794 ms. In the SigVerify phase of the Pournaghi et al.’s scheme [43], the user needs to run three operations with regard to bilinear pair, one operation with regard to scalar multiplication, and one operation with regard to MapToPoint hash function. Hence, the cost of computation of the SigVerify phase is 3 T b p + ( n ) T m u l + ( n ) T M T P 21.6054 ms. In the BSigVerify phase of Pournaghi et al.’s scheme [43], the user needs to run three operations with regard to bilinear pair, (n) operations with regard to scalar multiplication, and (n) operations with regard to MapToPoint hash function. Hence, the cost of computation of the BSigVerify phase is 3 T b p + ( n ) T m u l + ( n ) T M T P 17.433 + 5.7378 n ms.
In the MsgSign phase of Bayat et al.’s scheme [45], the user needs to run only one operation with regard to MapToPoint hash function. Hence, the cost of computation of the MsgSign phase is 1 T M T P 4.1724 ms. In the SigVerify phase of the Bayat et al.’s scheme [45], the user needs to run three operations with regard to bilinear pair, one operation with regard to scalar multiplication, and one operation with regard to MapToPoint hash function. Hence, the cost of computation of the SigVerify phase is 3 T b p + ( n ) T m u l + ( n ) T M T P 21.6054 ms. In the BSigVerify phase of Bayat et al.’s scheme [45], the user needs to run three operations with regard to bilinear pair, (n) operations with regard to scalar multiplication, and (n) operations with regard to MapToPoint hash function. Hence, the cost of computation of the BSigVerify phase is 3 T b p + ( n ) T m u l + ( n ) T M T P 17.433 + 5.7378 n ms.
In the MsgSign phase of our work, the user needs to run one operation with regard to ECC scalar multiplication and two operations with regard to general hash function. Hence, the cost of computation of the MsgSign phase is 1 t m u l + 2 t h 0.6719 ms. In the SigVerify phase of our work, the vehicle needs to run four operations with regard to scalar multiplication, one operation with regard to addition point and two operations with regard to hash function. Hence, the cost of computation of the SigVerify phase is 4 t m u l + t a d d + 2 t h 2.6904 ms. In the BSigVerify phase of our work, the user needs to run (2 + 2n) operations with regard to scalar multiplication, (n) operations with regard to addition point, and (2n) operations with regard to hash function. Hence, the cost of computation of the BSigVerify phase is ( 2 + 2 n ) t m u l + ( n ) t a d d + ( 2 n ) t h 1.3436 + 1.3469 n ms.
Furthermore, the entire time is based on the runtime of each cryptographic operation. The elapsed time (ET) between the exit and entrance is the overhead cost.
E T = 1 M i = 1 n M ( T o u t i T i n i )
where, M is the message number, T i n i is the entrance time of message i, and T o u t i is the exit time of message i. Figure 5 and Figure 6 depict the average time to sign and verify a message between the proposed and scheme of He et al. [40]. The main reason for comparing our work against only He et al. [40] is to the same cryptography operations (e.g., ECC) used to sign message and verify signature. Additionally, the cost of He et al.’s scheme [40] is most efficient compared with other schemes according to Table 4. The results of the experimental methods show that our work is much more efficient than existing methods.

6.2. Communication Costs

In this section, the primary concentrate is the cost of communication included in the timestamps, signatures, and pseudonym-IDs for the message-signature tuples. Table 5 shows the sizes of cryptographic elements used for communication costs.
In the scheme of He et al. [40], the signer broadcasts the message-signature tuple { M i , R i , A I D i , 1 , T i , A I D i , 2 , σ i } to the recipient, where σ i Z q , { R i , A I D i , 2 , A I D i , 1 } G and T i is a timestamp. Consequently, the cost of communication is 3 × 320 + 160 + 32 = 1152 bits. In the scheme of Azees et al. [42], the signer broadcasts the message-signature tuple { C e r t k | | Y k | | S i g } to the recipient, where C e r t k = { E i | | σ 1 | | | | y v | | λ | | σ 2 | | Y k | | y u | | D I D u i } , { E i , y u , Y k , D I D u i , s i g } G 1 , { σ 2 , σ 1 , λ } Z q * , c is a hash operation. Consequently, the cost of communication is 6 × 1024 + 3 × 160 + 32 = 6656 bits. In Pournaghi et al.’s scheme [43], the signer sends the message-signature tuple { M i , I D R S U j , p I D i 1 , p I D i 2 , σ i } to the recipient, where { p I D i 1 , p I D i 2 } G 1 and { σ i , I D R S U j } Z q * . Consequently, the cost of communication is 2 × 1024 + 2 × 160 = 2368 bits. In Bayat et al.’s scheme [45] the signer broadcasts the message-signature tuple { M i , p I D i 1 , p I D i 2 , σ i } to the recipient, where { p I D i 1 , p I D i 2 } G 1 and σ i Z q * . Consequently, the cost of communication is 2 × 1024 + 1 × 160 = 2208 bits. In our work, the signer sends the message-signature tuple { M i , P K i , l , P I D i , l , D i , T i , δ i } to others in 5G-enabled vehicular networks, where { P K i , l , D i } G , T i is the timestamp and { δ i , P I D i , l } is a hash operations. Consequently, the cost of communication is 2 × 320 + 2 × 160 + 32 = 992 bits.
Communication cost comparisons for all works are presented in Table 6. Similar to the cost of computation, our work is significantly better than other existing works, as presented in Figure 7.

7. Conclusions

This paper proposed a provably secure with efficient data-sharing scheme without using RSU for 5G-enabled vehicular networks. Our work does not use an expansive component called RSU for the authentication process to improve efficiency further. Furthermore, the provable security displayed that our work is secure against adaptive selected-message attacks based on the random oracle model. Furthermore, our work not only achieves the requirements of security (message authentication and integrity, identity privacy preservation, and traceability) but also resists the security attacks such as replay attacks. This work carried out our simulation experiments with regard to network simulator (OMNeT++) and traffic simulator (SUMO) to analyze the results. Lastly, this paper reduces the computation cost to sign the message, verify signature, and batch signature verification by 66.67%, 19.98%, and 20.01%, respectively. This paper reduces the communication overhead the message-signature-tuple size by 13.89%.
The major limitation the proposed approach is uses large numbers (e.g., four operations) of ECC-based multiplication point to verify messages sent among vehicles. A fast-moving vehicle requires fast verification by using lightweight operations to verify messages. Therefore, in future work, it will contain the design of a fog computing-based authentication scheme that uses an operation based on ECC cryptographic algorithm in 5G-enabled vehicular networks.

Author Contributions

Conceptualization, writing—review and editing, M.A.A.-S.; writing—original draft preparation, investigation, supervision, S.M.; funding acquisition, software, visualization, B.A.M.; methodology, funding acquisition, resources, Z.G.A.-M.; project administration, funding acquisition, software, A.Q.; funding acquisition, investigation, resources, A.J.A.; data curation, software, visualization, G.A.; visualization, methodology, visualization, supervision, A.A.S.; and investigation, methodology, validation, K.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been funded by the Scientific Research Deanship at the University of Ha’il, Saudi Arabia, through project number RG-21098.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not Applicable.

Acknowledgments

We would like to acknowledge the Scientific Research Deanship at the University of Ha’il, Saudi Arabia, for funding this research.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 2022, 22, 5026. [Google Scholar] [CrossRef]
  2. Al-Shareeda, M.A.; Manickam, S. Man-In-The-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry 2022, 14, 1543. [Google Scholar] [CrossRef]
  3. Cheng, X.; Chen, C.; Zhang, W.; Yang, Y. 5G-enabled cooperative intelligent vehicular (5GenCIV) framework: When Benz meets Marconi. IEEE Intell. Syst. 2017, 32, 53–59. [Google Scholar] [CrossRef]
  4. Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Khalil, A.; Hasbullah, I.H. Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey. IEEE Access 2021, 9, 121522–121531. [Google Scholar] [CrossRef]
  5. Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 2021, 9, 113226–113238. [Google Scholar] [CrossRef]
  6. Prasad, K.S.V.; Hossain, E.; Bhargava, V.K. Energy efficiency in massive MIMO-based 5G networks: Opportunities and challenges. IEEE Wirel. Commun. 2017, 24, 86–94. [Google Scholar] [CrossRef]
  7. Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks. Appl. Sci. 2022, 12, 5939. [Google Scholar] [CrossRef]
  8. Fascista, A.; Coluccia, A.; Wymeersch, H.; Seco-Granados, G. Downlink single-snapshot localization and mapping with a single-antenna receiver. IEEE Trans. Wirel. Commun. 2021, 20, 4672–4684. [Google Scholar] [CrossRef]
  9. Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 2022, 22, 1696. [Google Scholar] [CrossRef] [PubMed]
  10. Dong, P.; Zheng, T.; Yu, S.; Zhang, H.; Yan, X. Enhancing vehicular communication using 5G-enabled smart collaborative networking. IEEE Wirel. Commun. 2017, 24, 72–79. [Google Scholar] [CrossRef]
  11. Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks. Appl. Sci. 2022, 12, 1383. [Google Scholar] [CrossRef]
  12. Alazzawi, M.A.; Al-behadili, H.A.; Srayyih Almalki, M.N.; Challoob, A.L.; Al-shareeda, M.A. ID-PPA: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network. In Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia, 8–9 December 2020; Springer: Singapore, 2020; pp. 80–94. [Google Scholar]
  13. Al Shareeda, M.; Khalil, A.; Fahs, W. Realistic heterogeneous genetic-based RSU placement solution for V2I networks. Int. Arab J. Inf. Technol. 2019, 16, 540–547. [Google Scholar]
  14. Hamdi, M.M.; Mustafa, A.S.; Mahd, H.F.; Abood, M.S.; Kumar, C.; Al-shareeda, M.A. Performance Analysis of QoS in MANET based on IEEE 802.11 b. In Proceedings of the 2020 IEEE International Conference for Innovation in Technology (INOCON), Bangalore, India, 6–8 November 2020; pp. 1–5. [Google Scholar]
  15. Hamdi, M.M.; Audah, L.; Rashid, S.A.; Al Shareeda, M. Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review. J. Commun. 2020, 15, 896–904. [Google Scholar] [CrossRef]
  16. Al-shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H.; Khalil, A.; Alazzawi, M.A.; Al-Hiti, A.S. Proposed efficient conditional privacy-preserving authentication scheme for v2v and v2i communications based on elliptic curve cryptography in vehicular ad hoc networks. In Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia, 8–9 December 2020; Springer: Singapore, 2020; pp. 588–603. [Google Scholar]
  17. Al-shareeda, M.A.; Alazzawi, M.A.; Anbar, M.; Manickam, S.; Al-Ani, A.K. A Comprehensive Survey on Vehicular Ad Hoc Networks (VANETs). In Proceedings of the 2021 International Conference on Advanced Computer Applications (ACA), Maysan, Iraq, 25–26 July 2021; pp. 156–160. [Google Scholar]
  18. Xu, W.; Zhou, H.; Cheng, N.; Lyu, F.; Shi, W.; Chen, J.; Shen, X. Internet of vehicles in big data era. IEEE/CAA J. Autom. Sin. 2017, 5, 19–35. [Google Scholar] [CrossRef]
  19. Cheng, J.; Cheng, J.; Zhou, M.; Liu, F.; Gao, S.; Liu, C. Routing in internet of vehicles: A review. IEEE Trans. Intell. Transp. Syst. 2015, 16, 2339–2352. [Google Scholar] [CrossRef]
  20. Bai, F.; Krishnan, H. Reliability analysis of DSRC wireless communication for vehicle safety applications. In Proceedings of the 2006 IEEE intelligent transportation systems conference, Toronto, ON, Canada, 17–20 September 2006; pp. 355–362. [Google Scholar]
  21. Yang, Q.; Zhu, B.; Wu, S. An architecture of cloud-assisted information dissemination in vehicular networks. IEEE Access 2016, 4, 2764–2770. [Google Scholar] [CrossRef]
  22. Cui, J.; Ouyang, F.; Ying, Z.; Wei, L.; Zhong, H. Secure and efficient data sharing among vehicles based on consortium blockchain. IEEE Trans. Intell. Transp. Syst. 2021, 23, 8857–8867. [Google Scholar] [CrossRef]
  23. Lai, C.; Lu, R.; Zheng, D.; Shen, X. Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw. 2020, 34, 37–45. [Google Scholar] [CrossRef]
  24. Vijayakumar, P.; Azees, M.; Chang, V.; Deborah, J.; Balusamy, B. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 2017, 20, 2439–2450. [Google Scholar] [CrossRef]
  25. Cincilla, P.; Hicham, O.; Charles, B. Vehicular PKI Scalability-consistency Trade-offs in Large Scale Distributed Scenarios. In Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, 8–10 December 2016; pp. 1–8. [Google Scholar]
  26. Huang, D.; Misra, S.; Verma, M.; Xue, G. PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2011, 12, 736–746. [Google Scholar] [CrossRef]
  27. Joshi, A.; Gaonkar, P.; Bapat, J. A Reliable and Secure Approach for Efficient Car-to-Car Communication in Intelligent Transportation Systems. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 1617–1620. [Google Scholar]
  28. Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 2011, 61, 86–96. [Google Scholar] [CrossRef]
  29. Thenmozhi, T.; Somasundaram, R. Pseudonyms based blind signature approach for an improved secured communication at social spots in VANETs. Wirel. Pers. Commun. 2015, 82, 643–658. [Google Scholar] [CrossRef]
  30. Rajput, U.; Abbas, F.; Oh, H. A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 2016, 4, 7770–7784. [Google Scholar] [CrossRef]
  31. Asghar, M.; Doss, R.R.M.; Pan, L. A Scalable and Efficient PKI based Authentication Protocol for VANETs. In Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 21–23 November 2018; pp. 1–3. [Google Scholar]
  32. Förster, D.; Kargl, F.; Löhr, H. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). In Proceedings of the 2014 IEEE Vehicular Networking Conference (VNC), Paderborn, Germany, 3–5 December 2014; pp. 25–32. [Google Scholar]
  33. Sun, Y.; Zhang, B.; Zhao, B.; Su, X.; Su, J. Mix-zones optimal deployment for protecting location privacy in VANET. Peer Peer Netw. Appl. 2015, 8, 1108–1121. [Google Scholar] [CrossRef]
  34. Chaum, D.; Van Heyst, E. Group signatures. In Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1991; pp. 257–265. [Google Scholar]
  35. Shao, J.; Lin, X.; Lu, R.; Zuo, C. A Threshold Anonymous Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 2015, 65, 1711–1720. [Google Scholar] [CrossRef]
  36. Alimohammadi, M.; Pouyan, A.A. Sybil attack detection using a low cost short group signature in VANET. In Proceedings of the 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), Rasht, Iran, 8–10 September 2015; pp. 23–28. [Google Scholar]
  37. Zhang, L.; Wu, Q.; Qin, B.; Domingo-Ferrer, J.; Liu, B. Practical secure and privacy-preserving scheme for value-added applications in VANETs. Comput. Commun. 2015, 71, 50–60. [Google Scholar] [CrossRef]
  38. Cui, J.; Wang, Y.; Zhang, J.; Xu, Y.; Zhong, H. Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad hoc Networks. IEEE Trans. Veh. Technol. 2020, 69, 8914–8924. [Google Scholar] [CrossRef]
  39. Lim, K.; Tuladhar, K.M.; Wang, X.; Liu, W. A scalable and secure key distribution scheme for group signature based authentication in VANET. In Proceedings of the 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York City, NY, USA, 19–21 October 2017; pp. 478–483. [Google Scholar]
  40. He, D.; Zeadally, S.; Xu, B.; Huang, X. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
  41. Zhang, L.; Wu, Q.; Domingo-Ferrer, J.; Qin, B.; Hu, C. Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 2016, 18, 516–526. [Google Scholar] [CrossRef]
  42. Azees, M.; Vijayakumar, P.; Deboarh, L.J. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2467–2476. [Google Scholar] [CrossRef]
  43. Pournaghi, S.M.; Zahednejad, B.; Bayat, M.; Farjami, Y. NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput. Networks 2018, 134, 78–92. [Google Scholar] [CrossRef]
  44. Alazzawi, M.; Lu, H.; Yassin, A.; Chen, K. Efficient Conditional Anonymity with Message Integrity and Authentication in a Vehicular Ad hoc Network. IEEE Access 2019, 7, 71424–71435. [Google Scholar] [CrossRef]
  45. Bayat, M.; Pournaghi, M.; Rahimi, M.; Barmshoory, M. NERA: A New and Efficient RSU based Authentication Scheme for VANETs. Wirel. Networks 2019, 26, 1–16. [Google Scholar] [CrossRef]
  46. Ali, I.; Li, F. An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs. Veh. Commun. 2020, 22, 100228. [Google Scholar] [CrossRef]
  47. Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors 2021, 21, 8206. [Google Scholar] [CrossRef] [PubMed]
  48. Alshudukhi, J.S.; Al-Mekhlafi, Z.G.; Mohammed, B.A. A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography. IEEE Access 2021, 9, 15633–15642. [Google Scholar] [CrossRef]
  49. Ali, I.; Chen, Y.; Ullah, N.; Afzal, M.; Wen, H. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Trans. Veh. Technol. 2021, 70, 5974–5989. [Google Scholar] [CrossRef]
  50. Li, J.; Choo, K.K.R.; Zhang, W.; Kumari, S.; Rodrigues, J.J.; Khan, M.K.; Hogrefe, D. EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 2018, 13, 104–113. [Google Scholar] [CrossRef]
  51. Liu, J.K.; Yuen, T.H.; Au, M.H.; Susilo, W. Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 2014, 41, 2559–2564. [Google Scholar] [CrossRef]
  52. Pointcheval, D.; Stern, J. Security arguments for digital signatures and blind signatures. J. Cryptol. 2000, 13, 361–396. [Google Scholar] [CrossRef]
  53. Haklay, M.; Weber, P. Openstreetmap: User-generated street maps. IEEE Pervasive Comput. 2008, 7, 12–18. [Google Scholar] [CrossRef]
  54. Abenza, P.P.G.; Malumbres, M.P.; Peral, P.P. 10 GatcomSUMO: A Graphical Tool for VANET Simulations Using SUMO and OMNeT+. In Proceedings of the SUMO 2017–Towards Simulation for Autonomous Mobility, Berlin, Germany, 8–10 May 2017; p. 113. [Google Scholar]
  55. Behrisch, M.; Bieker, L.; Erdmann, J.; Krajzewicz, D. SUMO–simulation of urban mobility: An overview. In Proceedings of the SIMUL 2011, The Third International Conference on Advances in System Simulation, ThinkMind, Barcelona, Spain, 23–29 October 2011. [Google Scholar]
  56. Varga, A. Discrete event simulation system. In Proceedings of the European Simulation Multiconference (ESM’2001), Prague, Czech Republic, 7–9 June 2001; pp. 1–7. [Google Scholar]
  57. Sommer, C.; German, R.; Dressler, F. Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 2010, 10, 3–15. [Google Scholar] [CrossRef]
  58. Nardini, G.; Sabella, D.; Stea, G.; Thakkar, P.; Virdis, A. Simu5G–An OMNeT++ library for end-to-end performance evaluation of 5G networks. IEEE Access 2020, 8, 181176–181191. [Google Scholar] [CrossRef]
  59. Scott, M. MIRACL-A Multiprecision Integer and Rational Arithmetic C/C++ Library. Available online: http://www.shamus.ie (accessed on 2003).
  60. Ltd, S.S. Multi Precision Integer and Rational Arithmetic Cryptographic Library (MIRACL). Available online: http://www.certivox.com/miracl/ (accessed on 2018).
Figure 1. The System Model of 5G-enabled Vehicular Networks.
Figure 1. The System Model of 5G-enabled Vehicular Networks.
Sustainability 14 09961 g001
Figure 2. Authentication Node Layers in OMNeT++.
Figure 2. Authentication Node Layers in OMNeT++.
Sustainability 14 09961 g002
Figure 3. A game between a challenger I and an attacker A .
Figure 3. A game between a challenger I and an attacker A .
Sustainability 14 09961 g003
Figure 4. Simulation Experiments for 5G-enabled Vehicular Networks.
Figure 4. Simulation Experiments for 5G-enabled Vehicular Networks.
Sustainability 14 09961 g004
Figure 5. Average Time to Sign Message.
Figure 5. Average Time to Sign Message.
Sustainability 14 09961 g005
Figure 6. Average Delay to Verify Message.
Figure 6. Average Delay to Verify Message.
Sustainability 14 09961 g006
Figure 7. The Costs of Communication Comparison.
Figure 7. The Costs of Communication Comparison.
Sustainability 14 09961 g007
Table 1. Comparison of Security Properties.
Table 1. Comparison of Security Properties.
SchemesAuthentication and IntegrityPrivacy PreservingReplaying ResistanceTraceabilityNo RSU Aided
He et al. [40]
Azees et al. [42]
Pournaghi et al. [43]
Bayat et al. [45]
Our work
Table 2. Parameters of Simulation Experiment.
Table 2. Parameters of Simulation Experiment.
ParametersValue
Play ground sizex = 3463 m, y = 4270 m and z = 50 m
Simulation time200 s
Physical LayerIEEE 802.11p
Mac LayerIEEE 1609.4
Bit rate6 Mbps
Maximum transmission20 mW
Table 3. Notation with its Costs of Execution Time.
Table 3. Notation with its Costs of Execution Time.
NotationDescriptionsExecution Time
T b p a bilinear pairing e (P,Q)5.811 ms
T m u l a BP scalar multiplication s . P 1.5654 ms
T a d d a BP point addition P + Q 0.0106 ms
T M T P a MapToPoint hash function4.1724 ms
t m u l a ECC scalar multiplication operation s . P 0.6718 ms
t a d d a ECC point addition operation P + Q 0.0031 ms
t h a secure cryptographic hash function0.0001 ms
Table 4. The Cost of Computation of Five Authentication Schemes.
Table 4. The Cost of Computation of Five Authentication Schemes.
SchemeMsgSign PhaseSigVerify PhaseBSigVerify Phase
He et al.’s scheme [40] 3 t m u l + 3 t h 2.0156 ms 5 t m u l + t a d d + 2 t h 3.3622 ms ( 2 + 3 n ) t m u l + ( 2 n 1 ) t a d d + ( 2 n ) t h 1.3405 + 2.0236 n ms
Azees et al.’s scheme [42] 1 T m u l + 1 t h 1.5655 ms 2 T b p + 5 T m u l + 2 T a d d 19.661 ms ( 1 + n ) T b p + ( 5 n ) T m u l + ( 2 n ) T a d d 5.811 + 13.6592 n ms
Pournaghi et al.’s scheme [43] 3 T m u l + 1 T a d d + 2 t h + 1 T M T P 8.8794 ms 3 T b p + ( n ) T m u l + ( n ) T M T P 21.6054 ms 3 T b p + ( n ) T m u l + ( n ) T M T P 17.433 + 5.7378 n ms
Bayat et al. ’s scheme [45] 1 T M T P 4.1724 ms 3 T b p + ( n ) T m u l + ( n ) T M T P 21.6054 ms 3 T b p + ( n ) T m u l + ( n ) T M T P 17.433 + 5.7378 n ms
The proposed scheme 1 t m u l + 2 t h 0.6719 ms 4 t m u l + t a d d + 2 t h 2.6904 ms ( 2 + 2 n ) t m u l + ( n ) t a d d + ( 2 n ) t h 1.3436 + 1.3469 n ms
Table 5. The Sizes of Elements Used.
Table 5. The Sizes of Elements Used.
ElementSize
Z q * 160 bits
G320 bits
G 1 1024 bits
Timestamp32 bits
Hash function160 bits
Table 6. The Costs of Communication Comparison.
Table 6. The Costs of Communication Comparison.
SchemeMessage-Signature TupleSize (bits)n Size (bits)
He et al. [40] { A I D i , 1 , A I D i , 2 , M i , R i , T i , σ i } 3 × 320 + 160 + 32 = 11521152 n
Azees et al. [42] { S i g | | Y k | | C e r t k } 6 × 1024 + 3 × 160 + 32 = 66566656 n
Pournaghi et al. [43] { M i , I D R S U j , p I D i 1 , p I D i 2 , σ i } 2 × 1024 + 2 × 160 = 23682368 n
Bayat et al. [45] { M i , p I D i 1 , p I D i 2 , σ i } 2 × 1024 + 1 × 160 = 22082208 n
Our Proposed { M i , P K i , l , P I D i , l , D i , T i , δ i } 2 × 320 + 2 × 160 + 32 = 992992 n
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU). Sustainability 2022, 14, 9961. https://doi.org/10.3390/su14169961

AMA Style

Al-Shareeda MA, Manickam S, Mohammed BA, Al-Mekhlafi ZG, Qtaish A, Alzahrani AJ, Alshammari G, Sallam AA, Almekhlafi K. Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU). Sustainability. 2022; 14(16):9961. https://doi.org/10.3390/su14169961

Chicago/Turabian Style

Al-Shareeda, Mahmood A., Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, and Khalil Almekhlafi. 2022. "Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU)" Sustainability 14, no. 16: 9961. https://doi.org/10.3390/su14169961

APA Style

Al-Shareeda, M. A., Manickam, S., Mohammed, B. A., Al-Mekhlafi, Z. G., Qtaish, A., Alzahrani, A. J., Alshammari, G., Sallam, A. A., & Almekhlafi, K. (2022). Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU). Sustainability, 14(16), 9961. https://doi.org/10.3390/su14169961

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop