Mutual V2I Multifactor Authentication Using PUFs in an Unsecure Multi-Hop Wi-Fi Environment
Abstract
1. Introduction
- 1.
- The dynamic nature of the network topology results from the mobility of the vehicles and the need for handover and continually authenticating vehicles that move into the coverage area.
- 2.
- Network scalability, where the number of vehicles and the extent of the coverage area vary from limited inside a municipality to very large for a highway. Handover of security certificates becomes necessary in the microscale of a city block, for example.
- 3.
- Heterogeneity due to use several types of network infrastructure and manufacturers of vehicles.
- 4.
- Identifying priorities and handling the different types of network traffic.
- 5.
- Detecting malicious vehicles or the onset of attacks on the infrastructure and the vehicles themselves.
- 6.
- Secret keys are typically stored in non-volatile random access memory (NVRAM), which can be attacked to extract the secret keys and duplicate them.
- 7.
- Secret keys cannot be static since this opens the doors to several types of attacks. Dynamic session keys are costly unless vehicles are equipped with physical unclonable functions (PUFs) [11].
1.1. Contributions
- 1.
- Using PUFs installed on each vehicle helps achieve mutual authentication between the vehicle and roadside unit (RSU), drones, etc.
- 2.
- Proposal of secure, anonymous and lightweight mutual authentication and key exchange protocols. The proposed protocol does not require clock synchronization, which is needed for timestamp-based mutual authentication protocols.
- 3.
- Proposal of a secure key exchange protocol between several vehicles in the same RSU coverage area to accomplish secure multi-hop packet store-and-forward Wi-Fi network.
- 4.
- Incorporation of freshness and presence properties in the proposed protocols to enhance security and prevent several impersonation attacks through context awareness and transaction history.
- 5.
- Evaluation of the proposed protocols using informal security analysis.
- 6.
- Evaluation of the proposed protocols using formal security analysis.
1.2. Organization of the Paper
2. Related Works
2.1. Cryptography-Based Protocols
2.2. Blockchain-Based Frameworks
2.3. Fog and Edge-Assisted Protocols
2.4. PUF-Based Authentication Protocols
2.5. Comparative Analysis and Research Gap
2.6. Our Contribution
- 1.
- Provides bi-directional authentication, securing both vehicles and RSUs against impersonation.
- 2.
- Natively supports multi-hop Wi-Fi forwarding, addressing the realities of vehicular connectivity.
- 3.
- Incorporates freshness and presence guarantees using nonces, temporary identifiers, and inductive proofs.
- 4.
- Introduces cloud-assisted CRP management to ensure scalability for large fleets.
3. Proposed Multihop Wi-Fi Authentication Scheme
- 1.
- The server obtains the challenge/response of a certain PUF from the device manufacturere (CRP).
- 2.
- The server selects a challenge c and its associated response r.
- 3.
- The server generates the helper data w, which is similar to forward error correction coding:
- 4.
- The server generates a hash using r to obtain a one-time password and a secret key
- 5.
- The server sends c and w to the client. Note that this does not reveal any secret information.
- 6.
- The client uses its PUF to obtain a noisy response .
- 7.
- The client removes the noise from the response using received w,
- 8.
- The client uses the noise-free response to generate the secret key and has a pair
- 9.
- The client sends to server to complete the authentication and key exchange.
- 10.
- The server compares its h with the received . If both match, then authentication and secret key exchange are deemed successful.
- 1.
- Pre-deployment phase;
- 2.
- Registration phase;
- 3.
- Vehicle login phase;
- 4.
- Multi-hop mutual authentication phase;
- 5.
- Multi-hop communication phase.
- 1.
- A coverage area is one that is served by an infrastructure device, e.g., an RSU, that can be considered a root-of-trust (RoT).
- 2.
- Not all vehicles have direct access to the infrastructure and must rely on a cooperative multi-hop message store-and-forward strategy.
- 3.
- Not all vehicles are trusted since some malicious vehicles might be present in the system
- 4.
- All trusted vehicles must have a PUF, or an equivalent synthetic set, to facilitate creation of a unique ID, generation of a secret key exchange, and mutual authentication between vehicles and the RSU.
3.1. Pre-Deployment Phase
3.1.1. Roadside Unit (RSU or R)
3.1.2. Pre-Deployment for Vehicles (V)
- 1.
- Identity ();
- 2.
- Password ();
- 3.
- Symmetric key .
| Listing 1. Vehicle pre-deployment phase. | ||||
| 1 | : | |||
| 2 | : | |||
| 3 | : | |||
| 4 | : | % Initialize | ||
| 5 | : | FOR DO | ||
| 6 | : | |||
| 7 | : | % Build CRP | ||
| 8 | : | END FOR | ||
| 9 | : | Public key communication | ||
3.2. Registration Phase
- 1.
- C will share its public key with the RSUs that register with it;
- 2.
- will share its public key with C;
- 3.
- will keep broadcasting a HELLO() message over its coverage area so that incoming vehicles are aware of the RSU public key to use when they desire to login, as discussed in Section 3.3.
3.3. Vehicle Login Phase
| Listing 2. Vehicle login to a roadside unit phase. | ||||
| 1 | : | % Generate a secret parameter | ||
| 2 | : | % Request registration | ||
| 3 | : | % Request parameters | ||
| 4 | : | |||
| 5 | R | : | ||
| 6 | R | : | IF | |
| 7 | : | Admit | % joins R’s coverage area | |
| 8 | : | END IF | ||
- Step 1: The vehicle prepares a unique hash () for multifactor authentication, ensuring freshness and presence.
- Step 2: The vehicle sends an encrypted message to R using the RSU public key that it obtained from R’s Hello() broadcast message.
- Step 3: The RSU encrypts a message to request vehicle credentials from C using C’s public key .
- Step 4: C sends vehicle credentials to R using RSU public key .
- Step 5: R independently calculates the hash ().
- Steps 6–8: R checks the has values to complete the login phase.
3.4. Multi-Hop Mutual Authentication Phase
3.5. Communication Phase
3.5.1. Direct Link Between Vehicle and RSU
- 1.
- Shared secret session key ;
- 2.
- Vehicle uses its temporary ID () to preserve its anonymity;
- 3.
- A nonce is shared during the login phase to ensure freshness and presence.
| Listing 3. Vehicle communicates with a roadside unit (RSU) when a direct link is available. | |||
| 1 | : | ||
| 2 | : | ||
| 3 | : | ||
| 4 | R | : | |
| 5 | : | ||
| 6 | : | ||
3.5.2. Indirect Link Between Vehicle and RSU
| Listing 4. Vehicle communication with a roadside unit (RSU) when a direct link is not available and the vehicle requests to transmit to the RSU via n intermediate nodes. | |||||
| 1 | : | % | |||
| 2 | : | % near | |||
| 3 | : | ||||
| 4.a | : | FOR DO | |||
| 4.b | : | ||||
| 4.c | : | ||||
| 4.b | : | ||||
| 4.c | : | END FOR | |||
| 5 | : | ||||
| 7 | R | : | |||
| 8 | : | ||||
| 9.a | R | : | |||
| 1 | R | : | |||
| 2 | : | ||||
| 9.b | : | ||||
| 9.c | : | FOR DO | |||
| 9.d | R | : | % augmented message | ||
| 9.e | : | END FOR | |||
| 10 | : | ||||
| 11.a | : | FOR DO | |||
| 11.a | : | ||||
| 11.b | : | ||||
| 11.a | : | END FOR | |||
3.6. Overall Protocol: Putting It All Together
| Algorithm 1: Multi-hop mutual authentication protocol using PUFs |
| Input: Vehicle with identity , password , secret , and PUF-generated CRPs ; RSU R; cloud authority C. Output: Secure session key established between and R, extendable to multi-hop forwarding. Phase 1: Pre-deployment (manufacturing/initialization) ; 1. Fab house generates CRP set for via its PUF. 2. Fab house sends to cloud authority C vehicles’ . 3. C stores in its CRP database, indexed by . Phase 2: Registration ; 4. RSU R establishes a TLS/PKI-secured link with C. 5. R broadcasts a HELLO and its public key to nearby vehicles. Phase 3: Login (vehicle → RSU) ; 6. generates and computes nonce . 7. sends to R 8. sends to RSU R. 9. If R is unreachable, is forwarded by neighboring authenticated vehicles (multi-hop). 10. R contacts C with the vehicle identity () 11. C sends to R the authentication dataset of vehicle Phase 4: Authentication and Key Establishment ; 12. R validates and selects a fresh challenge from . 13. R sends to over the secure channel. 14. generates a noisy response . 15. Using , corrects to recover . 16. computes . 17. sends back to R. 18. R verifies h against the expected hash using from C. 19. If valid, mutual authentication is successful. Otherwise, abort. 20. Both parties derive a session key . Phase 5: Multi-hop Extension (if R unreachable) ; 21. is relayed via authenticated neighbors until an RSU is reachable. 22. Each signs the forwarded packet with its session key to prevent tampering. 23. R issues acknowledgments along the reverse multi-hop path, establishing . Phase 6: Session Maintenance ; 24. Both and R periodically refresh session keys using new CRPs. Error Handling and Security Guarantees ; 25. Replay protection ensured via nonces and TIDs. 26. Forward secrecy is provided since CRPs are never reused. 27. Scalability achieved via cloud-managed CRP lifecycle. 28. Mutual trust guaranteed (vehicle ↔ RSU), extended to multi-hop. |
4. Security Analysis
4.1. Threat Model
- 1.
- Obtain the vehicle ID through eavesdropping or guessing the car model and ID sequence assignment.
- 2.
- Gain physical access to the vehicle in the field and extract any secret information from the memory.
- 3.
- Access the secret keys through reading the flash or solid-state drive (SSD).
- 4.
- Perform any side-channel attacks on the vehicle’s edge devices.
- 5.
- Corrupt the vehicle’s edge device contents to run malicious software.
4.2. Informal Verification
- 1.
- Tampering attack: Device tampering modifies the chip encapsulation layers. This modifies the PUF response and results in authentication failure.
- 2.
- Replay attack: The algorithm in Listing 3 uses nonces that change for each session. Using nonces ensures actual device presence and freshness.
- 3.
- Eavesdropping attack: Listings 3 and 4 of the proposed algorithms show that almost all messages are encrypted using dynamic secret keys. In addition, the algorithms in Listings 3 and 4 use encrypted messages using secret keys that change with every session.
- 4.
- Impersonation attack: According to the mutual authentication algorithm in Listings 3 and 4, vehicle authentication requires the vehicle to give the correct PUF CRP responses. An impersonating device cannot simply create its own PUF since the CRP set of this counterfeit PUF would not be registered by the device manufacturer, and no RSU would accept the counterfeit vehicle.
- 5.
- Man-in-the-midddle attack: Our communication is protected by at least four layers as follows:
- (a)
- Insisting that all vehicles are first authenticated via RSUs.
- (b)
- Using nonces.
- (c)
- Using dynamic secret keys where each communication session.
- (d)
- Extensive use of hashing.
A malicious vehicle will not be able to register with an RSU and will not be able to participate in any activity. - 6.
- Forward/backward secrecy: The secret keys for V2I and V2V modes rely on using nonces and change at the start of each session and after handover between femtocells. Thus, an attacker cannot learn past or future keys.
- 7.
- Session key guessing attack: In our protocols there are two session keys: between an RSU and vehicle between vehicle and . These keys can not be inferred since they are not stored in non-volatile random access memories (NVRAMs) and dynamically change through use of nonces.
- 8.
- Cloning attack: As was explained in Section 2.4, using a PUF gives the device a unique ID, and a challenge generates a unique ID.
- 9.
- Physical attack: Using PUFs eliminates the need to store secret keys in NVRAM. The PUF response is never revealed but is used to generate secret keys and hash values.
4.3. Formal Verification Using Inductive and Game-Based Proofs
4.4. Inductive Proof
- 1.
- Confidentiality
- Base Case:
Before any communication, the adversary has no knowledge of the session key. Let represent the adversary’s knowledge,- Inductive Step:
Assume confidentiality holds at step n, i.e., . At step , the RSU sends the encrypted session key to the vehicle,By the semantic security of encryption and the unclonability of the PUF, the adversary cannot learn , so- Conclusion:
By induction, confidentiality is preserved throughout the protocol. - 2.
- Mutual Authentication
- Base Case:
Initially, neither the vehicle nor the RSU has authenticated the other,- Inductive Step:
Assume that mutual authentication holds at step n. At step , the vehicle sends to the RSU. The RSU verifies the PUF response,Similarly, the vehicle authenticates the RSU,- Conclusion:
Mutual authentication is preserved by induction, - 3.
- Anonymity
- Base Case:
Initially, the adversary has no knowledge of the vehicle’s identity,- Inductive Step:
Assume anonymity holds at step n, i.e., the adversary cannot link the temporary ID (TID) to the real identity. In the next step, the vehicle uses a new , unlinkable to the real identity, so - 4.
- Replay Protection and Impersonation Resistance
- Replay Protection:
The use of fresh nonces and at each step ensures that replay attacks are impossible, i.e., the adversary cannot replay an old message successfully,- Impersonation Resistance:
PUF responses are unclonable, meaning the adversary cannot impersonate the vehicle or RSU,
4.5. Game-Based Proof
- 1.
- Confidentiality
- Game Definition:
The adversary wins if they can correctly guess the session key after intercepting the ciphertext .- Adversary’s Advantage:
The adversary’s advantage is the probability of guessing given the ciphertextBy the semantic security of encryption and the unclonability of the PUF, this probability is negligible, - 2.
- Mutual Authentication
- Game Definition:
The adversary wins if they can impersonate either the vehicle or RSU and fool the other party into authenticating them.- Adversary’s Advantage:
The adversary’s advantage is the probability of generating a valid PUF response,Since PUF responses are unclonable, this probability is negligible, - 3.
- Anonymity
- Game Definition:
The adversary wins if they can link the temporary ID (TID) to the vehicle’s real identity.- Adversary’s Advantage:
The adversary’s advantage is the probability of linking the to the real identity,Since the is unlinkable without the trusted mapping, this probability is negligible, - 4.
- Replay Protection and Impersonation Resistance
- Replay Protection:
The adversary’s advantage in performing a replay attack is negligible due to the use of fresh nonces,- Impersonation Resistance:
Since PUF responses are unclonable, the adversary cannot impersonate the vehicle or RSU,
- Confidentiality: The session key remains confidential.
- Mutual Authentication: Both the vehicle and RSU authenticate each other correctly.
- Anonymity: The vehicle’s real identity is protected through the use of temporary IDs.
- Replay Protection: Replay attacks are prevented by using fresh nonces.
- Impersonation Resistance: Adversaries cannot impersonate the vehicle or RSU.
4.6. Formal Proof Using BAN Logic
- Message meaning: If R believes that key k is shared with V and R receives m encrypted under k, then R believes that V once sent m.
- Nonce verification: If R believes m is fresh and R believes V once sent m, then R trusts m,
- Jurisdiction: If R believes V has jurisdiction over m and R trusts V trusts m, then R trusts m,
- Freshness concatenation: If part of a message is fresh, then the entire message is fresh too. In other words, if R trusts that is fresh, then R trusts that and are fresh,
- Trust rule: If R trusts and , then R trusts m,
- Session key:
- Goal 1:
- Goal 2:
- Goal 3:
- Goal 4:
- Goal 5:
- Goal 6:
- Goal 7:
- Goal 8:
- A1:
- A2:
- A3:
- A4:
- A5:
- A6:
- A7:
- A8:
- Message 1:
- Message 2:
- Message 3:
- Message 4:
- Message 5:
- S1: According to Msg 1, we can write
- S2: Based on Assumption A3, S1 and message-meaning rule, we have
- S3: According to Msg 2, we can write
- S4: Based on Assumption A4, S3 and message-meaning rule, we have
5. Discussion
- 1.
- Bi-directional Multi-hop Authentication: The protocol enables bi-directional authentication using PUF hardware tokens over unsecured multi-hop Wi-Fi links. This feature ensures that both the vehicle and the roadside unit (RSU) authenticate each other, even when communication occurs via intermediate relay vehicles. Previous V2I authentication schemes typically assumed direct, single-hop connectivity; our multi-hop extension fills this critical gap by enabling cooperative forwarding with maintained trust guarantees.
- 2.
- Cloud-based CRP Lifecycle Management: A cloud authority is integrated to manage the Challenge–Response Pair (CRP) lifecycle. This entity issues fresh challenges, prevents reuse, and coordinates revocation or renewal, eliminating finite CRP storage constraints on vehicles. Cloud-assisted oversight ensures centralized monitoring and scalability, supporting large fleets without sacrificing security continuity.
- 3.
- Formal Security Verification: We provide a formal security analysis based on established cryptographic verification tools. The model confirms resistance to replay, man-in-the-middle, impersonation, and PUF cloning attacks under realistic adversarial assumptions. Collectively, these contributions—multi-hop mutual authentication, cloud-assisted CRP management, and verified robustness—establish a new benchmark for lightweight, scalable V2I authentication frameworks.
- 4.
- Comparative Advantages: Relative to prior studies, the proposed protocol offers the following clear performance and design improvements:
- Lightweight Operation: By relying on symmetric primitives and PUF responses rather than PKI-based digital signatures, the protocol minimizes computational and latency overhead. While RSA-based methods incur hundreds of milliseconds of delay, the PUF-based challenge–response mechanism achieves sub-50 ms authentication.
- Mutual Trust Establishment: Both the vehicle and the RSU verify each other’s legitimacy, preventing impersonation in multi-hop environments where intermediate relays may be untrusted.
- Multi-hop Robustness: Unlike earlier PUF-Guard and similar frameworks [11], the proposed system explicitly supports relay-based multi-hop trust propagation.
- Multifactor Integration: Beyond the PUF, vehicle-specific identifiers or biometric traits can be fused to reinforce authentication strength.
- Cloud Oversight: The centralized cloud authority enables efficient CRP lifecycle management and scalability beyond localized trust zones.
6. Conclusions
7. Future Work
- 1.
- Implementation Roadmap. While the proposed protocol’s security has been formally proven, its practical performance must be demonstrated through simulation and prototyping. The planned implementation roadmap includes:
- Vehicle Nodes: Modeled as Mininet-WiFi stations representing vehicular OBUs with software-based PUF modules.
- RSUs: Simulated as Mininet access points using cloud-issued short-lived certificates.
- Cloud Authority: Operated as a Mininet controller responsible for CRP lifecycle management and challenge validation.
- PUF Simulation: Realized via software fuzzy extractors to emulate noise-resilient CRP generation [24].
- 2.
- Simulation Environment. We will employ Mininet-WiFi [32] integrated with SUMO [33] to emulate dynamic vehicular mobility and multi-hop wireless propagation. This setup enables realistic performance assessment under variable traffic densities, hop distances, and network loads. Mininet-WiFi is a widely used network emulator that extends the well-known Mininet environment to support wireless stations and access points with full mobility and multi-hop capabilities [32,34]. This makes it particularly well-suited for emulating vehicular ad hoc networks (VANETs) in software. Crucially, Mininet-WiFi can realistically model multi-hop Wi-Fi topologies akin to our scenario—for example, vehicles forwarding packets over multiple wireless hops to reach an RSU—while running real network protocols and applications. The platform also integrates with the SUMO traffic mobility simulator, allowing us to import realistic vehicle movement traces and road network layouts [35].This integration means we can recreate dynamic VANET scenarios (with vehicles joining, leaving, and moving between RSU coverage areas) and evaluate our authentication protocol under realistic mobility patterns. Another advantage is that Mininet-WiFi enables fine-grained measurement of network metrics. We will be able to measure latency (end-to-end and per-hop communication delay), authentication delay (time to complete our handshake), and system throughput under varying loads, all within a controlled, reproducible environment. It also scales to a significant number of virtual nodes, which will let us assess scalability (e.g., testing hundreds of simulated vehicles per RSU) before moving to real hardware. In summary, Mininet-WiFi offers an ideal balance of realism and flexibility—it has been employed in prior vehicular network research for prototyping V2X protocols. [32], and it provides the tools (mobility modeling, wireless channel emulation, etc.) needed to evaluate our multi-hop authentication scheme rigorously. We emphasize that this simulation-based evaluation is part of our future work plan, to be conducted in the next phase of the project, laying the groundwork for subsequent field testing. The implementation in Mininet-WiFi will not only validate the feasibility of our protocol in a complex network setting but also guide any optimizations before we proceed to hardware prototyping.
- 3.
- Evaluation Metrics. Performance will be evaluated using the following:
- Authentication Latency: End-to-end handshake delay, per hop and aggregate.
- Key Generation Time: Average CRP evaluation and validation duration.
- Communication Overhead: Number of messages and data exchanged.
- Scalability: Performance degradation with increasing node count.
- Robustness: Authentication success under packet loss, noise, or adversarial interference.
Preliminary projections indicate an authentication latency below 10 ms per hop, satisfying the sub-100 ms safety requirement for real-time VANET applications. - 4.
- Hardware Prototyping. Subsequent stages will involve deploying a hardware-in-the-loop prototype using FPGA-based PUF modules integrated into vehicular OBUs and RSUs (e.g., Raspberry Pi or Jetson Nano boards). This will enable the evaluation of end-to-end handshake efficiency, interoperability with IEEE 802.11p/C-V2X standards, and resilience to environmental perturbations.
- 5.
- Long-term Research Directions. The following open challenges remain to be addressed:
- Legacy Integration: Develop hybrid authentication modes for vehicles lacking PUF hardware.
- Standardization: Define cross-vendor CRP formats and lifecycle management protocols.
- Hardware Optimization: Explore cost-efficient, automotive-grade PUF designs resilient to modeling and side-channel attacks [36].
- Environmental Calibration: Investigate adaptive fuzzy extractors to stabilize CRPs under variable temperature and voltage conditions.
- Decentralized Trust: Incorporate distributed ledger technologies to reduce single-point dependence on cloud authorities.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Siegel, J.E.; Erb, D.C.; Sarma, S.E. A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2391–2406. [Google Scholar] [CrossRef]
- Arena, F.; Pau, G.; Severino, A. An Overview on the Current Status and Future Perspectives of Smart Cars. Infrastructures 2020, 5, 53. [Google Scholar] [CrossRef]
- Lee, R. Intelligent Transportation. In Artificial Intelligence in Daily Life; Springer: Berlin/Heidelberg, Germany, 2020; pp. 265–282. [Google Scholar] [CrossRef]
- Lu, Z.; Qu, G.; Liu, Z. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. 2018, 20, 760–776. [Google Scholar] [CrossRef]
- Farsimadan, E.; Palmieri, F.; Moradi, L.; Conte, D.; Paternoster, B. Vehicle-to-everything (V2X) communication scenarios for vehicular ad-hoc networking (VANET): An overview. In Proceedings of the International Conference on Computational Science and Its Applications (ICCSA), Cagliari, Italy, 13–16 September 2021; pp. 15–30. [Google Scholar] [CrossRef]
- Gebali, F.; Mamun, M. SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments. In Cybersecurity in Smart Homes: Architectures, Solutions and Technologies; Khatoun, R., Ed.; Wiley-iSTE: Hoboken, NJ, USA, 2022; pp. 125–151. [Google Scholar]
- Ghosal, A.; Conti, M. Security issues and challenges in V2X: A survey. Comput. Netw. 2020, 169, 107093. [Google Scholar] [CrossRef]
- Hasan, M.; Mohan, S.; Shimizu, T.; Lu, H. Securing vehicle-to-everything (V2X) communication platforms. IEEE Trans. Intell. Veh. 2020, 5, 693–713. [Google Scholar] [CrossRef]
- Rathore, R.S.; Hewage, C.; Kaiwartya, O.; Lloret, J. In-Vehicle Communication Cyber Security: Challenges and Solutions. Sensors 2022, 22, 6679. [Google Scholar] [CrossRef]
- Wang, Z.; Zhou, Y.; Qiao, Z.; Yang, B.; Gu, C.; Xu, Y. An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications. IEEE Internet Things J. 2022, 10, 5114–5127. [Google Scholar] [CrossRef]
- Gebali, F.; Elhadad, M. PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication. Computers 2023, 12, 233. [Google Scholar] [CrossRef]
- Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; Technical report, EBSE Technical Report EBSE-2007-001; Keele University: Keele, UK; Durham University: Durham, UK, 2007. [Google Scholar]
- Petersen, K.; Feldt, R.; Mujtaba, S.; Mattsson, M. Systematic Mapping Studies in Software Engineering. In Proceedings of the 12th Int’l Conference on Evaluation and Assessment in Software Engineering (EASE), Bari, Italy, 26–27 June 2008; BCS: Swindon, UK, 2008. [Google Scholar] [CrossRef]
- Ullah, S.; Zheng, J.; Din, N.; Hussain, M.T.; Ullah, F.; Yousaf, M. Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Comput. Sci. Rev. 2023, 47, 100530. [Google Scholar] [CrossRef]
- Groza, B.; Andreica, T.; Berdich, A.; Murvay, P.S.; Gurban, H. PRESTvO: PRivacy Enabled Smartphone-based Access to vehicle On-board units. IEEE Access 2020, 8, 119105–119122. [Google Scholar] [CrossRef]
- Perera, M.N.S.; Nakamura, T.; Hashimoto, M.; Yokoyama, H.; Cheng, C.M.; Sakurai, K. A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptography 2022, 6, 3. [Google Scholar] [CrossRef]
- Alrawais, A.; Alhothaily, A.; Mei, B.; Song, T.; Cheng, X. An Efficient Revocation Scheme for Vehicular Ad-Hoc Networks. In Proceedings of the 13th Int’l Conference on Future Networks and Communications (FNC 2018)—Procedia Computer Science, Gran Canaria, Spain, 13–15 July 2018; Volume 129, pp. 312–318. [Google Scholar] [CrossRef]
- Dwivedi, S.K.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.K.R.; Vollala, S. Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Ad Hoc Netw. 2022, 137, 102980. [Google Scholar] [CrossRef]
- Wang, C.; Cheng, X.; Li, J.; He, Y.; Xiao, K. A survey: Applications of blockchain in the Internet of Vehicles. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 77. [Google Scholar] [CrossRef]
- Keshari, N.; Singh, D.; Maurya, A.K.; Gupta, D.; Khare, A. A survey on Vehicular Fog Computing: Current state-of-the-art and future directions. Veh. Commun. 2022, 38, 100512. [Google Scholar] [CrossRef]
- Alrawais, A.; Alhothaily, A.; Hu, C.; Cheng, X. Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Comput. 2017, 21, 34–42. [Google Scholar] [CrossRef]
- Shamsoshoara, A.; Korenda, A.R.; Afghah, F.; Zeadally, S. A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Netw. 2020, 183, 107593. [Google Scholar] [CrossRef]
- Umar, M.; Islam, S.H.; Mahmood, K.; Ahmed, S.; Ghaffar, Z.; Saleem, M.A. Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETs Using PUF. IEEE Trans. Veh. Technol. 2021, 70, 12158–12167. [Google Scholar] [CrossRef]
- Delvaux, J.; Gu, D.; Schellekens, D.; Verbauwhede, I. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis. IEEE Trans. Comput. 2014, 34, 889–902. [Google Scholar] [CrossRef]
- Rezazadeh Baee, M.A.; Simpson, L.; Boyen, X.; Foo, E.; Pieprzyk, J. Authentication strategies in vehicular communications: A taxonomy and framework. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 129. [Google Scholar] [CrossRef]
- Afshar, M.A.; Benchoubane, N.; Cayoren, B.; Kurt, G.K.; Ozdemir, E. Privacy-Preserving and Simultaneous Authentication in High-Density V2X Networks. arXiv 2025, arXiv:2501.06087. [Google Scholar]
- Rakotonirina, I.; Barthe, G.; Schneidewind, C. Decision and Complexity of Dolev-Yao Hyperproperties. Proc. ACM Program. Lang. 2024, 8, 1913–1944. [Google Scholar] [CrossRef]
- Unterweger, A.; Taheri-Boshrooyeh, S.; Eibl, G.; Knirsch, F.; Küpçü, A.; Engel, D. Understanding Game-Based Privacy Proofs for Energy Consumption Aggregation Protocols. IEEE Trans. Smart Grid 2019, 10, 5514–5523. [Google Scholar] [CrossRef]
- Burrows, M.; Abadi, M.; Needham, R. A Logic of Authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
- Ahmad, K.; Ginting, J.G.A.; Damarjati, C.; Cahyadi, E.F. Analyzing MORNeS Protocol for Secure Key Exchange with BAN Logic. In Proceedings of the 2025 International Electronics Symposium (IES), Surabaya, Indonesia, 5–7 August 2025. [Google Scholar]
- Yang, A.; Yao, J.; Wei, W. A Lightweight Security Authentication Protocol for VANET Traffic Emergency Message Broadcasting. In Proceedings of the 10th International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE), Xi’an, China, 20–22 June 2025; pp. 293–304. [Google Scholar]
- Fontes, R.R.; Rothenberg, C.E.; Afzal, S.; Hessel, F. Mininet-WiFi: Emulating Software-Defined Wireless Networks. In Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM), Barcelona, Spain, 9–13 November 2015; pp. 348–353. [Google Scholar] [CrossRef]
- Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent Development and Applications of SUMO—Simulation of Urban MObility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138. [Google Scholar]
- Fontes, R.R.; Rothenberg, C.E. Mininet-WiFi: Emulation Platform for Software-Defined Wireless Networks. 2025. Available online: https://mininet-wifi.github.io/ (accessed on 21 October 2025).
- Fontes, R.R.; Rothenberg, C.E. Mininet-WiFi + SUMO Emulation Platform. 2025. Available online: https://mininet-wifi.github.io/sumo/ (accessed on 21 October 2025).
- Maes, R. Physically Unclonable Functions: Constructions, Properties and Applications; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]




| Notation | Definition/Description |
|---|---|
| Vehicle node i equipped with an On-Board Unit (OBU). | |
| R | Roadside unit (RSU) serving as a local infrastructure node. |
| C | Cloud Authority/Trusted Third Party responsible for CRP management. |
| Permanent identity of vehicle i assigned by the authority. | |
| Password or secret credential of vehicle i. | |
| Long-term secret key of vehicle i (shared with C). | |
| Short-lived digital certificate issued by C to RSU R. | |
| Physical Unclonable Function producing unique responses from challenges. | |
| Challenge–Response Pair derived from a PUF. | |
| PUF challenge j. | |
| Ideal PUF response corresponding to . | |
| Noisy response generated in practice under environmental factors. | |
| Public data enabling error correction of noisy PUF responses. | |
| Fuzzy Extractor algorithm for reconstructing reliable keys from noisy PUFs. | |
| Temporary Identifier for used to preserve anonymity. | |
| Random nonces generated by vehicle and RSU R, respectively, for freshness. | |
| Authentication token computed by : . | |
| Asymmetric encryption under the public key of entity X. | |
| Cryptographic one-way hash function (e.g., SHA-256). | |
| Session key established between vehicle and RSU R. | |
| Encrypted login request message from to R. | |
| Authentication request message sent from R to C. | |
| Response from during PUF-based challenge–response authentication. |
| Approach | Latency | Scalability | Bi-Directional Trust | Unclonability | CRP Lifecycle Managment |
|---|---|---|---|---|---|
| Cryptography-Based | High | Poor | Yes | No | Not Supported |
| Blockchain-Based | High | Poor | Yes | No | Not Feasible |
| Fog/Edge-Assisted | Low | Moderate | Parital | No | Not Addressed |
| PUF-Based | Low | Poor | Unidirectional | Yes | Not Scalable |
| Proposed Work | Low | High | Yes | Yes | Full Support |
| Proof Technique | Validated Security Property | Section |
|---|---|---|
| Inductive Proof | - Confidentiality of messages - Replay attack resistance - Freshness guarantees via nonces and TIDs - Preservation of secrecy under multi-hop relaying | Section 4.4 |
| Game-based Model | - Indistinguishability of session keys from random values - Adversary advantage bounded by negligible - Robustness against chosen-message and impersonation attacks | Section 4.5 |
| BAN Logic | - Correctness of authentication beliefs - Mutual agreement on session key between and R - Resistance against impersonation | Section 4.6 |
| Attack Type | Description | Resistance Mechanism | Status |
|---|---|---|---|
| Tampering Attacks | Physical tampering with the device. | PUF sensitivity to hardware changes. | Resistant |
| Replay Attacks | Reusing old messages to gain access. | Use of nonces for freshness. | Resistant |
| Impersonation Attacks | Impersonating the vehicle or RSU. | PUF challenge-response pairs prevent impersonation. | Resistant |
| Eavesdropping Attacks | Intercepting messages to gather sensitive information. | Encryption based on PUF-generated keys. | Resistant |
| MITM Attacks | Intercepting and altering communication between vehicle and RSU. | Mutual authentication and encryption prevent unauthorized modifications. | Resistant |
| Forward/Backward Secrecy | Ensuring past or future sessions remain secure even if the session key is compromised. | A new session key is generated for each session. | Resistant |
| Session Key Guessing Attacks | Brute-force attempts to guess the session key. | The session key is derived from PUF and cryptographic hash, making guessing infeasible. | Resistant |
| Cloning Attacks | Attempting to clone the vehicle’s PUF to impersonate it. | PUF is unclonable and unique to each device. | Resistant |
| Physical Attacks | Direct physical attacks on the device to extract cryptographic keys or disable the PUF. | PUF is highly sensitive to physical tampering, rendering the device unusable. | Resistant |
| Notation | Description |
|---|---|
| R and V | Principal actors |
| R trusts message m | |
| R ᐊ m | R receives message m |
| R has jurisdiction over m | |
| R once sent m | |
| Messages or are one part of the message | |
| Message m is encrypted with key k | |
| Message m is hashed with key k | |
| k is a secret variable between R and V | |
| m is secret and known only to R and V and parties trusted by them | |
| Message m is fresh |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Elhadad, M.K.; Gebali, F. Mutual V2I Multifactor Authentication Using PUFs in an Unsecure Multi-Hop Wi-Fi Environment. Electronics 2025, 14, 4167. https://doi.org/10.3390/electronics14214167
Elhadad MK, Gebali F. Mutual V2I Multifactor Authentication Using PUFs in an Unsecure Multi-Hop Wi-Fi Environment. Electronics. 2025; 14(21):4167. https://doi.org/10.3390/electronics14214167
Chicago/Turabian StyleElhadad, Mohamed K., and Fayez Gebali. 2025. "Mutual V2I Multifactor Authentication Using PUFs in an Unsecure Multi-Hop Wi-Fi Environment" Electronics 14, no. 21: 4167. https://doi.org/10.3390/electronics14214167
APA StyleElhadad, M. K., & Gebali, F. (2025). Mutual V2I Multifactor Authentication Using PUFs in an Unsecure Multi-Hop Wi-Fi Environment. Electronics, 14(21), 4167. https://doi.org/10.3390/electronics14214167

