Abstract
With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as large as the number of vehicles and it is enormous when compared to vehicle calculation and storage performance. To resolve this problem, VANET uses a combined cloud computing technology, called vehicular cloud computing (VCC), which controls vehicle-related data, and helps vehicle drivers directly or indirectly. However, VANETs remain vulnerable to attacks such as tracking, masquerade and man-in-the-middle attacks because VANETs communicate via open networks. To overcome these issues, many researchers have proposed secure authentication protocols for message confirmation with vehicular cloud computing. However, many researchers have pointed out that some proposed protocols use ideal tamper-proof devices (TPDs). They demonstrated that realistic TPDs cannot prevent adversaries attack. Limbasiya et al. presented a message confirmation scheme for vehicular cloud computing using a realistic TPD in order to prevent these problems. However, their proposed scheme still has security weaknesses over a TPD and does not guarantee mutual authentication. This paper proposes a secure key agreement and authentication protocol to address the security weaknesses inherent in the protocol of Limbasiya et al. The suggested protocol withstands malicious attacks and ensures secure mutual authentication for privacy-preserving. We prove that the proposed protocol can provide session key security using Real-Or-Random (ROR) model. We also employed Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool to show that the proposed protocol is able to defeat replay and man-in-the-middle attacks. Furthermore, we established that the proposed protocol can resist other malicious attacks by conducting the informal security analysis. We proved that our proposed protocol is lightweight and suitable for VCC environments.
1. Introduction
Embedded devices, such as sensors and on-board units (OBUs) of Internet of vehicles (IoVs), collect a variety of information including traffic conditions and road conditions. The driver and traffic management system can share and use various services by sharing this information with other IoVs. Therefore, the role of embedded devices in IoV has been increasing with the increase in the size of a vehicle system, and traffic information has been increasing in complexity. However, enhancing the computing power and extending the storage space of the embedded devices is not technically possible or financially viable. Vehicular cloud computing (VCC) has been suggested to address these limitations of embedded devices. VCC is a system that controls vehicle-related data. IoVs send traffic information to the vehicular cloud. Subsequently, other vehicles can obtain information from the vehicular cloud when required.
However, this information is transmitted through open and unsecured channels; therefore, malicious attackers can threaten the VCC environment. When malicious attackers steal and manipulate traffic information, the lives of pedestrians, and drivers are endangered. Therefore, VCC should provide a key agreement with secure authentication that protects the information by providing message confirmations. Therefore, many studies have been suggested for VCC to provide a secure authentication. Recently, proposed schemes are used for ideal tamper-proof devices (TPDs). The TPD is safe from malicious attacks and it is impossible to tamper with it, according to the proposed schemes. However, the ideal TPD has a strong assumption that an attacker cannot obtain or tamper with values in the TPD according to [,,,]. They pointed out that attackers can obtain stored values in the realistic TPD through power analysis attacks and side-channel attacks.
In 2019, Limbasiya et al. [] presented a message confirmation scheme based batch verification, and a VCC environment to address OBU computation limitations. They proposed secure authentication to address an issue, where realistic TPD cannot prevent side channel and power analysis attacks. And also, they proposed a session key agreement for secure transmitting information. However, we figure out that the proposed protocol of Limbasyia et al. is vulnerable to side channel attacks of TPD and cannot defeat various attacks, including session key disclosure and impersonation attacks. Their protocol is also unable to provide secure mutual authentication and privacy-preserving.
This paper suggests a secure key agreement and authentication protocol for message confirmation in the VCC environment in order to overcome their security flaws. We design the protocol to use only the hash function and XOR operation, and assume that realistic OBUs can be deployed realistic environments. We also assume that an attacker can perform side channel attacks on TPDs to obtain secret values stored in TPDs. Consequently, our proposed protocol does not strongly rely on TPDs; instead, it uses only OBUs. Furthermore, we propose a key agreement protocol for secure data transmission. We analyze the security aspects of our proposed protocol using Real-Or-Random (ROR) model and the Automated Validation of Internet Security Protocols and Applications (AVISPA) software for the formal analysis. This paper also compares the computation cost and security features with [] and previous similar protocols. Finally, this paper demonstrates that the proposed protocol is able to be deployed in a real VANET.
The rest of this paper is as follows: Section 2 reviews related works and presents the network model, threat model and notations used in this paper. At Section 3, we review the Limbasiya et al.’s protocol. We cryptanalyze its security flaws in Section 4. At Section 5 and Section 6, we propose a secure key agreement and authentication protocol for VCC environment in VANET and perform informal and formal security analysis. We use ROR model, AVISPA simulation, and informal analysis for verification. Subsequently, we compare the security properties and computational cost with related previous researches in Section 7. Finally, in Section 8, we present our conclusions with the results of the proposed protocol.
2. Related Works
This section reviews the literature regarding the authentication protocol for vehicle communication and examines the limitations of ideal TPDs. We also introduce the network model, threat model, and notations used in this paper.
2.1. Literature Reviews
This section briefly reviews secure authentication protocols and key agreement protocols that are involved in two aspects, i.e., general authentication protocols for vehicular communication or VANETs, and authentication protocol using a practical TPD that points out the limitations of the ideal TPD.
2.1.1. Authentication Protocol for Vehicle Communication
Authentication is considered a basic security service that allows subjects to mutually authenticate with other subjects [,,,,]. In 2007, Lin et al. [] suggested an authentication protocol while using a group signature based on bilinear pairing. In their protocol, the verifier can verify multiple signatures simultaneously, which improves authentication efficiency. However, Zhang et al. [] pointed out a significant flaw in Lin et al.’s protocol, that validation required at least two pairing operations that could not be extended. In addition, their protocol uses many exponential operations that require complex computing. Therefore, they suggested an authentication protocol based on bilinear pairing and used addition operation, which is simpler than exponential operation. In 2013, Lee and Lai [] found that Zhang et al.’s proposed scheme also has security weaknesses. They demonstrated that Zhang et al.’s protocol cannot achieve the signature non-repudiation and is insecure against replay attack. Moreover, Zhang et al.’s scheme cannot provide security to masquerade and tracking attacks. However, Jianhong et al. [] proved that Lee and Lai’s protocol is insecure to the impersonation and tracing attacks and violates the non-repudiation. Further, Bayat et al. [] also found an impersonation attack in Lee and Lai’s protocol. After that, Bayat et al. [] proposed a secure authentication scheme for VANETS with batch verification to overcome []’s security weaknesses. Unfortunately, He et al. [] pointed out that []’s protocol cannot defeat against modification, replay, and impersonation attacks. Then, He et al. [] designed a novel secure protocol using Elliptic Curve Cryptographic (ECC) for vehicle communication. Zhong et al. [] analyzed the protocol in [] and concluded that using complex cryptographic functions can result in enormous operational costs and, consequently, the system faces network disruption problems. Therefore, they proposed a system to distribute pseudonymized signatures to verify user identities. In 2014, Chuang et al. [] proposed a trust-extended authentication scheme in VANETs. Under their protocol, vehicles are divided into three types and they only used hash and exclusive-or functions to create lightweight communication. However, Zhou et al. [] found out that Chuang et al.’s protocol cannot guarantee privacy-preserving and is vulnerable to impersonation and insider attacks. They also argued that the assumption of TPD is strong. Therefore, Zhou et al. proposed a more secure authentication protocol to improve Chuang et al.’s protocol. They use an ECC to protect entities’ real identities and protect against internal attacks. In 2019, Wu et al. [] pointed out that Zhou et al.’s proposed protocol cannot prevent identity guessing and impersonation attacks and also cannot guarantee user’s anonymity. In 2017, Zhang et al. [] proposed a personal information protection system based on distributed aggregation to conditionally block user’s anonymity. However, this method takes more time to verify the signature, so the recipient must spend more time immediately verifying the correctness of the message. In 2019, Limbasiya et al. [] proposed a secure message confirmation in vehicular cloud environment. They are pointed out that Zhong et al’s protocol [] has a security flaws using side channel attack over the OBU and TPD. Therefore, they suggested a more secure protocol for overcoming computational limitations of OBU and TPD through cloud computing. However, we revealed that their proposed protocol does not defeat several malicious attacks, such as session key disclosure attack and masquerade attack and so on. Additionally, their protocol does not provide privacy preserving and mutual authentication and has a correctness problem.
2.1.2. Ideal Tpd Limitation
In 2017, Zhang et al. [] proposed a privacy-preserving authentication protocol for VANET communication with a realistic TPD in OBUs. They showed that the general TPD used in many previous studies was not realistic. The ideal TPD has a strong assumption that an attacker cannot obtain or tamper with values stored in the OBU. However, Zhang et al. [] demonstrated that attackers can perform side channel attack on TPDs in realistic situations to eventually control the entire VANET. In 2017, Zhang et al. [] proposed a Chinese remainder theorem based authentication protocol for VANETs. They pointed out the heavy reliance on the ideal TPD. If a single TPD is obtained by a malicious user, reliance on the ideal TPD created a single point of failure and fail to preserve privacy of entire network. Therefore, they use biometrics of the drivers to help prevent attack over TPDs.
In 2018, Liu et al. [] proposed an authentication scheme for VANETs to balance the reliance on the TPD. They demonstrated that strong reliance of the TPD provokes that attacker can compromise the whole system, because of key leakage, and they designed a protocol, such that, even if the TPD is compromised, the whole system will not be in danger.
2.2. Network Model
In the general architecture of vehicular networks, the communication of vehicles among the other vehicles or with the road side units (RSUs) is based on dedicated short-range communication [], where the vehicle-to-Infrastructure (V2I) communication is the external network among the vehicles and RSUs.
Our proposed network model is based on Limbasiya et al.’s network model, but it addresses the problems regarding flaws in communication and authentication. Under their protocol, the process of transmitting the session key between RSUs and vehicles is unclear. Therefore, we propose a network model, in which vehicles and RSUs register at a trusted authority. The key agreement consists of all entities, including the vehicle, RSU, and trusted authority. Figure 1 illustrates our proposed network model and gives a detailed description of the entities.
Figure 1.
Proposed network model.
- Vehicle: vehicles have embedded devices, sensors and wireless communication device, such as velocity or location measurement equipment, Bluetooth, Wi-Fi, and OBU. In particular, the OBU collects information generated by sensors or devices. However, the OBU has relatively restricted memory. Therefore, the OBU sends the collected information to RSUs; subsequently, RSUs transmit the data to the vehicular cloud.
- RSU: RSUs are intermediary devices to transmit data between vehicles and the vehicular cloud. RSUs register with the trusted authority to generate a session key with vehicles. RSUs have more memory and computing performance than OBUs. Therefore, RSUs can obtain data from many vehicles. However, RSUs cannot store data from multiple vehicles. Therefore, RSUs send specific data to the vehicular cloud.
- Trusted authority: a trusted authority is the top-level entity that an attacker can never attack. RSUs and vehicles should register with the trusted authority to generate the session key, and then, the trusted authority, RSUs, and vehicles perform mutual authentication.
- Vehicular cloud: a vehicular cloud is a storage server used to save a huge amount of data of different kinds within a VANET system. Each vehicle needs to collect and share the data with other vehicles. Therefore, the OBU collects data and communicates with other OBUs. However, OBUs have low computational performance and small storage space. Thus, vehicles send the data securely to RSUs and RSUs forward it to the vehicular cloud.
2.3. Threat Model
We cryptanalyze protocol security using the popular Dolev-Yao(DY) model []. By using this threat model, malicious attackers can capture, modify, add, or delete messages sent over insecure channels. And we also consider the following assumptions:
- A malicious adversary can steal or obtain a legitimate user’s device, and perform side-channel attacks [] to obtain key information stored in the device.
- A malicious adversary is able to masquerade as a legitimate user and trick authority entities for accessing resources.
- An adversary may obtain an authority entity’s secret key. Subsequently, the adversary can compute a previous session key to trick user or authority entities.
We also follow the claims of [,,]. Therefore, we assume that attackers can perform side channel attack or power analysis attack over TPDs or OBUs. Subsequently, attackers can obtain values stored in TPDs. Adversaries can perform a variety of attacks including impersonation, spoofing, identity guessing attacks using values obtained from compromised TPDs.
2.4. Notations
The used notations in this paper are given in Table 1.
Table 1.
Notations.
3. Review of Limbasiya et al.’s Protocol
We review Limbasiya et al.’s message confirmation scheme for VCC environment, which includes formation, key generation and message signature, and message confirmation phases.
3.1. Formation Phase
If a new vehicle requests registration with trusted authority , computes and sends and , which store the necessary values to the vehicle. Before registration, each vehicle computes parameters using unique identity , password , and random number . The detailed equations are shown in Figure 2 and steps are as follows.
Figure 2.
Formation phase of Limbasiya et al.’s protocol.
- Step 1:
- Vehicle chooses unique identity , password and generates a random number . computes , and then sends , to through a secure channel.
- Step 2:
- After receiving and , calculates and saves in and in . Subsequently, sends and to via a secure channel.
3.2. Key Generation Phase
The vehicle begins a key agreement process in for message signature. generates a session key and transmits it to a concerned . The detailed equations are illustrated in Figure 3 and the steps are as following.
Figure 3.
Key generation phase of Limbasiya et al.’s protocol.
- Step 1:
- inserts and into .
- Step 2:
- then computes and . Then compares with stored in itself.
- Step 3:
- if they are same, selects random number and computes , and . Then generates the session key and transmits the session key to a concerned .
3.3. Message Signature and Confirmation Phase of Limbasiya et al.’s Protocol
signs the information with the session key and forwards to the connected . Figure 4 shows the detailed equations with process steps, as follows.
Figure 4.
Message signature phase of Limbasiya et al.’s protocol.
- Step 1:
- for signing the message, computes and . Subsequently, sends message to the concerned .
- Step 2:
- after receiving the message, computes and .
- Step 3:
- then, compares the with . If they are equal, uses for future computations. Additionally, Generally for batch verification, inspects the exaction by a following equation:
4. Cryptanalysis of Limbasiya et al.’s Protocol
Limasyia et al. demonstrated that their protocol provides privacy-preserving and mutual authentication and so on. However, in this section, we cryptanalyze Limbasiya et al.’s scheme for the VCC environment. Additionally, we figure out their protocol has several security flaws.
4.1. Correctness Problem
In the formation phase, a vehicle sends only . Thus, cannot know information . However, in Limbasiya et al.’s protocol, computes using . Therefore, Limbasiya et al.’s protocol has a correctness problem and it may derive the incorrect formation of .
4.2. Session Key Disclosure Attack
A malicious attacker can perform the side channel attack on TPD [,,] and OBU. Accordingly, can obtain values stored in OBU and TPD, and also obtain transmitted messages through insecure channels. Thus, can compute the session key using the obtained values.
- Step 1:
- can obtain P in and in using side channel attack. And also can obtain the value through transmitted message. Subsequently, can compute .
- Step 2:
- can obtain and from transmitted messages and obtains the value , which is public value. Therefore, can compute .
- Step 3:
- finally, obtains the previous session key and can trick other OBUs or RSUs.
4.3. Impersonation Attack
can impersonate vehicles to compute message confirmation request messages. Section 4.2 shows that can compute the session key. Therefore, can compute confirmation request messages while using the computed session key and transmitted messages. The detailed steps are as follows.
- Step 1:
- can obtain through the transmitted message and compute previous session key as above session key disclosure attack Section. Subsequently, can compute .
- Step 2:
- can also compute .
- Step 3:
- finally, can generate the confirmation request message to impersonate the vehicle.
4.4. Privacy Preserving Problem
In Limbasiya et al.’s scheme, the legitimate identity of the vehicle is transmitted through public channels. This may cause the tracing attack and cannot preserve the user’s privacy. As above sections, the attacker can masquerade legitimate vehicles and make a session key to access sensitive information. Therefore, the protocol of Limbasiya et al. is not able to provide privacy-preserving.
4.5. Mutual Authentication
In above section, we prove that can generate the session key successfully, and impersonate the legitimate vehicle. Therefore, the protocol of Limbasiya et al. cannot achieve key agreement and mutual authentication.
5. Secure Key Agreement and Authentication Protocol for VCC
This section provides the proposed protocol to resolve the security flaws in Limbasiya et al.’s protocol. We use only an OBU instead of a TPD. Limbasiya et al.’s protocol cannot provide secure key agreement, because the TPD sends the session key without encryption. Therefore, we register vehicles and RSUs at the to generate secure key agreement. Thereafter, the vehicle transmits the information encrypted with the session key to the RSU. RSUs validate the message and send it to the vehicular cloud. We also consider performance and storage of OBU because of its relatively low computational power and small storage. Thus, we design the protocol using only exclusive-or and one-way hash function, which have low computational cost.
5.1. Registration Phase
For message confirmation with VCC and communicating with other vehicles or RSUs, the vehicle must register with the TA. Additionally, RSUs also register through TA to make secure session key with the vehicle. The detailed steps are as following and shown in Figure 5.
Figure 5.
Registration phase of our proposed protocol.
- Step 1:
- vehicle chooses identity , password and random number . And vehicle computes and . sends the message to .
- Step 2:
- has master key x and secret key y. After receiving the registration request message from , generates random numbers and for the vehicle. Subsequently, calculates , , , , , and . Afterwards, saves and in the , and then sends to the vehicle through a closed channel.
- Step 3:
- road side unit chooses and random nonce and sends these values to via a closed channel.
- Step 4:
- when receives values from , calculates and . Subsequently, sends the message to via a secure channel.
5.2. Key Agreement and Authentication Phase
The vehicle and RSU must have key agreement through generating the session key for secure communication among the RSU and other OBUs. Vehicle and RSU are authenticated by TA. If the TA checks that vehicle and RSUs are legitimate entities, vehicle and RSU generate a session key. The detailed steps are given below. See Figure 6.
Figure 6.
Key agreement and authentication phase of our proposed protocol.
- Step 1:
- vehicle inputs and . Subsequently, extracts with stored values in the . calculates , , , , , and and . Then, checks whether . If valid, selects a random number and computes and . Finally, sends the message to the concerned via an insecure channel.
- Step 2:
- selects , and computes and . Then, sends the values to the via an insecure channel.
- Step 3:
- when receives the message from , computes , and . Then, compares and . If they are equal, extracts the values and . computes and compares it with . If they are same, generates a new secret key . computes , , , , and . Finally, sends the message to through an open channel.
- Step 4:
- after receiving the values from , extracts , and computes . Then checks whether and are equal or not. If they are equal, updates to and generates the session key . sends the message to via a public channel.
- Step 5:
- extracts the value , computes and checks whether and are same or not. If they are equal, computes the session key . Finally, and concerned have the same session key.
5.3. Message Signature and Message Confirmation Phase
If the wants to send information to the concerned RSU, must sign the message using the session key and sends it to the . Additionally, checks whether the message is legitimate or not. If the message is legitimate, validates the message and sends it to a cloud server. The detailed steps are as following and are shown in Figure 7.
Figure 7.
Message signature and confirmation phase of our proposed protocol.
- Step 1:
- for signing the information , computes and and sends the message to the concerned .
- Step 2:
- after receiving the message, extracts information , computes and checks whether and are equal or not. If they are the same, uses the information for the future computations. Additionally, generally for batch verification, inspects the exaction by a following equation:
6. Security Analysis
We simulate with the AVISPA simulation tool [,] in order to demonstrate that the proposed protocol is able to prevent against replay and man-in-the-middle attacks. We also prove the session key security using the ROR model [] and conduct the informal security analysis. Therefore, our proposed protocol can provide security against various attacks including impersonation, side channel attack over TPD, trace attack, and so on.
6.1. ROR Model
In this section, we use the universally-accepted real-or-random (ROR) model [] in order to prove the security of the session key in our proposed protocol.We provide the similar proof as adopted in [,].
Short Discussion about ROR Model
In the ROR model [], the malicious attacker is modeled using the DY model, which interacts with the instance of the participants in the protocol. In our proposed protocol, , and are considered as participants. Additionally, , , and , which are called denoting the instances , , and of , , and , respectively. Table 2 shows various queries that simulate attacks, such as eavesdropping, modifying, and deleting or inserting the transmitted messages among the entities. and Collision-resistant one-way hash function are modeled as a random oracle and they can be used by all participants including .
Table 2.
Various queries and their meanings.
Wang et al. [] showed that the password chosen by the user follows the Zipf’s law, which is quite different from the uniform distribution. They also found that the size of password dictionary is quite limited in the sense that users do not generally use the entire space of the passwords; instead, they use a small space of the allowed characters space. We apply the Zipf’s law in order to prove the session key security of our proposed protocol.
Theorem 1.
If is the advantage function of an attacker in breaking the session key security of the proposed protocol P, respectively, , , and are the number of queries, queries, and the range space of the hash function, respectively. Subsequently,
where and are the Zipf’s parameters [].
Proof.
We define four games, called game , . The probability associated with in which can guess the random bit c and wins the game and denoted by . Moreover, denotes the probability. We discuss the details for these four defined games below.
- Game: in this game, chooses a random bit c. Additionally, this game involves a practical attack executed by against the protocol in the ROR model. Because and protocol are identical, we get,
- Game: under this game, performs the eavesdropping attack to all transmitted messages during key generation and message confirmation process of the proposed protocol using the query. At the end of the this game, makes and queries. The output of the and queries decide if obtains the derived session key between and or a random number. In our proposed protocol, and computes the session key as . To derive , needs the short-term (temporal) secrets ( and ), which are unknown to . However, the transmitted messages are not helpful to increase winning probability. As both the game and are indistinguishable, we can get
- Game: this game is modeled as an active attack which includes the simulation of and queries. In proposed protocol, all of the messages are protected by the collision-resistant one-way hash function except and . However, random numbers are used in values and . Furthermore, deriving from the intercepted , , and , and also from intercepted , , , and are computationally infeasible task because of collision-resistant property of the hash function. Therefore, no collision occurs when executes query. Using the birthday paradox results, we can have,
- Game: this is the final game that executes the query by . can extract all the information from the OBU of . Note that , , , , and . To derive the secrets , , and from , , , and , needs unknown and . Without having secret credentials , , and of , it is a computationally difficult problem for to guess password of correctly using the queries. Because and are identical when password guessing attack is absent. Therefore, using the Zipf’s law on passwords, we obtain
All of the games are executed; therefore, needs to guess the correct bit c. Therefore, we have
Equations (1) and (2) give the following result:
Again, Equations (5) and (6) give the following result:
We obtain the following equation using the triangular inequality and Equations (3) and (4):
At last, we obtain the required result by multiplying both sides of Equation (8) by a factor of 2:
Therefore, the Theorem 1 is proved. □
6.2. Formal Security Analysis through AVISPA
We perform a formal security analysis of the proposed protocol using the AVISPA validation tool in order to demonstrate that the protocol can resist replay and man-in-the-middle attacks. The AVISPA adopts the High-Level Protocol Specification Language (HLPSL) code. We briefly discuss AVISPA and present HLPSL codes of our protocol. After that, we present the simulation results of the AVISPA to show that our protocol can protect against man-in-the-middle and replay attacks. Numerous studies verified with the AVISPA tool have been presented [,,].
6.2.1. Proposed Protocol’s HLPSL Code
The AVISPA uses the four back-ends, such as On-the-fly Model-Checker (OFMC) [], CL-based Attack Searcher (CL-AtSe) [], SAT-based Model-Checker (SATMC), and Tree Automate-based Protocol Analyser (TA4SP) in order to verify security of a protocol. The code is translated into intermediate format (IF), and IF uses four back-ends to convert to output format (OF). Especially, OFMC and CL-AtSe are commonly used for verification.
The proposed protocol has three basic which denote entities: denotes a vehicle, denotes a roadside unit and denotes a trusted authority. Roles of and are illustrated in Figure 8. In and , we set up the intruder knowledge, five authentication goals and four secrecy goals. We briefly discuss HLPSL code for role shown in Figure 9.
Figure 8.
Code of session and environments.
Figure 9.
Code of vehicle.
At transition 1, begins registration phase at 0 state value with start message, and updates the state to 1. sends message to through closed channels and declares the function , which means that denotes values which are only known to . At transition 2, receives the from and updates the state to 2. At the state 2, generates a random number , sends the message to the through an open channel, and declares function , which means that denotes a weakness authentication factor is used by to authenticate . At transition 3, receives the message from . After that generates the session key , performs message confirmation and declares and . The function means that represents a strong authentication factor. The codes of and are similar to the code of .
6.2.2. Results of Verification
The verification results using models OFMC and CL-AtSe are shown in Figure 10. Two simulations are able to check whether the protocol withstands man-in-the-middle and replay attacks. The CL-AtSe verification shows that three states are analyzed and translated to 0.11 s. The results of OFMC shows that it visits 1040 nodes with a search time of 9.57 s and 9 plies depth. The summary part of CL-AtSe and OFMC indicates SAFE, so we can say that the proposed protocol resists replay and man-in-the-middle attacks.
Figure 10.
Result of Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation using On-the-fly Model-Checker (OFMC) and CL-based Attack Searcher (CL-AtSe) models.
6.3. Informal Analysis
In this section, we analyze informal security verification in order to prove that the proposed protocol can resist numerous attacks, such as OBU stolen, impersonation, session key disclosure, off-line guessing attacks, and so on. Moreover, we show that the proposed protocol can achieve privacy-preserving and mutual authentication.
6.3.1. Vehicle Impersonation Attack
If an adversary attempts to impersonate a vehicle , should generate message and . However, cannot extract , and even if extracts the value stored in the OBU. Because , and are masked with random numbers , , and session key . Therefore, the proposed protocol resists impersonation attacks, because cannot generate the correct messages.
6.3.2. Side Channel Attack over OBU
We assume that can extract values from the OBU based on our assumed threat model. Therefore, can perform side channel attack over OBU and extract . However, cannot obtain any useful information without identity, password, and secret random numbers, because all of the values stored in OBU are masked with one-way hash function or XOR operation on , , and . Thus, does not have any advantage of side channel attack over OBU.
6.3.3. Off-Line Guessing Attack
cannot guess the identity or password, because , and are masked with random numbers and the secret values and . must also check whether and calculate by to see whether the identity and password are guessed correctly. For this, can perform a side channel attack over OBU to obtain the stored values . However, to calculate , needs to know the secret random number and secret parameter . This allows for being computationally expensive to guess identity or password. Therefore, we show that the proposed protocol can prevent off-line guessing attacks.
6.3.4. Man-in-the Middle Attack and Replay Attack
The adversary can obtain the transmitted messages over an open channel and stored parameters in the OBU according to the threat model. However, we show that cannot generate valid vehicle’s messages as mentioned above. Furthermore, also cannot generate the ’s message, because does not know secret random numbers , and secret parameter . Thus, cannot impersonate or by replaying intercepted messages as all messages are dynamic with random numbers and . Therefore, the proposed protocol prevents man-in-the-middle and replay attacks.
6.3.5. Session Key Disclosure Attack
Even if has obtained values, as mentioned above, cannot generate the session key . The comprises the hash function with secret random numbers and . However, cannot extract random numbers, because they are masked with secret parameters and . Moreover, and are also masked with random numbers. Therefore, does not know about the session key .
6.3.6. Trace Attack and Privacy-Preserving
The vehicle does not send its real identity over an open channel. The vehicle generates the pseudonym identity . And also uses the instead of real identity . Moreover, as above mentioned Sections, cannot impersonate legitimate vehicles and also cannot generate a validated session key. Therefore, the proposed protocol provides the privacy-preserving. and communicate the information using the session key without pseudonym identities. Thus, we can say that the proposed protocol can prevent trace attack.
6.3.7. Mutual Authentication
After receiving message the from and , checks whether . If it is equal, also checks . Subsequently, sends to the and for authenticating. checks and checks also . If they are valid, , , and successfully authenticate each other. Previous sections have shown that cannot generate valid messages. Furthermore, all of the transmitted messages are refreshed for every session with secret random numbers. Therefore, our proposed protocol successfully ensures secure mutual authentication and achieves session key agreement.
7. Performance Analysis
In this section, we compare our proposed protocol with other related protocols for VANETs. We consider computation, communication costs, and security features.
7.1. Computation Cost
We show the comparison outcomes in Table 3. Our proposed protocol is lightweight as compared to other related protocols. Therefore, we can demonstrate that the proposed protocol is suitable for vehicular cloud environment in VANETs.
Table 3.
Computation cost of key generation and message confirmation phase.
For comparing the computational cost, we define following notations. , , , , and , which denotes the execution time of bilinear mapping, multiplication related to bilinear pairing, map-To-point hash, one-way hash, small scale multiplication related to elliptic curve cryptography (ECC), and addition related to ECC. We focus on time overhead in the process of authentication message generation and message verification. For rough estimation, we consider the existing results reported by []. The execution time of each operation is as following.
- : Time for bilinear pairing operation (≈4.2110 ms)
- : Time for small scale multiplication related to bilinear pairing (≈1.7090 ms)
- : Time for map-To-point hash operation (≈4.406 ms)
- : Time for one-way hash operation (≈0.0001 ms)
- : Time for small scale multiplication related to ECC (≈0.0138 ms)
- : Time for point addition related to ECC (≈0.0018 ms)
7.2. Communication Cost and Storage Cost
We compare communication cost overheads among related protocols and proposed protocol during the message confirmation phase in Table 4. We assume that the identity, password, and normal variable needs eight bytes, the time-stamp needs four bytes, an ECC encryption/decryption needs 32 bytes, a bilinear pairing needs 128 bytes, and one-way hash function needs 32 bytes []. As the results of the comparison, the proposed protocol is the most efficient when compared with other related protocols. The storage overhead is calculated based on the total number of bytes required to store required parameters in OBU or TPD and RSU. The proposed protocol has 224 bytes storage cost, where OBU has 160 bytes and RSu has 64 bytes. Although the total memory of our protocol is slightly higher than that of other protocols, our protocol ensures security.
Table 4.
Communication cost and storage cost.
7.3. Energy Consumption
Researchers need to consider the size and speed of the message being sent to the recipient. This is because data transmission occurs under Dedicated Short-Range Communication (DSRC) and, in the case of vehicle networks defined in IEEE 802.11p, it belongs to the physical protocol layer. This IEEE standard operates at 10 MHz channel bandwidth, 5.8 GHz frequency, 25 dBm transmit power, and 6 Mbps data rate []. The energy consumption for the verification scheme can be calculated as (for the execution time of key generation and message confirmation) (for the communication cost for message confirmation) and it is measured in millijoule (mJ). For the execution time, , where = Total computation cost, C = cpu maximum power, which is 10.88 W for wireless communication networks []. , where = the size of message, = the data rate for vehicular communications (6000 Kbps). By referring to Table 5, we can say that the proposed protocol consumes the least energy.
Table 5.
Energy consumption.
7.4. Propagation Delay
The propagation delay () is determined by computing the difference between the timestamps of a message received () and transmitted (). But expects some time interval, which can be stated as in and for L length messages (i.e., communication cost) at f transmitted data rate along with h hops through which a message is traveled []. Thus, the propagation delay of our protocol is the lowest, because the communication cost of the proposed protocol is the lowest.
7.5. Security Properties
In Table 6, we present the results of protocols related to security comparisons and our proposed protocol based on batch verification. The suggested protocol prevents more attacks than other related previous studies, and also provide privacy-preserving and mutual authentication. Therefore, our proposed protocol is significantly safer than the considered related protocols. The system consumes some energy during implementation, depending on the real time and communication overhead of the system.
Table 6.
Security Properties.
8. Conclusions
Vehicle systems have developed significantly and they have recently helped people to drive more comfortably and safely. However, unsolved security problems and large quantities of traffic information have limited the use of vehicle systems. The VCC with message confirmation is the one of solutions to decline burdens of OBU’s storage. And VCC helps to use the vast amount of vehicle information easily. In addition, to protect the vehicle information, key agreement and authentication process is also necessary to address malicious attacks, including communication security problems. Additionally, previous studies and the protocol of Limbasiya et al. are not safe for stored values in ideal or realistic TPDs. In this paper, we first showed that protocol of Limbasiya et al. is not secure against session key disclosure and impersonation attacks because of information leaked from a TPD. Their protocol also does not provide privacy of the users and mutual authentication property. Subsequently, we proposed a secure key agreement and authentication protocol for message confirmation in VCC. The proposed protocol withstands various attacks and provides privacy of users and mutual authentication. We conducted formal security analysis and simulation to prove the security of the proposed protocol. Moreover, we compared computation, communication costs and the security properties with other related protocols. Thus, our proposed protocol is lightweight and suitable for VCC environments. As part of the future, we will put effort into developing a better protocol by applying the developed protocol to the real environment.
Author Contributions
Conceptualization, J.L.; Formal analysis, J.L., S.Y. and M.K.; Software, J.L. and M.K.; Supervision, Y.P.; Validation, S.Y., Y.P., S.L. and B.C.; Writing—original draft, J.L.; Writing—review & edigint, S.Y., M.K., Y.P., S.L. and B.C. All authors have read and agreed to the published version of the manuscript.
Funding
This research was supported by the Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government(MIST) (No.2018-0-00312, Developing technologies to predict, detect, respond, and automatically diagnose security threats to automotive Ethernet-based vehicle).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Zhang, L.; Wu, Q.; Domingo-Ferrer, J.; Qin, B.; Hu, C. Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 2017, 18, 516–526. [Google Scholar] [CrossRef]
- Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-preserving Authentication Scheme in Vehicular Ad-hoc Networks. IEEE Trans. Dependable Secur. Comput. 2019. [Google Scholar] [CrossRef]
- Liu, Z.; Xiong, L.; Peng, T.; Peng, D.; Liang, H. A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 2018, 6, 26307–26317. [Google Scholar] [CrossRef]
- Limbasiya, T.; Das, D. Secure message confirmation scheme based on batch verification in vehicular cloud computing. Pysical Commun. 2019, 34, 310–320. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Kumar, N.; Odelu, V.; Reddy, A.G.; Park, K.; Park, Y. Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access 2017, 5, 14966–14980. [Google Scholar] [CrossRef]
- Kim, M.; Park, K.; Yu, S.; Lee, J.; Park, Y.; Lee, S.-W.; Chung, B. A Secure Charging System for Electric Vehicles Based on Blockchain. Sensors 2019, 19, 3028. [Google Scholar] [CrossRef] [PubMed]
- Lee, J.; Yu, S.; Kim, M.; Park, Y.; Das, A.K. On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks. IEEE Access 2020, 8, 107046–107062. [Google Scholar] [CrossRef]
- Yu, S.; Lee, J.; Park, Y.; Park, Y.; Lee, S.; Chung, B. A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks. Appl. Sci. 2020, 10, 3565. [Google Scholar] [CrossRef]
- Wazid, M.; Bagga, P.; Das, A.K.; Shetty, S.; Rodrigues, J.J.; Park, Y.H. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment. IEEE Internet Things J. 2019, 6, 8804–8817. [Google Scholar] [CrossRef]
- Lin, X.; Sun, X.; Ho, P.; Shen, X. GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 2007, 56, 3442–3456. [Google Scholar]
- Zhang, C.; Ho, P.; Tapolcai, J. On batch verification with group testing for vehicular communications. Wirel. Netw. 2011, 17, 1851–1865. [Google Scholar] [CrossRef]
- Lee, C.C.; Lai, Y.M. Toward a secure batch verification with group testing for VANET. Wirel. Netw. 2013, 19, 1441–1449. [Google Scholar] [CrossRef]
- Jianhong, Z.; Min, X.; Liying, L. On the security of a secure batch verification with group testing for VANET. Int. J. Netw. Secur. 2014, 16, 351–358. [Google Scholar]
- Bayat, M.; Barmshoory, M.; Rahimi, M.; Aref, M.R. A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 2015, 21, 1733–1743. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
- Zhong, H.; Wen, J.; Cui, J.; Zhang, S. Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Sci. Technol. 2016, 21, 620–629. [Google Scholar] [CrossRef]
- Chuang, C.M.; Lee, F.J. TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 2014, 8, 749–758. [Google Scholar] [CrossRef]
- Zhou, Y.; Zhao, X.; Jiang, Y.; Shang, F.; Deng, S.; Wang, X. An enhanced privacy-preserving authentication scheme for vehicle sensor network. Sensors 2017, 17, 2854. [Google Scholar] [CrossRef]
- Wu, L.; Sun, Q.; Wang, X.; Wang, J.; Yu, S.; Zou, Y.; Liu, B.; Zhu, Z. An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network. IEEE Access 2019, 7, 55050–55063. [Google Scholar] [CrossRef]
- Kenney, J. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 2011, 99, 1162–1182. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Advances in Cryptology; Springer Science + Business Media: Berlin, Germany; New York, NY, USA, 1999; pp. 388–397. [Google Scholar]
- AVISPA. Automated Validation of Internet Security Protocols and Applications. Available online: http://www.avispa-project.org/ (accessed on 17 July 2019).
- SPAN: A Security Protocol Animator for AVISPA. Available online: http://www.avispa-project.org/ (accessed on 17 July 2019).
- Abdalla, M.; Fouque, P.A.; Pointcheval, D. Password based authenticated key exchange in the three-party setting. In Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography; Springer: Les Diablerets, Switzerland, 2005; pp. 65–84. [Google Scholar]
- Park, K.; Park, Y.; Das, A.K.; Yu, S.; Lee, J.; Park, Y. A dynamic privacy-preserving key management protocol for V2G in social Internet of Things. IEEE Access 2019, 7, 76812–76832. [Google Scholar] [CrossRef]
- Park, K.; Noh, S.; Lee, H.; Das, A.K.; Kim, M.; Park, Y.; Wazid, M. LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme without Verification Table in Medical Internet of Things. IEEE Access 2020, 8, 119387–119404. [Google Scholar] [CrossRef]
- Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
- Yu, S.; Park, K.; Park, Y. A secure lightweight three-Factor authentication scheme for IoT in cloud computing environment. Sensors 2019, 19, 3598. [Google Scholar] [CrossRef]
- Park, Y.; Park, K.; Lee, K.; Song, H.; Park, Y. Security analysis and enhancements of an improved multi-factor biometric authentication scheme. Int. J. Distrib. Sens. Netw. 2017, 13, 1–12. [Google Scholar] [CrossRef]
- Lee, J.; Yu, S.; Park, K.; Park, Y.; Park, Y. Secure three-factor authentication protocol for multi-gateway IoT environments. Sensors 2019, 19, 2358. [Google Scholar] [CrossRef]
- Basin, D.; Modersheim, S.; Vigano, L. OFMC: A symbolic model checker for security protocols. Int. J. Inf. Secur. 2005, 4, 181–208. [Google Scholar] [CrossRef]
- Turuani, M. The CL-Atse protocol analyser. In Proceedings of the International Conference on Rewriting Techniques and Applications (RTA), Seattle, WA, USA, 12–14 August 2006; pp. 227–286. [Google Scholar]
- Cui, J.; Zhang, J.; Zhong, H.; Xu, Y. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Veh. Tech. 2017, 66, 10283–10295. [Google Scholar] [CrossRef]
- Mir, Z.H.; Fethi, F. LTE and IEEE 802.11 p for vehicular networking: A performance evaluation. EURASIP J. Wirel. Commun. Netw. 2014, 1, 89. [Google Scholar]
- He, D.; Chen, C.; Chan, S.; Bu, J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 2012, 11, 48–53. [Google Scholar] [CrossRef]
- Mostafa, A.; Vegni, A.M.; Singoria, R.; Oliveira, T.; Little, T.D.; Agrawal, D.P. A V2X-based approach for reduction of delay propagation in Vehicular Ad-Hoc Networks. In Proceedings of the 2011 11th International Conference on ITS Telecommunications (ITST), St. Petersburg, Russia, 23–25 August 2011; pp. 756–761. [Google Scholar]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).