Next Article in Journal
Effect of the Silanization of Aerosil OX50 in the Properties of Light-Cured Dental Composites
Next Article in Special Issue
Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things
Previous Article in Journal
Retrospective Clinical Analysis of the Effectiveness of Skeletally Anchored Appliances for Maxillary Expansion
Previous Article in Special Issue
Securing Internet of Things Applications Using Software-Defined Network-Aided Group Key Management with a Modified One-Way Function Tree
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV

Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(6), 2451; https://doi.org/10.3390/app14062451
Submission received: 16 February 2024 / Revised: 9 March 2024 / Accepted: 11 March 2024 / Published: 14 March 2024

Abstract

:
In Internet of Vehicles (IoV), the secure data transmission between vehicles and transportation infrastructure effectively ensures the safety and fast driving of vehicles, while authentication and key agreement protocols between vehicles and transportation infrastructure (V2I) play an important role in ensuring data security and user privacy. However, how to design a provably secure and lightweight V2I authentication protocol for IoV is a challenge. Recently, Kumar et al. proposed a conditional privacy-preserving and desynchronization-resistant authentication protocol for IoV, but we find that Kumar et al.’s scheme is vulnerable to identity guessing attacks, impersonation attacks, and a lack of session key secrecy once the attacker obtains data stored in smart card through side-channel attacks. We also point out that Kumar et al.’s protocol is vulnerable to Roadside Unit (RSU) captured attacks and lacks perfect forward secrecy. Therefore, we propose an improved V2I authentication protocol for IoV, which uses the Physical Unclonable Function (PUF) to resist RSU captured attacks, and designed a three-factor secrecy strategy to resist side-channel attacks; a conditional privacy-preserving strategy was also adopted to achieve anonymity and malicious user tracking. Furthermore, the proposed protocol is provably secure under the random oracle model and has low computation and communication costs.

1. Introduction

In the construction of smart cities, Intelligent Transportation Systems (ITS) and the Internet of Vehicles (IoV) have become key technologies for improving traffic efficiency and driving safety [1]. The IoV leverages on-board units (OBUs) and wireless communication technologies to facilitate communication among vehicles and other entities. Based on specific application scenarios, it can be divided into two categories: vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) [2,3]. The general entity of the system architecture of the IoV is shown in Figure 1, which contains vehicles, Roadside Units (RSUs), and Trusted Authority (TA). An OBU is a device mounted on a vehicle that is considered to have limited computing, storage, and communication capabilities; RSUs are curbside infrastructure with more computing and communication capabilities than OBUs; TA can provide the IoV with system initialization and entity registration as well as node authentication. Vehicles often exchange and share road information around them, such as road congestion, vehicle location, speed, etc., with other entities (such as other vehicles, RSUs). This information can help the vehicle dynamically judge the road traffic flow, thereby improving the experience of driver and traffic operation efficiency.
However, due to the fact that the information exchange between vehicles and other vehicles or Roadside Units (RSUs) takes place over public channels, it is susceptible to different attacks, such as privacy breaches, impersonation attacks, ID/password guessing attacks, RSU hijacking attacks, and more. Particularly, with the extensive application of smart cards (SCs) in the authentication field, the attackers employ various hardware and software attack methods in their attempts to access the information stored within smart cards [4]. Therefore, designing a security authentication and key agreement scheme based on SCs is still a challenge.

Motivation and Contributions

Through the analysis of existing IoV authentication protocols, we identified certain deficiencies in several of the existing authentication protocols, such as high computational costs, a lack of multi-factor secrecy and no known session key secrecy, and also found that they may suffer from ID/password guessing attacks, RSU captured attacks and so on. Recently, Kumar et al. [5] proposed a conditional privacy protection and desynchronization-resistant authentication scheme for IoV. However, we found that Kumar et al.’s [5] scheme suffers from several attacks. To solve these problems, we proposed a secure and efficient V2I authentication scheme for IoV. The contributions of this article are as follows:
  • Firstly, we point out that Kumar et al.’s protocol cannot resist identity guessing attacks, impersonation attacks and no session key secrecy when the attacker obtains data stored in SC through side-channel attacks, as well as that it is vulnerable to RSU captured attacks and lacks perfect forward secrecy.
  • Secondly, we propose a lightweight V2I authentication protocol based on PUF and the Fuzzy Extractor algorithm for the IoV. In particular, we used PUF to resist RSU captured attacks, designed a three-factor secrecy strategy to resist side-channel attacks, and also adopted a conditional privacy-preserving strategy to achieve anonymity and malicious user tracking.
  • Our proposed protocol is provably secure under the random oracle model. In comparison to various related protocols, our protocol demonstrates resilience against a range of known attacks and offers lower computational and communication costs.
The remaining part of this article is as follows. Section 2 presents a summary of the related work. Section 3 provides the preliminaries, and Section 4 reviews Kumar et al.’s scheme. Section 5 analyzes the security of Kumar et al.’s scheme. In Section 6, the proposed scheme is introduced. Section 7 presents formal and information security analysis of the proposed scheme. In Section 8, we present security and performance comparisons with related protocols. Finally, the study is concluded in Section 9.

2. Related Work

Because of the openness and dynamic nature of the IoV, the communication process is faced with many security threats such as tracking, eavesdropping and so on. To improve the security and efficiency, many V2I authentication schemes have been proposed.
PKI (Public Key Infrastructure) is a system of technologies, processes, and policies that enable the secure management and distribution of digital certificates, which are used for authentication and encryption in various applications such as secure communication, digital signatures, and secure online transactions. In 2007, Raya and Hubaux [6] presented a PKI-based authentication scheme that uses a large number of pseudonyms to improve user privacy. Joshi et al. [7] also designed a PKI-based authentication scheme, which tests the validity of the broadcast beacon based on a PKI-based signature. Sun et al. [8] proposed a pseudonymous authentication scheme to provide strong privacy, which permits the RSU to provide services of distributing certificates and vehicles to renew their certificates on road. Although using a pseudonym instead of a real name can protect the user’s privacy, complete anonymity should not be allowed because malicious vehicles may perform malicious operations, such as sending forged messages or modifying the valid messages. To address this issue, Cui et al. [9] proposed conditional privacy-preserving authentication (CPPA) using edge computing for vehicular ad hoc networks (VANETs). In their scheme, TA can track and obtain the real identity of vehicles by analyzing the pseudonym extracted from their messages and revocation malicious vehicles. Liu et al. [10] provided a CPPA authentication scheme using short-term regional certificates. However, certificate exchange is a drawback in the authentication process. These PKI-based authentication schemes can improve the security of VANETs, but there are some obvious common defects. Firstly, the trusted authority needs to preload massive private/public keys and corresponding certificates in vehicles, which leads to some problems, such as limited vehicle storage, inefficient certificate management, and high deployment costs. Meanwhile, as the quantity of malicious vehicles grows, the speed and efficiency of searching for malicious vehicles in the Certificate Revocation List (CRL) will be affected.
In order to solve the issues in managing certificates, in 1984, Shamir [11] presented identity-based (ID-based) cryptography (IBC), which uses the user’s phone number or ID number as the public key and associates the user directly with the public key without the need for a certificate to associate the user identity with the public key. Thus, ID-based authentication protocols can solve the issues of certificate management. Zhang et al. [12] proposed an ID-based authentication scheme for VANETs and support batch verification. However, their scheme is not resistant to replay attacks and lacks non-repudiation. Liu et al. [13] also proposed an anonymous authentication protocol with batch verification for VANETs. Because these schemes use bilinear pairings and asymmetric encryption, they have high computational costs. In order to improve the efficiency, He et al. [14] designed an ID-based V2V and V2I authentication scheme without bilinear paring. Nevertheless, their scheme may divulge real identities, compromising privacy.
The design of lightweight cryptographic protocols has garnered attention from researchers because V2I authentication protocols based on public key cryptography or bilinear pairs require high computational complexity. In 2019, Ma et al. [15] presented a lightweight authentication scheme for VANETs without bilinear paring. In 2023, Saleem et al. [16] presented a lightweight physically secure authentication scheme in VANETs. Because RSU is installed in an unmanned environment, it is easy for attackers to capture and launch a series of attacks [17]; therefore, these two schemes cannot resist RSU captured attacks. Since PUF can effectively protect data stored in RSUs, some lightweight V2I authentication protocols based on PUF have been proposed. In 2021, Othman et al. [18] presented a physically secure CPPA scheme based on PUF and secret sharing. In 2023, Xie et al. [19] designed a V2I and V2V authentication CPPA scheme based on Elliptic Curve Cryptography (ECC) and PUF. Unfortunately, Xie et al.’s [19] scheme cannot achieve three-factor secrecy. Xu et al. [20] also presented a three-factor CPPA scheme in VANETs. Duan et al. [21] demonstrated that Xu et al.’s [20] protocol is insecure; in the presence of an untrustworthy RSU, it has the ability to circumvent the Trusted Authority (TA) and establish a session key directly with the vehicle. To solve this issue, Duan et al. [21] proposed an improved scheme. However, Duan et al.’s [21] scheme lacks untraceable, known-session key secrecy and three-factor secrecy.

3. Preliminaries

In this section, we will briefly introduce some of the tools used in this article, such as Elliptic Curve Cryptography (ECC), the Fuzzy Extractor, PUF, the Network Model, and the Attack Model.

3.1. Elliptic Curve Cryptography

F P represents the finite field and p represents a large prime number that denotes the size of a finite field. An elliptic curve E over the finite field F P is defined by y 2 = x 3 + a x + b ( m o d   p ) , where a , b F P , ( 4 a 3 + 27 b 2 ) ( m o d   p ) 0 . G is the additive group with prime order q . P is the generator of the addition group G . The infinity point O and the points of the curve form an elliptic curve additive group G . The difficult problems based on curves are shown below.
  • Elliptic Curve Discrete Logarithm Problem (ECDLP): The random points Q = x P on E , where Q , P G , and x Z q * . The computation of x is hard in polynomial time.
  • Computational Diffie–Hellman Problem (CDHP): The random point Q = x P and R = y P on E , where Q , R , P G and x , y Z q * . The computation of x y P G is hard in a polynomial time when x and y are two unknown random numbers.

3.2. Fuzzy Extractor

We utilize a fuzzy extractor (FE) to transform biometric information into a uniformly random string, which is then used as the biometric key. This algorithm has two operations to function properly: G e n ( ) and R e p ( ) [22]. G e n ( ) is a fuzzy extractor probabilistic generation function, which inputs biometric template B I O v and then outputs binary B S K v { 0,1 } and a helper ε v { 0,1 } * . We can generate biometric key pair G e n B I O v = { B S K v , ε v } using the biometric template by fuzzy extraction algorithm. The B S K v string is kept confidential, while ε v is also stored. R e p ( ) is a fuzzy extractor deterministic reproduction function. To recover biometric key B S K v , the second operation R e p B I O v , ε v = B S K v is employed to use the factors ε v and B I O v .

3.3. Physical Unclonable Function

We utilize the Physical Unclonable Function (PUF) to assist in securely storing secret parameters within the RSU. PUF is a hardware implementation circuit that utilizes chip characteristics to achieve unique, non-replicable, instance-specific functions [23]. As PUFs are generated during the chip manufacturing process, incorporating multiple random parameters, this guarantees its randomness and uncertainty. It establishes a unique relationship between the challenge C and response R signals by utilizing process parameter deviations in chip manufacturing, expressed as R = P U F ( C ) , and can be regarded as a one-way function. In simpler terms, each integrated circuit has a distinct PUF, which means that no two circuits produce the same response ( R ) for the same challenge ( C ). This unique combination of challenge and response is referred to as a challenge–response pair.
Presently, PUF has gained significant usage in delivering essential security services, particularly authentication and key generation, within constrained environments like the Internet of Things (IoT). These contexts often demand a delicate equilibrium between power consumption and security. In numerous applications, PUF primarily serves the purpose of authenticating IoT devices and securely storing cryptographic keys. This is mainly because PUF has the following characteristics:
  • Each physical device can provide a unique challenge–response pair, even when the same input challenge bits are used [24];
  • Any attempt to alter the behavior of the device will impact the PUF outcomes and render the PUF inoperable [25];
  • PUF can be regarded as a one-way function, which greatly guarantees safety features [26].

3.4. Network Model

The network model includes the Trusted Authority (TA), Roadside Units (RSUs) and vehicle (OBU). The notations used in the paper are organized and presented in Table 1.
  • Trusted Authority (TA): The TA can initialize the system and register the RSU and vehicle. In case of malicious activities, only the Trusted Authority (TA) has the ability to reveal the true identity of the vehicle.
  • Roadside Units (RSUs): The RSUs are a series of roadside base stations that assist the TA in authentication and share information with the vehicle after negotiating the session key with the vehicle. In addition, the PUF is installed on the RSU.
  • Vehicle (OBU): The OBU is deployed in the vehicle. The OBU is responsible for computation and communication with the vehicle and RSUs via wireless channels.

3.5. Attack Model

We assume that the TA is fully trusted and RSUs are honest and curious (semi-trusted). RSU may attempt to know private details regarding the vehicle, such as the real identity, location, trajectory, and so on. The Dolev–Yao (DY) adversary model [27] is widely used in the analysis of wireless network security. This model makes the following assumptions:
  • The adversary has the capability to intercept messages transmitted over insecure wireless channels. By analyzing the intercepted messages, the adversary can forge valid messages as well as insert or modify the original messages.
  • The adversary can steal valid users’ smart cards and sensing devices and gain access to stored values.
  • The adversary can launch guessing, known specific session information, impersonation, and session key disclosure attacks based on the obtained values.

4. Review of a V2I Authentication Scheme

This section presents a brief review of Kumar et al.’s scheme [5].

4.1. System Initialization

Firstly, each RSU inputs its unique real identity I D r to TA. TA randomly chooses a fresh number α i where i 1 m , α 1 α 2 α m . Then, TA calculates a group of pseudo identities R I D i = E K I D r I D T A α i ] and assigns { I D T A , R I D i , α i } to RSU. Then, TA stores h I D r K ) into its database but does not store them in plaintexts. At the beginning of every session, RSU reselects the R I D i , α i pair and updates the set of R I D i , α i pairs periodically to keep the R S U anonymous.

4.2. User Registration

Each V U sends its real identity I D v to TA for registration. TA randomly chooses a fresh number β i where i [ 1 n ] , β 1 β 2 β n . Then, T A calculates a group of pseudo identities V I D i = E K I D v I D T A β i ] . T A initializes a counter as c t r = N 0 , N 0 Z p * . T A stores the tuple { h I D v K ) , c t r } into its database, but does not store them in plaintexts, and transmits S C = { I D T A , ( V I D i , β i ) , c t r } to V U . V U inputs its password P W v and computes parameters P I D = N 1 h ( I D v P W v ) and A I D = h I D v P W v N 1 ) . Finally, V U inserts these parameters into S C , which contains { I D T A , P I D , A I D , ( V I D i , β i ) , c t r } . At the beginning of every session, V U selects the ( V I D i , β i ) pair and updates the set of ( V I D i , β i ) pairs periodically to keep the V U anonymous.

4.3. User Login and Mutual Authentication

Under this phase, V U performs user login and mutual authentication with RSU through TA and generates the session key through the authentication process.
Step 1. OBU → RSU: m 1 = { V I D i , Q 1 , C 1 , c t r * }
V U inserts its S C into the OBU, and then inputs identity I D v and password P W v . Then, OBU calculates N 1 = P I D h ( I D v P W v ) and verifies A I D ? = h I D v P W v N 1 ) . If the verification is not valid, V U re-enters the login credentials until exceeding the m a x i m u m   l i m i t ( m a x ). If the login is successful, OBU randomly selects a ( V I D i , β i ) pair and chooses two fresh random numbers N 2 and N 3 . Then, OBU calculates C K V T = h I D v β i ) ,   Q 1 = C K V T h N 2 I D v ) and the verification parameter C 1 = h I D v h N 2 I D v ) C K V T c t r * ) , where c t r * = c t r + N 3 . Finally, V U transmits the service access request m 1 = { V I D i , Q 1 , C 1 , c t r * } to RSU.
Step 2. RSU → TA: m 2 = { V I D i , Q 1 , C 1 , R I D i , Q 2 , C 2 , c t r * }
While receiving messages from V U , RSU randomly chooses a R I D i , α i pair and generates a random number N 4 . Then, RSU calculates C K R T = h I D r α i ) , Q 2 = C K R T h N 4 I D r ) and C 2 = h ( I D r C K R T h N 4 I D r ) ) . Finally, RSU sends the message of authentication request m 2 = { V I D i , Q 1 , C 1 , R I D i , Q 2 , C 2 , c t r * } to a centralized TA.
Step 3. TA → RSU: m 3 = { R I D i * , V I D i * , Q 3 , Q 4 , Q 5 , Q 6 , C 3 , C 4 }
While receiving messages from RSU, TA checks whether c t r < c t r * is fresh or not. If not, TA rejects it. Otherwise, TA uses its secret key K to decrypt V I D i and R I D i , and obtains ( I D v , I D T A , β i ) and ( I D r , I D T A , α i ) , respectively. TA verifies whether h ( I D r K ) and h ( I D v K ) are available in its database or not. If not, the session is stopped. Otherwise, TA calculates C K V T = h I D v β i ) , C K R T = h I D r α i ) , h N 2 I D v ) = C K V T Q 1 and h N 4 I D r ) = C K R T Q 2 . Subsequently, TA updates c t r as c t r = c t r * on successful verification of C 2 ? = h ( I D r C K R T h N 4 I D r ) ) and further verifies C 1 ? = h I D v h N 2 I D v ) C K V T c t r * ) . TA computes α i * = N 5 , β i * = N 6 , R I D i * = E K I D r I D T A α i * ] , V I D i * = E K I D v I D T A β i * ] , Q 3 = N 2 N 7 C K R T I D v , Q 4 = N 4 N 7 C K V T I D r , Q 5 = h ( C K R T ) α i * and Q 6 = h ( C K V T ) β i * where N 5 , N 6 and N 7 are random numbers. TA calculates the verification parameters C 3 = h ( R I D i * ( N 2 N 7 I D v ) α i * ) and C 4 = h ( V I D i * ( N 4 N 7 I D r ) β i * c t r ) for RSU and VU, respectively. Finally, TA transmits the message of authentication response m 3 = { R I D i * , V I D i * , Q 3 , Q 4 , Q 5 , Q 6 , C 3 , C 4 } to RSU.
Step 4. RSU → OBU: m 4 = { V I D i * , Q 4 , Q 6 , C 4 , A u t h }
RSU computes ( N 2 N 7 I D v ) = Q 3 C K R T and α i * = Q 5 h ( C K R T ) . Subsequently, RSU computes the session key S K = h ( N 2 N 4 N 7 I D v I D r ) and verifies A u t h ? = h ( S K c t r * ) and C 3 ? = h ( R I D i * ( N 2 N 7 I D v ) α i * ) . Finally, RSU updates R I D i n e w = R I D i * , α i n e w = α i * and transmits m 4 = { V I D i * , Q 4 , Q 6 , C 4 , A u t h } to V U .
Step 5. S e s s i o n   k e y   a g r e e m e n t : V U computes ( N 4 N 7 I D r ) = Q 4 C K V T , β i * = Q 6 h ( C K V T ) and verifies C 4 ? = h ( V I D i * ( N 4 N 7 I D r ) β i * c t r * ) . If the verification is successful, V U computes a session key S K = h ( N 2 N 4 N 7 I D v I D r ) and updates V I D i n e w = V I D i * , β i n e w = β i * and verifies A u t h ? = h ( S K c t r * ) . If the verification is successful, V U accepts the session key S K and continues the communication process; otherwise, the process is repeated.

5. Security Analysis of a V2I Authentication Scheme

In the section, we show some attacks on Kumar et al.’s [5] scheme.

5.1. Side-Channel Attacks

If the attacker steals the information in the user’s smart card through side-channel attacks and obtains the authentication information m 1 sent by the user, then the attacker can launch identity guessing attacks and impersonation attacks and can compute the session key.
  • Identity guessing attacks/no anonymity: If an attacker knows the information { I D T A , P I D , A I D , ( V I D i , β i ) , c t r } in a user’s smart card through side-channel attacks, and the authentication information m 1 = { V I D i , Q 1 , C 1 , c t r * } transmitted via the public channel, where C K V T = h I D v β i ) , Q 1 = C K V T h N 2 I D v ) and C 1 = h I D v h N 2 I D v ) C K V T c t r * ) , then the adversary can guess I D v and find β i based on V I D i , compute C K V T = h I D v β i ) , h N 2 I D v ) = C K V T Q 1 , and verify whether C 1 = h I D v h N 2 I D v ) C K V T c t r * ) is correct or not. If yes, the guessed I D v is correct. Therefore, their scheme cannot achieve anonymity.
  • No session key secrecy: Once the adversary can know the user’s identity I D v and C K V T from the above analysis and can obtain m 4 = { V I D i * , Q 4 , Q 6 , C 4 , A u t h } from the public channel, then the adversary can compute ( N 4 N 7 I D r ) = Q 4 C K V T , β i * = Q 6 h ( C K V T ) and verifies whether C 4 = h ( V I D i * ( N 4 N 7 I D r ) β i * c t r * ) is correct or not. After successful verification, the adversary can calculate the session key S K = h ( N 2 N 4 N 7 I D v I D r ) .
  • Impersonation attacks: According to the above analysis, the adversary can know { I D T A , P I D , A I D , ( V I D i , β i ) , c t r } stored in smart card and can obtain user’s identity I D v and C K V T , then they can launch impersonation attacks. The adversary randomly selects ( V I D i , β i ) , selects two fresh random numbers N 2 and N 3 , and computes C K V T = h I D v β i ) , Q 1 = C K V T h N 2 I D v ) and the verification parameter C 1 = h I D v h N 2 I D v ) C K V T c t r * ) , where c t r * = c t r + N 3 . Finally, the adversary transmits the service access request m 1 = { V I D i , Q 1 , C 1 , c t r * } to R S U . Obviously, it can pass through the authentication of TA and can establish the session key. So, their scheme is not resistant to impersonation attacks.
Remark 1.
The reasons why Kumar et al.’s scheme suffers from these attacks are that once the attacker can obtain information stored in the smart card through side channel attacks, the attacker can guess the user’s identity, and the authentication request depends on the unencrypted information stored in the smart card and the user’s identity. On the other hand, the generation of session key in their scheme does not use Diffie–Hellman value.

5.2. RSU Captured Attacks

Suppose the adversary captures a RSU and obtains the stored information { I D T A , ( R I D i , α i ) } . For the message m 3 = { R I D i * , V I D i * , Q 3 , Q 4 , Q 5 , Q 6 , C 3 , C 4 } , N 7 C K V T = Q 4 I D r N 4 , where N 7 and N 4 are the random numbers selected by TA and RSU, respectively, I D r is RSU’s identity. RSU calculates N 2 N 7 I D v = Q 3 C K R T , which can be translated to N 2 I D v C K V T = Q 3 C K R T Q 4 I D r N 4 , in 5.1, C K V T = Q 1 N 2 I D v ) ; therefore, N 2 I D v C K V T = N 2 I D v Q 1 N 2 I D v ) , N 2 I D v N 2 I D v ) = Q 3 C K R T Q 4 I D r N 4 Q 1 , where Q 3 , C K R T , Q 4 , I D r , N 4 , and Q 1 are RSU’s known parameters, and the length of identity I D v is shorter than the random number N 2 , in the output of N 2 I D v N 2 I D v ) , I D v is easy to be recovered. So, their scheme cannot achieve user anonymity.
On the other hand, the adversary can also compute the session keys of all users authenticated with the captured RSU.
Remark 2.
The reason why their scheme suffers from this attack is because the secret values in RSU are not well protected due to, for instance, not using a physically unclonable function.

5.3. No Perfect Forward Secrecy

Suppose the adversary obtains the long-term key K , they can recover N 2 , N 4 , N 7 , I D v , and I D r from the messages transmitted publicly. Therefore, the previous and subsequent session keys S K = h ( N 2 N 4 N 7 I D v I D r ) can be calculated. The protocol has no perfect forward secrecy.
Remark 3.
The reason why their scheme cannot achieve perfect forward secrecy is that the generation of session key in their scheme does not use the Diffie–Hellman value.

6. Proposed Scheme

In this section, we introduce the proposed scheme. It is divided into six stages: system initialization, RSU registration, user registration, user login and authentication, password and biometric change, and malicious user tracking.

6.1. System Initialization

Firstly, TA chooses the cyclic additive group G with order of p and a generator P . TA chooses an elliptic curve E : y 2 = X 3 + i X + j ( m o d   p ) , where i , j Z p * . TA chooses a secure one-way hash function h ( ) . TA randomly chooses a secret number K Z q * as the system’s primary key.

6.2. RSU Registration

TA generates secret numbers x r Z q * and calculates the P p u b = x r P as the corresponding public keys. TA chooses I D r as the identity of RSU and computes P S I D r = h ( I D r K ) . Through a secure channel, TA uploads these parameters { x r , I D r , P S I D r } into RSU. RSU randomly chooses challenge C r to generate their corresponding response R r = P U F C r . Then, RSU selects a random number t r and calculates s k r = x r h ( R r t r ) , P D r = P S I D r h ( t r R r ) and stores < C r , s k r , I D r , P D r , t r > .
Remark 4.
The reason for deploying PUF in RSUs and protecting their secret values with PUF is to resist RSU captured attacks.

6.3. User Registration

The V U chooses ( I D v , P W v ) and submits I D v to TA via a secure channel. TA generates a random number y v and timestamp t v for each V U and TA computes P I D v = E K I D v y v t v ] , A v = h ( I D v K ) and responses ( P I D v , A v ) to V U via a secure channel. V U inputs their biometric information B I O v on the reader to obtain { B S K v , ε v } = G E N ( B I O v ) , and computes C v = h I D v , P W v , B S K v m o d   n , P P I D v = P I D v h P W v , I D v , B S K v , P A v = A v h P W v , B S K v , I D v , where n ( 2 4 , 2 8 ) , and stores < G , p , P , ε v , C v , P P I D v , h , P A v > into a Smart Card (SC).
Remark 5.
The reason for taking the modulus n in the verification equation C v = h I D v , P W v , B S K v m o d   n  is to resist side channel attacks. Even if the attacker’s guessed identity and password can pass verification, when n = 256, there are 2 32 pairs of identities and passwords, and the attacker cannot know which pair is correct. Meanwhile, it can achieve three-factor secrecy. On the other hand, the advantage of using the Fuzzy Extractor algorithm is that even if the user inputs a small difference in biometric information compared to the previous one, the same biometric key can still be restored.

6.4. User Login and Authentication

Firstly, User V U inserts the SC into OBU of vehicle and inputs the I D v * , P W v * , and biometric information B I O v * . The SC extracts B S K v * = R e p ( B I O v * , ε v ) and checks whether C v = h I D v * , P W v * , B S K v * m o d   n or not, where n ( 2 4 , 2 8 ) . If not, SC terminates login process. Otherwise, SC computes P I D v * = P P I D v h P W v * , I D v * , B S K v * , A v * = P A v h P W v * , B S K v * , I D v * , and performs the authentication process. Figure 2 describes this process.
Step 1. OBU → RSU: { C I D v , D I D v , M 1 , R 0 , t 0 }
The OBU chooses a random number r , d and computes R 0 = r P , R 1 = r P p u b , computes the dynamic identity D I D v = P I D v * h ( R 1 t 0 ) , C I D v = d h ( t 0 R 1 ) , M 1 = h d , I D v * , P I D v * , D I D v , A v * , t 0 , I D r , where t 0 is timestamp. Then, OBU sends { C I D v , D I D v , M 1 , R 0 , t 0 } to RSU on the public channel.
Step 2. RSU → TA: { I D r , D I D v , A I D v , M 1 , t 0 , t 1 }
While receiving the message from OBU, the RSU firstly checks the freshness of t 0 . If the t 0 is fresh, the authentication continues; otherwise, RSU drops the message. The RSU computes R r = P U F C r and recovers private key x r = s k r h ( R r t r ) and P S I D r = P D r h ( t r R r ) . The RSU calculates R 1 = x r R 0 , P I D v * = D I D v h ( R 1 t 0 ) , d = C I D v h ( t 0 R 1 ) . The RSU computes A I D v = h ( t 1 D I D v P S I D r ) ( P I D v * d ) , where t 1 is timestamp. Now, the RSU sends the message { I D r , D I D v , A I D v , M 1 , t 0 , t 1 } to the TA.
Step 3. TA → RSU: { B I D v , t 2 }
After TA receives the message from RSU, it first checks the freshness of t 1 . Then, TA computes P S I D r = h ( I D r K ) , P I D v * d = h t 1 D I D v P S I D r A I D v , and uses system key K to decrypt P I D v * , and obtains I D v y v t v = D K [ P I D v * ] and computes A v * = h I D v K . TA verifies whether M 1 = h ( d , I D v , P I D v * , D I D v , A v * , t 0 , I D r ) is right or not. If yes, TA computes B I D v = h ( P I D v * P S I D r t 2 ) , where t 2 is timestamp. After that, TA sends { B I D v , t 2 } to RSU.
Step 4. RSU → OBU: { M 2 , R 2 , t 3 }
While receiving the message from TA, RSU checks the freshness of t 2 and verifies whether B I D v = h ( P I D v * P S I D r t 2 ) is right or not. If the equation holds, RSU chooses a random number s and computes R 2 = s P , S K = h ( d , R 0 , R 2 , ( s R 0 ) , P I D v * , I D r ) , M 2 = h ( S K , t 3 , t 0 ) , where t 3 is the timestamp. The RSU sends the message { M 2 , R 2 , t 3 } to OBU.
Step 5. After receiving the message from RSU, OBU checks the freshness of t 3 , and computes S K = h ( d , R 0 , R 2 , ( r R 2 ) , P I D v * , I D r ) , and verifies whether M 2 = h ( S K , t 3 , t 0 ) is right or not. If yes, OBU and RSU share the session key S K .
Remark 6.
The purpose of using the Diffie–Hellman value when generating a session key is to achieve perfect forward secrecy.

6.5. Password Renewal and Biometric Change

If V U want to change their password or hand over the vehicle to another user, V U will follow the steps outlined below to change its biometric key.
The V U inserts SC into OBU and inputs the identity I D v * , password P W v * and biometric information B I O v * . The SC extracts B S K v * = R e p ( B I O v * , ε v ) . Then, SC verifies C v ? = h ( I D v * , P W v * , B S K v * ) . If the equation is valid, V U is allowed to renew their password and biometric key; otherwise, it stops the process. If V U wants to change their password, the SC computes the P I D v = P P I D v h P W v * , I D v * , B S K v * , A v = P A v h P W v * , B S K v * , I D v * , C v N e w = h ( I D v * , P W v N e w * , B S K v * ) ,   P P I D v N e w = P I D v h P W v N e w * , I D v * , B S K v * , P A v N e w = A v h P W v N e w * , B S K v * , I D v * . The SC replaces the values of C v , P P I D v , P A v with C v N e w , P P I D v N e w , P A v N e w and stores these into memory.
If V U wants to give the vehicle temporarily to another V U N e w , they need to change the biometric key. V U N e w inputs their biometric information B I O v N e w to obtain { B S K v N e w , ε v N e w } = G e n ( B I O v N e w ) via the fuzzy extractor. SC calculates C v N e w = h ( I D v * , P W v * , B S K v N e w ) , P P I D v N e w = P I D v h P W v * , I D v * , B S K v N e w , and P A v N e w = A v h P W v * , B S K v N e w , I D v * and replaces ( ε v , C v , P P I D v , P A v ) in memory with ( ε v N e w , C v N e w , P P I D v N e w , P A v N e w ) .

6.6. Malicious User Tracking

After the RSU and a vehicle completing the mutual authentication and sharing a session key, they are able to encrypt traffic information through session key S K for information transmission. Once RSU detects malicious behavior of the vehicle, it computes the M P = P I D v * h ( P S I D r t 4 ) , M 3 = h ( M B , P I D v * , P S I D r , t 4 ) and sends { I D r , M P , M 3 , t 4 , M B } to TA, where M B means the message of malicious behavior. While receiving a message from the RSU, TA checks the freshness of t 4 and calculates P S I D r = h I D r K , P I D v * = M P h ( P S I D r t 4 ) , and verifies whether M 3 = h ( M B , P I D v * , P S I D r , t 4 ) is right or not. If yes, TA computes I D v y v t v = D K [ P I D v * ] , and knows the identity of the malicious vehicle.

7. Security Analysis

7.1. Formal Security Proof

In this section, we provide a formal proof of the semantic security of the proposed protocol, utilizing the random oracle model.
Definition 1.
(Participants): The participants consist of the Vehicle User ( V U ), RSU and TA. In the i _ t h instance, the participants are represented as I N V U i , I N R S U i , and I N T A i
Definition 2.
(States): The status of oracle Accept indicates that it received the correct message.
Definition 3.
(Partnering): If the oracles I N V U i , and  I N R S U i are in the “Accept” state and the session keys have been successfully agreed upon, the oracles obtain their respective session identities and participant identities. The oracles can be considered partners if their session keys, session identities, and participant identities are all identical.
In this model, the adversary A has access to the following queries:
  • Queries: The queries simulate the capabilities of attackers, replicating their potential actions and abilities.
  • E x e c u t e ( I N V U i , I N R S U i , I N T A i ) : The adversary A has the capability to intercept all the messages exchanged over the wireless channel.
  • S e n d ( I N V U i , I N R S U i , I N T A i , m ) : A has the ability to forge the message m and sends it to I N V U i , I N R S U i , or I N T A i ; if the message m is valid, I N V U i , I N R S U i , or I N T A i will provide a response A .
  • R e v e a l ( I N V U i , I N R S U i , I N T A i ) : A can obtain the agreed session keys between I N V U i , I N R S U i , and I N T A i .
  • T e s t ( I N V U i , I N R S U i , I N T A i , r ) : This query can be executed at most once, generating a random bit r , This query can be executed at most once, generating a random bit r , which returns the real session key if r = 1 ; otherwise, a random number is returned.
  • C o r r u p t ( I N V U i ) : It simulates a side channel attack on the SC and returns the stored values < G , p , P , ε v , C v , P P I D v , h , P A v > .
  • C o r r u p t R S U ( I N R S U i ) : It simulates a side channel attack on the TPD of RSU and returns the stored information < C r , s k r , I D r , P D r , t r > .
Definition 4.
(Freshness): An instance can be deemed fresh if it fulfills the following conditions:
  • I N V U i ,   I N R S U i , and  I N T A i  are in Accept.
  • The query  R e v e a l ( I N V U i , I N R S U i , I N T A i )  has not been executed.
  • The queries  C o r r u p t ( I N V U i )  and  C o r r u p t R S U ( I N R S U i )  has been executed at most once.
Definition 5.
(Semantic security):  A  can only execute T e s t ( I N V U i , I N R S U i , I N T A i , r ) at most once and can make multiple additional queries to validate the accuracy of the return value from T e s t ( I N V U i , I N R S U i , I N T A i , r ) . That is, A guesses the random bit r generated by T e s t . The possibility is A d v P A = | 2 Pr s u c A 1 | , A d v P A < η denotes the protocol is secure, where η is sufficiently small.
Theorem 1.
The advantage of obtaining the session key in polynomial time by A is A d v P A q H 2 2 l H + q S + q E 2 n + q S 2 l b i o 1 + 2 q S A d v P U F A + 2 A d v E C D L P A . Where q H , q S and q E denote the numbers of executing Hash, Send and Execute, respectively. l H , n , and l b i o are the length of hash, the number of transcripts, and the length of biological key, respectively. The advantage of breaking PUF and ECDLP by  A  are  A d v P U F A  and  A d v E C D L P A , respectively.
Proof. 
The games G a m e i ( 0 i 4 ) are defined to simulate the attacks initiated by A . The variable W i n i ( 0 i 4 ) represents A ’s success in guessing the random bit r in the G a m e i . □
The games are defined as follows:
  • G a m e 0 : In this game, we simulate the actual attacks initiated by A . Based on the given definition, we obtain the following results:
    A d v P A = | 2 Pr W i n 0 1 |
  • G a m e 1 : In this game, we simulate eavesdropping attacks where A has access to all the messages transmitted publicly. Then, A obtains all the messages transmitted between I N V U i , I N R S U i , and I N T A i by executing E x e c u t e ( I N V U i , I N R S U i , I N T A i ) . Then, A executes T e s t ( I N V U i , I N R S U i , I N T A i , r ) and attempts to guess whether the returned value corresponds to the session key. However, due to the presence of random numbers and ECDLP, the attacker is unable to determine the correlation between the captured messages and the session keys. Thus, we obtain the following:
    Pr W i n 0 = Pr W i n 1
  • G a m e 2 : In this game, we simulate collision attacks on the transcripts and hash results. According to the definition of the birthday paradox, the probability of a hash collision is less than q H 2 2 l H + 1 , and the collision probability of other transcripts is less than ( q S + q E ) 2 2 n . Thus, we have:
    Pr W i n 2 Pr W i n 1 q H 2 2 l H + 1 + ( q S + q E ) 2 2 n
  • G a m e 3 : This game simulates that A executes C o r r u p t ( I N V U i ) and C o r r u p t R S U ( I N R S U i ) to gain the stored information < G , p , P , ε v , C v , P P I D v , h , P A v > in the SC and < C r , s k r , I D r , P D r , t r > in RSU, where C v = h I D v , P W v , B S K v m o d   n , P P I D v = P I D v h P W v , I D v , B S K v , P A v = A v h P W v , B S K v , I D v , where n ( 2 4 , 2 8 ) and B S K v is the biometric key. In addition, s k r = x r h ( R r t r ) , P D r = P S I D r h ( t r R r ) , and R r = P U F C r . If A wants to gain these parameters, they must guess the biological key B S K v or break PUF. Let us assume that the probability of A successfully breaking the PUF is denoted as A d v P U F A . Thus, we have:
    Pr W i n 3 Pr W i n 2 q S ( 1 2 l b i o + A d v P U F A )
  • G a m e 4 : A can obtain R 0 = r P , R 2 = s P through the public channel, which are utilized for session key agreements based on the ECDLP. The simulation in the game assumes that A calculates the session keys based on the transcripts. We have:
    Pr W i n 4 Pr W i n 3 A d v E C D L P A
    Since the session keys are generated independently and randomly, the advantage of guessing the value r is equivalent to guessing the session key itself. We have:
    Pr W i n 4 = 1 2
    Combining the above formulas, we have:
    1 2 A d v P A = Pr W i n 0 1 2 q H 2 2 l H + 1 + q S + q E 2 2 n + q S 1 2 l b i o + A d v P U F A + A d v E C D L P A
    A d v P A q H 2 2 l H + q S + q E 2 n + q S 2 l b i o 1 + 2 q S A d v P U F A + 2 A d v E C D L P A

7.2. Informal Security Analysis

During this phase, we employ an informal security analysis to demonstrate the robustness of our proposed scheme against a range of well-known attacks.
  • Anonymity and unlinkability: In the user authentication of our scheme, the OBU sends the dynamic identity D I D v = P I D v * h ( R 1 t 0 ) instead of real identity I D v on the wireless channel. The adversary may listen and intercept information from the common channel to obtain D I D v , but it cannot obtain I D v because it is hidden in a pseudonym P I D v and only TA can decrypt P I D v , and D I D v includes a one-way hash function, a random number, and other parameters. Moreover, the RSU only knows the pseudonym P I D v * = D I D v h ( R 1 t 0 ) and does not know the real identity I D v of the vehicle during the authentication process. Even if the RSU is dishonest, it is not a privacy breach. In addition, the authentication messages { C I D v , D I D v , M 1 , R 0 , t 0 } in each session are different because they are all made up of random numbers, timestamps, and other parameters. Thus, the protocol provides user anonymity and unlinkability.
  • Perfect forward secrecy: In proposed scheme, the session key S K = h ( d , R 0 , R 2 , ( s R 0 ) , P I D v * , I D r ) = h ( d , R 0 , R 2 , ( r R 2 ) , P I D v * , I D r ) are composed of random number d , ECDLP R 0 = r P , R 2 = k P , and CDHP ( s R 0 ) or ( r R 2 ) , the pseudonym of vehicle P I D v * and identity of RSU I D r . Even if the attacker A knows these parameters and the current S K , A cannot obtain random numbers and cannot compute previous or future session keys. Thus, the scheme has perfect forward secrecy.
  • Known key secrecy: In our scheme, the session key S K = h ( d , R 0 , R 2 , ( s R 0 ) , P I D v * , I D r ) = h ( d , R 0 , R 2 , ( r R 2 ) , P I D v * , I D r ) is based on a random number, ECDLP, Diffie–Hellman, and one-way hash function. Even if the attacker A gains the session key, they cannot obtain any long-term keys.
  • Replay attacks: In our scheme, every message that is sent via the wireless channel contains random numbers and timestamps to ensure the integrity and freshness of the message. For example, in the user authentication phase, the sent message is { C I D v , D I D v , M 1 , R 0 , t 0 } , where R 0 = r P ( r is random number), C I D v = d h ( t 0 R 1 ) ( d is random number), D I D v = P I D v h ( R 1 t 0 ) , M 1 = h ( d , I D v * , P I D v * , D I D v , A v * , t 0 , I D r ) and t 0 (timestamp). So, the proposed scheme has the ability to resist replay attacks.
  • Password guessing attacks: If A can know the user’s biometric template B I O v and all information stored in smart card, it can guess I D v * and P W v * such that C v = h I D v * , P W v * , B S K v m o d   n . However, there are D P W D I D / n 2 32 candidates of the ( I D v , P W v ) pair to satisfy this equation when n = 256 [28]. Therefore, our protocol meets resistance password guessing attacks.
  • Three-factory secrecy: If A obtains the date from the smart card through side-channel attacks and knows the user’s B I O v , and cannot know the correct ( I D v , P W v ) , A cannot launch any attacks without knowing P I D v and A v . For the same reasons, if A knows the user’s ( B I O v , P W v ) , or knows the user’s P W v and information stored in the smart card, A still cannot launch any attacks. Thus, the proposed protocol can achieve three-factor secrecy.
  • Identity guessing attacks: In our scheme, { C I D v , D I D v , M 1 , R 0 , t 0 } , { I D r , D I D v , A I D v , M 1 , t 0 , t 1 } , { B I D v , t 2 } are transmitted via the wireless channel, and < G , p , P , ε v , C v , P P I D v , h , P A v > stored into a smart card. Even if the attacker A eavesdrops and obtains these messages, A cannot verify the guessed identity. Because these messages not only contain identity but also include random numbers, the passwords and biometric keys, such as M 1 = h ( d , I D v * , P I D v * , D I D v , A v * , t 0 , I D r ) ( d is random number), D I D v = P I D v * h ( R 1 t 0 ) , P I D v * = P P I D v h P W v * , I D v * , B S K v * , A v * = P A v h P W v * , B S K v * , I D v * , P W v * is the password and B S K v * is the biometric key. Thus, A is unable to verify the accuracy of the guessed identity without having knowledge of P I D v * , P W v * and B S K v * .
  • Forgery attacks and impersonation attacks: Suppose the attacker A impersonates user U i and sends message { C I D v , D I D v , M 1 , R 0 , t 0 } to RSU, where R 0 = r P , D I D v = P I D v * h ( R 1 t 0 ) , R 1 = r P p u b , M 1 = h ( d , I D v * , P I D v * , D I D v , A v * , t 0 , I D r ) , P I D v * = P P I D v h P W v * , I D v * , B S K v * , A v * = P A v h P W v * , B S K v * , I D v * . A cannot forge M 1 without knowing I D v * , P I D v * and A v * . If the attacker wants to know A v * , they must know the three-factor I D v * , password P W v * , and biometric key B S K v * at the same time, which is obviously impossible. Therefore, A cannot impersonate the user. Suppose the attacker A wants to impersonate RSU and sends { I D r , D I D v , A I D v , M 1 , t 0 , t 1 } to TA, where A I D v = h ( t 1 D I D v P S I D r ) ( P I D v * d ) , P S I D r = P D r h ( t r R r ) , R r = P U F ( C r ) . Since the PUF is unique, even if the attacker A obtains Challenger C r , they cannot obtain R r and cannot compute the P S I D r . Thus, the attacker cannot impersonate the RSU without knowing P S I D r . Supposed the attacker A wants to impersonate TA and sends { B I D v , t 2 } , where B I D v = h ( P I D v * P S I D r t 2 ) , P S I D r = ( I D r K ) , K is the system’s primary key. Since A cannot know K , A cannot impersonate TA. Hence, our scheme effectively mitigates the risks of forgery attacks and impersonation attacks.
  • RSU captured attacks: In our scheme, RSU stores < C r , s k r , I D r , P D r , t r > , where C r is the corresponding challenge to generate a response of PUF. Suppose the attacker A captures the RSU and obtains the date < C r , s k r , I D r , P D r , t r > . Due to the characteristics of PUF, A cannot obtain the corresponding R r and cannot compute private key x r = s k r h ( R r t r ) and shared key P S I D r = P D r h ( t r R r ) . In simpler terms, capturing an RSU will yield no valuable information. Therefore, our protocol effectively withstands RSU capture attacks.

8. Performance Analysis

This section describes the security features and performance cost of this protocol compared with other protocols [5,15,16,21,29,30].
Table 2 provides a comprehensive analysis of the security comparison between our proposed scheme and other relevant schemes. It can be seen that our solution can achieve better security.
We compute the computation cost of the proposed protocol and the other related protocol. We use the environment of Windows 10 on a 64-bit laptop (CPU: Intel i5-6300; 4.00 GHz; RAM 16 GB). Table 3 shows the result of the execution time for various cryptographic operations, and Table 4 is the result of the communication cost for various primitive operations. Table 5 depicts the comparison of computation costs between some related protocols and ours, and Table 6 depicts the comparison of communication costs between some related protocols and ours. In general, our computational efficiency and communication efficiency are somewhat better than most related protocols. Although it can be the case that our solution takes slightly more time than some related solutions, it can achieve better security and with a lower communication cost.

9. Conclusions

In this paper, we conducted an initial analysis of the security of Kumar et al.’s scheme and pointed out some security vulnerabilities, as shown in Section 5. Subsequently, we proposed a novel PUF-based authentication and key agreement scheme between vehicles and RSUs that can effectively defend against traditional security threats and RSU captured attacks because of the characteristics of PUF. We also designed a conditional privacy-preserving and traceable message authentication strategy to regain the real identity of the malicious vehicle by the TA and support to tracking, which also achieved three-factor secrecy. Furthermore, we validated the security of our proposed protocol through a rigorous formal security analysis under the random oracle model. In comparison to other related protocols, our protocol demonstrates enhanced security measures, improved computational efficiency, and enhanced communication efficiency. However, the proposed protocol requires TA’s participation in the authentication process. When there are a large number of cars, TA’s computation and transmission will encounter bottlenecks. Therefore, in the future, we will design a protocol that does not require TA’s participation in the authentication process.

Author Contributions

Q.X., resources, writing—review and editing, supervision, funding acquisition; J.H., formal analysis, writing—original draft. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China (Grant No. LHZSZ24F020002) and the National Natural Science Foundation of China (Grant No. U21A20466).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ali, Q.E.; Ahmad, N.; Malik, A.H.; Ali, G.; Rehman, W.U. Issues, Challenges, and Research Opportunities in Intelligent Transport System for Security and Privacy. Appl. Sci. 2018, 8, 1964. [Google Scholar] [CrossRef]
  2. Xie, Q.; Ding, Z.; Tang, W.; He, D.; Tan, X. Provable secure and lightweight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs. IEEE Trans. Veh. Technol. 2023, 72, 15200–15212. [Google Scholar] [CrossRef]
  3. Zhou, F.; Li, Y.; Ding, Y. Practical V2I Secure Communication Schemes for Heterogeneous VANETs. Appl. Sci. 2019, 9, 3131. [Google Scholar] [CrossRef]
  4. Gupta, B.B.; Quamara, M. A taxonomy of various attacks on smart card–based applications and countermeasures. Concurr. Comput. Pract. Exp. 2021, 33, 1. [Google Scholar] [CrossRef]
  5. Kumar, P.; Om, H. A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network. J. Supercomput. 2022, 78, 17657–17688. [Google Scholar] [CrossRef]
  6. Raya, M.; Hubaux, J.P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef]
  7. Joshi, A.; Gaonkar, P.; Bapat, J. A reliable and secure approach for efficient car-to-car communication in intelligent transportation systems. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE, Chennai, India, 22–24 March 2017; pp. 1617–1620. [Google Scholar]
  8. Sun, Y.; Lu, R.; Lin, X.; Shen, X.; Su, J. An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 2010, 59, 3589–3603. [Google Scholar] [CrossRef]
  9. Cui, J.; Wei, L.; Zhang, J.; Xu, Y.; Zhong, H. An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2018, 20, 1621–1632. [Google Scholar] [CrossRef]
  10. Liu, Z.; Chong, L.; Peng, T.; Peng, D.-Y.; Liang, H.-B. A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 2018, 6, 26307–26317. [Google Scholar] [CrossRef]
  11. Shamir, A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84 4; Springer: Berlin/Heidelberg, Germany, 1985; pp. 47–53. [Google Scholar]
  12. Zhang, C.; Ho, P.H.; Tapolcai, J. On batch verification with group testing for vehicular communications. Wirel. Netw. 2011, 17, 1851–1865. [Google Scholar] [CrossRef]
  13. Liu, Y.; He, Z.; Zhao, S.; Wang, L. An efficient anonymous authentication protocol using batch operations for VANETs. Multimed. Tools Appl. 2016, 75, 17689–17709. [Google Scholar] [CrossRef]
  14. He, D.; Zeadally, S.; Xu, B.; Huang, X. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
  15. Ma, M.; He, D.; Wang, H.; Kumar, N.; Choo, K.K.R. An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J. 2019, 6, 8065–8075. [Google Scholar] [CrossRef]
  16. Saleem, M.A.; Li, X.; Ayub, M.F.; Shamshad, S.; Wu, F.; Abbas, H. An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network. IEEE Trans. Intell. Transp. Syst. 2023, 24, 9940–9951. [Google Scholar] [CrossRef]
  17. Xie, Q.Y.; Ding, Z.; Xie, Q. A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in IoT Environment. Mathematics 2023, 11, 3857. [Google Scholar] [CrossRef]
  18. Othman, W.; Fuyou, M.; Xue, K.; Hawbani, A. Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City. IEEE Trans. Veh. Technol. 2021, 70, 12902–12917. [Google Scholar] [CrossRef]
  19. Xie, Q.; Ding, Z.; Zheng, P. Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2023, 24, 7318–7327. [Google Scholar] [CrossRef]
  20. Xu, T.; Xu, C.; Xu, Z. An efficient three-factor privacy-preserving authentication and key agreement protocol for vehicular ad-hoc network. China Commun. 2021, 18, 315–331. [Google Scholar] [CrossRef]
  21. Duan, Z.; Mahmood, J.; Yang, Y.; Berwo, M.A.; Yassin, A.A.K.A.; Mumtaz Bhutta, M.N.; Chaudhry, S.A. TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs. Secur. Commun. Netw. 2022, 2022, 8259927. [Google Scholar] [CrossRef]
  22. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
  23. Maes, R.; Maes, R. Physically Unclonable Functions: Concept and Constructions; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  24. Aman, M.N.; Chua, K.C.; Sikdar, B. Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet Things J. 2017, 4, 1327–1340. [Google Scholar] [CrossRef]
  25. Frikken, K.B.; Blanton, M.; Atallah, M.J. Robust authentication using physically unclonable functions. In International Conference on Information Security; Springer: Berlin/Heidelberg, Germany, 2009; pp. 262–277. [Google Scholar]
  26. Chatterjee, U.; Chakraborty, R.S.; Mukhopadhyay, D. A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 2017, 16, 1–25. [Google Scholar] [CrossRef]
  27. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  28. Wang, D.; Wang, P. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secur. Comput. 2018, 15, 708–722. [Google Scholar] [CrossRef]
  29. Zhou, Y.; Long, X.; Chen, L.; Yang, Z. Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs. J. Inf. Secur. Appl. 2019, 47, 295–301. [Google Scholar] [CrossRef]
  30. Wu, T.-Y.; Lee, Z.; Yang, L.; Chen, C.-M. A provably secure authentication and key exchange protocol in vehicular ad hoc networks. Secur. Commun. Netw. 2021, 2021, 9944460. [Google Scholar] [CrossRef]
Figure 1. System architecture.
Figure 1. System architecture.
Applsci 14 02451 g001
Figure 2. User authentication phase of the proposed scheme.
Figure 2. User authentication phase of the proposed scheme.
Applsci 14 02451 g002
Table 1. List of notations.
Table 1. List of notations.
SymbolsMeaning
I D T A , I D r and I D v Identity of TA, RSU and V U , respectively
B I O v The biometric information of V U
P W v The password of V U
B S K v The biometric key of V U
ε v The reproduction parameter of V U
K The private key of TA
x r The private key of RSU
P p u b The public key of RSU
A The adversary or attacker
h ( . ) The collision resistance one hash function
E e / d ( . ) The symmetric encryption/decryption
The XOR operator
+ The normal addition operator
The concatenation operator
N i , i [ 0 7 ] The freshly generated random numbers
α i , i [ 1 m ] The nonzero positive random number
β i , i [ 1 n ] The nonzero positive random number
c t r The randomized counter
t 0 , t 1 , t 2 , t 3 , t 4 Timestamps
Table 2. Security comparison.
Table 2. Security comparison.
Properties/Attacks[5][15][16][21][29][30]Ours
Unlinkability
Mutual authentication
Anonymity
Conditional privacy preservation
Perfect forward secrecy
Session key secrecy
Known session key secrecy
Key agreement
N-factor secrecy-
Resist message modification
Resist impersonation attacks
Resist replay attacks
Resist password guessing attacks--
Resist identity guessing attacks-
Resist stolen SC attacks---
RSU captured attacks
Table 3. Execution time of cryptographic operations.
Table 3. Execution time of cryptographic operations.
NotationsDescriptionExecution Time (ms)
T s m Scalar multiplication2.610
T h General hash function0.019
T S Y Symmetric encryption/decryption0.511
Table 4. Communication cost of primitive operations.
Table 4. Communication cost of primitive operations.
Primitive OperationsCommunication Cost (bits)
Elliptic Curve Point256
Message256
identity of individual participant256
Hash function256
Timestamp32
Random number256
Symmetric encryption/decryptionAES-128
Table 5. Comparison of computation cost.
Table 5. Comparison of computation cost.
SchemesVehicleRSU/Fog NodeTA/Cloude ServerTotal (ms)
[5] 9 T h 7 T h 4 T S Y + 10 T h 2.538
[15] 3 T s m + 4 T h 4 T s m + 4 T h 10 T s m + 11 T h 44.731
[16] 1 T S Y + 1 T s m + 6 T h 3 T h 2 T S Y + 7 T h 3.425
[21] 3 T s m + 6 T h 3 T s m + 7 T h 2 T h 15.945
[29] 6 T s m + 4 T h 7 T s m + 5 T h 4 T s m + 5 T h 44.636
[30] 3 T s m + 8 T h 4 T s m + 6 T h 5 T s m + 8 T h 31.738
Ours 3 T s m + 5 T h 3 T s m + 8 T h 1 T S Y + 5 T h 16.513
Table 6. Comparison of communication cost.
Table 6. Comparison of communication cost.
SchemesVehicleRSU/Fog NodeTA/Cloude ServerTotal (bits)
[5]1536460830729216
[15]800268213124794
[16]1024332823046656
[21]105610882882432
[29]105621442883488
[30]80021448003744
Ours105616322882976
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xie, Q.; Huang, J. Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV. Appl. Sci. 2024, 14, 2451. https://doi.org/10.3390/app14062451

AMA Style

Xie Q, Huang J. Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV. Applied Sciences. 2024; 14(6):2451. https://doi.org/10.3390/app14062451

Chicago/Turabian Style

Xie, Qi, and Juanjuan Huang. 2024. "Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV" Applied Sciences 14, no. 6: 2451. https://doi.org/10.3390/app14062451

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop