You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

31 July 2024

A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET

,
,
and
1
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
2
Department of Computer Engineering (Smart Security), Gachon University, Seongnam 13120, Republic of Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Advances in Mathematical Cryptography and Information Security toward Industry 5.0

Abstract

Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still exist, because sensitive data of the vehicle user is necessary for generating a high-accuracy AI model. In this paper, we propose an authentication scheme to preserve the privacy of user data in edge intelligence-enabled VANETs. The proposed scheme can establish a secure communication channel using fuzzy extractor, elliptic curve cryptography (ECC), and physical unclonable function (PUF) technology. The proposed data upload process can provide privacy of the data using local differential privacy and symmetric key encryption. We validate the security robustness of the proposed scheme using informal analysis, the Real-Or-Random (ROR) model, and the Scyther tool. Moreover, we evaluate the computation and communication efficiency of the proposed and related schemes using Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) software development kit (SDK). We simulate the practical deployment of the proposed scheme using network simulator 3 (NS-3). Our results show that the proposed scheme has a performance improvement of 10∼48% compared to the state-of-the-art research. Thus, we can demonstrate that the proposed scheme provides comprehensive and secure communication for data management in edge intelligence-enabled VANET environments.

1. Introduction

Edge intelligence is a convergence technology of edge computing and artificial intelligence (AI) [1,2]. AI technology requires a large volume of user data to generate learning models. In edge computing networks, service providers can collect the real-time information from the network edge. Therefore, the combination of edge computing technology and AI can amplify the synergy through the real-time data collection and reflection of regional characteristics in AI models. Through these advantages, researchers have applied edge intelligence into vehicle services, such as vehicular ad hoc networks (VANETs) [3,4]. In edge intelligence-enabled VANET environments, users can receive improved vehicular services using AI, such as localized autonomous driving, accident prediction, and personalized entertainment experiences. To provide these services, a large volume of vehicle users’ personal data is necessary for training AI models [5]. If an adversary obtains these data (e.g., driving habits and history, call and messaging history in infotainment systems), it can cause serious security problems. Although the data are securely encrypted using various cryptography methods, the central server can still access user data. This can cause user privacy, anonymity and traceability problems. Therefore, it is important to strengthen the de-identification of user data in edge intelligence-enabled VANET environments, while preserving the confidentiality and availability of the data.
Differential privacy [6] is a de-identification technology that can provide privacy by adding noise or shuffling the data. The main advantage of differential privacy is that it simultaneously satisfies privacy protection and information analysis. This is possible because the statistical properties of the information can be maintained even when differential privacy is applied. However, these characteristics can still present security vulnerabilities to attackers. For example, if an adversary obtains the differential privacy-based data due to a low security level, it can generate a similar AI model. This can threaten the edge intelligence-enabled VANET network, because the adversary can infer the behavior patterns of vehicle users. This can compromise the anonymity and untraceability of vehicle users. Such vulnerabilities highlight the need for a robust authentication scheme to protect the differential privacy-based data.
In this paper, we propose a secure authentication scheme designed to preserve user data and ensure the privacy of generated data in edge intelligence-enabled VANET environments. The proposed scheme supports mutual authentication between edge servers and vehicles in VANET environments, as well as differential privacy-based data uploads. The proposed scheme provides a secure and efficient key agreement using fuzzy extractors [7], biometric information, and elliptic curve cryptography (ECC) [8]. Moreover, the proposed scheme can prevent potential security attacks, such as machine learning attacks, by utilizing physically unclonable function (PUF). Thus, the proposed mutual authentication process provides a high level of security to prevent adversaries from accessing user data. In the data upload process, users can achieve data privacy and anonymity using symmetric key encryption and differential privacy. By integrating these technologies, the proposed scheme can ensure not only data integrity and confidentiality during message transmission, but also user privacy from unauthorized access. The key contributions of our proposed scheme are as follows:
  • We propose a secure authentication scheme for edge intelligence-enabled VANET environments. The proposed scheme can provide a secure communication between edge nodes and vehicles using fuzzy extractors, biometric information, and ECC. To ensure the robust security for edge nodes, the proposed scheme utilizes PUF technology when generating the secret keys.
  • We provide a secure data upload process using the session key and local differential privacy technology [6]. Thus, the proposed scheme can ensure secure message transmission and data collection through the encryption of de-identification data. This approach can provide secure and efficient data management for edge intelligence-enabled VANET environments.
  • We perform various analyses to prove the security robustness of the proposed scheme, such as informal analysis, as well as using the “Real-Or-Random (ROR) model [9]”, and the Scyther tool [10,11]. Moreover, we conduct a simulation study using “Network Simulator (NS)-3 [12]”.
  • We compare the computation and communication overheads of the proposed scheme with the other related schemes using “Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) software development kit (SDK) [13]”.
The rest of our paper is structured as follows. In “Related Works” (Section 2), various research is introduced for edge intelligence-based VANETs. In “Preliminaries” (Section 3), the system model, threat model, and various security technologies are introduced. In “Proposed Scheme” (Section 4), the detailed scheme is introduced. In “Security Analysis” (Section 5), an informal analysis is conducted, and the ROR model and Scyther tool are used to prove the security robustness of the proposed scheme. In “Performance Analysis” (Section 6), the comparison and NS-3 simulation studies are performed to verify the practical deployment of the proposed scheme. In “Conclusions” (Section 7), we conclude and summarize our paper.

3. Preliminaries

3.1. System Model

The proposed system model for edge intelligence-enabled VANET environments consists of trusted authority (TA), a cloud server, an edge node, and a vehicle. Figure 1 shows the proposed system model and the details are as follows:
Figure 1. System model.

3.1.1. Trusted Authority

TA manages the proposed network system by initializing and publishing public information such as ECC, hash function, and global public key. Moreover, TA performs the registration process and stores the sensitive data of the cloud server, edge node, and vehicle. TA has a large amount of computation and storage resources.

3.1.2. Cloud Server

The cloud server controls the entire VANET service and data based on enormous computing and storage resources. Additionally, the cloud server creates a large AI model using vehicle data sent by edge nodes.

3.1.3. Edge Node

An edge node is a infrastructure controlled by TA, which manages services and collects information for vehicles in a specific area through RSUs. Additionally, the edge node collects and learns local information sent by vehicles based on sufficient computing and storage resources to create a local AI model. Edge nodes can use this edge intelligence to provide improved VANET services to vehicles. Moreover, edge nodes help to create a global AI model for the overall VANET service by uploading some information about the vehicle to the cloud server.

3.1.4. Vehicle

Vehicles can receive various VANET services such as AI-based route guidance, entertainment, and accident prediction through mutual authentication with edge nodes. Additionally, vehicles upload some of their driving data to continuously improve VANET services and enhance the accuracy of accident prediction. Because the uploaded data are safely masked using local differential privacy, edge nodes cannot identify the exact information of individual vehicles. In the proposed scheme, the vehicle has limited computational and storage resources.

3.2. Threat Model

In the proposed scheme, we utilize “Dolev-Yao (DY) [28]” and “Canetti-Krawczyk (CK) [29]” network models. In the DY model, the adversary has access to messages on public channels. Therefore, the adversary can eavesdrop on, insert, capture, and delete messages transmitted via public channels. In the CK network model, the adversary can access secret credentials. Thus, the adversary can obtain a revealed master key of the TA and ephemeral secret value in the proposed scheme. Using the DY and CK network models, the adversary can process the following security attacks:
  • The adversary can reveal the verification table and try to compute sensitive parameters [30].
  • The adversary can obtain secret parameters and try to disguise itself as a legitimate vehicle [31].
  • The adversary can be a privileged insider to compute identity and password of vehicle.
  • The adversary can perform various security attacks such as man-in-the-middle, ephemeral secret leakage, replay, and insider attacks.

3.3. Elliptic Curve Cryptography

Elliptic curve cryptography (ECC) [8] is a cryptosystem that implements cryptographic characteristics using elliptic curves. To utilize ECC in a security system, we must select a large finite field F p , large prime integer p, q, and ECC parameter w, v. Then, we can generate an elliptic curve E ( w , v ) : y 2 = x 3 + w x + v ( 4 w 3 + 27 v 2 0 ). Since the point on the elliptic curve satisfies the addition group, we specify a base point P. Therefore, ECC satisfies the following equation for an integer n Z q . Moreover, we introduce the mathematical security of ECC as follows:
n · P = P + P + P + + P     ( n times )
  • Elliptic curve discrete logarithm (ECDL) problem: A mathematical problem to compute n Z q when n · P is given.
  • Elliptic curve decisional Diffie–Hellman (ECDDH) problem: A mathematical problem to grant the equality of n · s · P and t · P when n, s, and t is allowed.
  • Elliptic curve computational Diffie–Hellman (ECCDH) problem: A mathematical problem to compute n · s · P when n · P and s · P are allowed.

3.4. Physically Unclonable Function

Physical unclonable function (PUF) is a technology that implements a one-way function in hardware. PUF is performed as R e s = P U F ( C h a ) , where C h a is a input value “Challenge” and R e s is an output value “Response”. We introduce the properties of an ideal PUF as follows:
  • PUF is a hardware circuit, which cannot replicate or interpret the detailed structure.
  • Since PUF is implemented uniquely in each hardware, different outputs are produced even if the same input is input.
  • The output value of PUF cannot be predicted.
  • PUF is easy to implement and estimate.

3.5. Fuzzy Extractor

Fuzzy extractor [7] is a method to utilize biometric information of users as a security parameter. Unlike identity and password, biometrics, e.g., fingerprint and iris information, are detected by a sensor. Thus, the input data can change slightly depending on the surrounding environments. Nevertheless, this information must be constant to be used as the security parameters [32]. Fuzzy extractor can correct this noise-based information to original data using the helper string. Fuzzy extractor is composed of two algorithms, i.e., “generation ( G e n ( . ) )” and “reproduce ( R e p ( . ) )”.
  • G e n ( B i o V E i ) = ( e b V E i , h s V E i ) : After executing the probability algorithm G e n ( . ) , we can obtain a string e b V E i and helper string h s V E i . We utilize e b V E i as a secret parameter for the proposed scheme.
  • R e p ( B i o V E i , h s V E i ) = ( e b V E i ) : After conducting the deterministic algorithm R e p ( . ) with helper string h s V E i , we can obtain the secret parameter e b V E i .

3.6. Local Differential Privacy

Differential privacy is a technique that preserves the privacy of individual users while maintaining the statistical trends of the overall user dataset. This technique can be implemented by introducing randomness to individual responses through mechanisms like randomized response, or by adding various types of noise such as Laplace, Gaussian, or exponential noise to the original data. In 2006, Dwork et al. [6] proposed epsilon-differential privacy to quantify the level of privacy preservation provided by different differential privacy techniques. Definition 1 illustrates ϵ -differential privacy, and Definition 2 illustrates differential privacy using the Laplace Probability Density Function (PDF).
Definition 1.
ϵ-differential privacy: For a randomized algorithm A , it is differentially private (ϵ) when two datasets D and D have a difference in one element. S is subset of output using A .
P r [ A ( D ) S ] e ϵ · P r [ A ( D ) S ]
Definition 2.
To achieve ϵ-differential privacy, the Laplace mechanism adds noise drawn from the Laplace distribution to the output of a function f. The Laplace distribution with scale parameter λ = Δ f ϵ has the following probability density function:
L a p ( x | λ ) = 1 2 λ e | x | λ
Differential privacy applies privacy protection at the central server level, which still leaves a possibility for personal data leakage. Local differential privacy, on the other hand, ensures privacy by adding noise to the data on the user’s end device before sending them to the server, thereby achieving better privacy protection. Figure 2 illustrates the difference between general differential privacy and local differential privacy.
Figure 2. General differential privacy and local differential privacy.

4. Proposed Scheme

In this section, we propose a mutual authentication and data collection scheme for edge intelligence-enabled VANET environments. The proposed scheme consists of initialization, registration, login and authentication, and differential privacy-based data collection phases. Notations and descriptions in the proposed scheme are shown in Table 2. Figure 3 indicates the flowchart of the proposed scheme, and the details are as follows:
Table 2. Notations and descriptions.
Figure 3. Flowchart of the proposed scheme.

4.1. Initialization Phase

In this phase, TA performs an initial setup to organize the proposed network. TA selects large prime number p, q and picks w, v F p . Then, TA generates an elliptic curve E ( w , v ) : y 2 = x 3 + w x + v m o d q. Furthermore, TA selects a generator P from E ( w , v ) and picks a master key m k T A to compute the public key P u b T A = m k T A · P . TA selects a hash function h ( . ) and publishes { E ( w , v ) , P , h ( . ) , P u b T A , p , q } .

4.2. Registration Phase

To participate in the proposed network environments, edge nodes and vehicles must process the registration phase by sending their information to TA. After registering these entities, TA returns a secret credential using a secure channel. The details are as follows:

4.2.1. Edge Node Registration

RE1: 
To register in the proposed network system, the edge node E k selects its own identity I D E D k and picks a random number n s E D k . Then, E k computes h ( I D E D k n s E D k ) and sends { I D E D k , h ( I D E D k n s E D k ) } to the TA via a secure channel.
RE2: 
TA first checks the validity of I D E D k and generates n s T A E k . Then, TA computes h ( h ( I D E D k n s E D k ) n s T A E k m k T A ) and stores { I D E D k , h ( I D E D k n s E D k ) } in its secure database. TA returns { h ( h ( I D E D k n s E D k ) n s T A E D m k T A ) } to E k through a secure channel.
RE3: 
E k computes p s k E D k = h ( h ( I D E D k n s E D k ) n s T A E D m k T A ) , P U F ( p s k E D k ) = u s k E D k using PUF function, G e n ( u s k E D k ) = ( e u s k E D k , h s E D k ) using fuzzy extractor, and s k E D k = h ( e u s k E D k I D E D k ) . E k keeps s k E D k as a secret key and computes public key P u b E D k = s k E D k · P . E k stores { p s k E D k , P u b E D k , h s E D k } in its database.

4.2.2. Vehicle Registration

RV1: 
The user of a vehicle V E i selects their own identity I D V E i , password P W V E i , and biometrics B i o V E i . Then, V E i picks a random number n s V E i and computes G e n ( B i o V E i ) = ( e b V E i , h s V E i ) using fuzzy extractor, M I D V E i = h ( n s V E i I D V E i e b V E i ) . V E i sends a registration request message { I D V E i , M I D V E i , n s V E i } to the TA via a secure channel.
RV2: 
TA checks the validity of I D V E i and generates n s T A V i to compute C M K T A V i = h ( M I D V E i n s T A V i m k T A ) , P I D V E i = h ( I D V E i m k T A ) , and S I D V E i = I D V E i h ( m k T A P I D V E i n s T A V i ) . TA stores { P I D V E i , S I D V E i , n s T A V i } and sends a return message { P I D V E i , C M K T A V i } to V E i through a secure channel.
RV3: 
V E i computes its secret key s k V E i = h ( C M K T A V i e b V E i ) and public key P u b V E i = s k V E i · P . Then, V E i computes z n s V E i = n s V E i h ( I D V E i e b V E i ) , z P I D V E i = P I D V E i h ( n s V E i e b V E i P W V E i ) , z C M K T A V i = C M K T A V i h ( M I D V E i P I D V E i I D V E i ) , z P u b V E i = P u b V E i h ( s k V E i e b V E i n s V E i ) , and V V E i = h ( s k V E i P u b V E i n s V E i P I D V E i M I D V E i ) . V E i stores { z n s V E i ,   z P I D V E i ,   z C M K T A V i , z P u b V E i ,   V V E i ,   h s V E i } in its memory.

4.3. Login and Authentication Phase

To receive edge intelligence services, a registered vehicle submits its information to complete the login process. Subsequently, the vehicle selects a fresh value, encrypts the information using a public key, and attempts to establish a session key agreement with the edge node. The edge node uses the public key and PUF technologies for mutual authentication, ensuring high security. Algorithms 1 and 2, and Figure 4 present the proposed login and authentication phase. The detailed process is as follows:    
Algorithm 1: Login and authentication: Vehicle
Mathematics 12 02383 i001
Algorithm 2: Login and authentication: Edge node
Mathematics 12 02383 i002
Figure 4. Login and authentication phase of the proposed scheme.
LA1: 
V E i inputs I D V E i , P W V E i , and biometrics B i o V E i . Then, V E i computes R e p ( B i o V E i , h s V E i ) = e b V E i using fuzzy extractor, n s V E i = z n s V E i h ( I D V E i e b V E i ) , P I D V E i = z P I D V E i h ( n s V E i e b V E i P W V E i ) , M I D V E i = h ( n s V E i I D V E i e b V E i ) , C M K T A V i = z C M K T A V i h ( M I D V E i P I D V E i I D V E i ) , s k V E i = h ( C M K T A V i e b V E i ) P u b V E i = z P u b V E i h ( s k V E i e b V E i n s V E i ) and V V E i = h ( s k V E i P u b V E i n s V E i P I D V E i M I D V E i ) . If V V E i is equal to V V E i , V E i picks a random nonce r s i and timestamp t s i . Then, V E i computes T P m v i = r s i · P , T K m v i = r s i · P u b E D k , V S m v a = P I D V E i h ( t s i T K m v i ) , V S m v b = h ( P u b V E i T K m v i P I D V E i t s i ) , and sends { T P m v i , V S m v a , V S m v b , t s i } to the edge node E k through a public channel.
LA2: 
E k checks the freshness of t s i through the inequality | t s i t s c |   <   Δ t . Then, E k computes P U F ( p s k E D k ) = u s k E D k , R e p ( u s k E D k , h s E D k ) = e u s k E D k , s k E D k = h ( e u s k E D k I D E D k ) , T K m v i = T P m v i · s k E D k , P I D V E i = V S m v a h ( t s i T K m v i ) , and retrieves P u b V E i . From that, E k checks the equality of V S m v b and h ( P u b V E i T K m v i P I D V E i t s i ) . If it is valid, E k generates r s k and t s k , and computes T P m e k = r s k · P , T K m e k = r s k · P u b V E i , S K V i E k = h ( T K m e k t s i t s k P I D V E i P u b V E i ) , and E S m e a = h ( S K V i E k T K m e k P I D V E i P u b V E i ) . E k sends { T P m e k , E S m e a , t s k } to V E i through a public channel.
LA3: 
V E i first check | t s k t s c |   <   Δ t and computes T K m e k = s k V E i · T P m e k , S K E k V i = h ( T K m e k t s i t s k P I D V E i P u b V E i ) , and E S m e a = h ( S K E k V i T K m e k P I D V E i P u b V E i ) . If E S m e a is equal to E S m e a , the session key S K E K V i is completely established between V E i and E k .

4.4. Differential Privacy-Based Data Collection Phase

After establishing the session key, the vehicle receives various edge intelligence services. To continuously improve and update the AI model of the edge node, the vehicle transmits some of the surrounding and personal information to the edge node. To achieve privacy protection and data anonymization, the proposed scheme securely utilizes user information based on local differential privacy. The detailed process is as follows.
DC1: 
With the collected data c s V E i , V E i executes Laplace mechanism M ( D ) = f ( D ) + L a p ( Δ f / ϵ ) ( L a p ( s i k | λ ) = 1 2 λ e | s i k | λ , s i = [ s i 1 , , s i k , , s i n ] ) and obtains DP-based data d p V E i . After that, V E i generates a timestamp t s V i d p and computes V E d c a = h ( d p V E i t s V i d p S K E k V i ) , V E d c b = d p V E i h ( S K E k V i t s V i d p ) . V E i sends { V E d c a , V E d c b , t s V i d p } to E k via an wireless open channel.
DC2: 
E k checks the validity of t s V i d p and computes d p V E i = V E d c b h ( S K E k V i t s V i d p ) , V E d c a = h ( d p V E i t s V i d p S K E k V i ) . If V E d c a is equal to V E d c a , E k utilizes the DP-based data d p V E i for various service improvement tasks.

5. Security Analysis

In this section, we verify the security robustness of the proposed protocol using various methods of analysis, such as the ROR model, the Scyther tool, and informal security analysis.

5.1. ROR Model

In various authentication protocols, each entity checks the legitimacy of the network partner and computes a session key. To verify the security of the session key, we use the ROR model [9]. We validate the security of the session key through various passive and active attacks of an adversary. Thus, the adversary conducts several games under the instantiated networks and attempts to distinguish random nonces and session keys using the test query. Thus, we define participants, adversaries, and queries to analyze the session key security of the proposed scheme using the ROR model. In the proposed scheme, four participants organize the system model: TA ( P M T A a 1 ), cloud server ( P M C S a 2 ), edge node ( P M E N a 3 ), vehicle ( P M V a 4 ). Note that a 1 , a 2 , a 3 and a 4 are the instance for the participants. The adversary has the ability to intercept, delete, and eavesdrop on messages through public channels. With this ability, the adversary can conduct various queries as follows:
  • E ( P M T A a 1 , P M C S a 2 , P M E N a 3 ) , P M V a 4 : The adversary can collect messages transmitted through public channels using E ( . ) query.
  • C ( P M V a 4 ) : The adversary can capture the vehicle and extract secret parameters using C ( . ) query.
  • S ( P M a ) : This query represents a send event. Thus, the adversary can send messages to participant P M a .
  • T ( P M a ) : This is a test query to distinguish the session key and random number. If the query T ( . ) is executed, an unbiased coin is flipped. When the adversary obtains 0, the session key security can be achieved. However, the session key is not secure if the adversary obtains 1. Otherwise, the N U L L value is output.

Security Proof

Theorem 1.
We denote C D S B R ( M ) as the likelihood that an adversary cracks the security of the proposed scheme in polynomial time. We also define the total number of hash, send, and PUF queries as t n h and t n s , and t n P U F . The range space of the hash and the PUF function are denoted as h ( . ) and P U F ( . ) . The Zipf’s parameters [33] are C and s . The probability of breaking the elliptic curve decisional Diffie–Hellman (ECDDH) problem and the number of bits in biometric parameters are defined as C D S B R E C C ( M ) and i B . Therefore, the proposed protocol can be secure when C D S B R ( M ) is less than the sum of that previously mentioned:
C D S B R ( M ) t n h 2 | h | + t n P U F 2 | P U F | + 2 C D S B R E C C ( M ) + 2 { C t n s s , t n s 2 i B }
Proof. 
According to [34,35,36], we conduct six games ( G k , k = 0 , 1 , 2 , 3 , 4 , 5 ). The advantage and winning probability of the adversary in each game as A [ W I N G k ] and W I N G k .
G 0 : In this game, the adversary does not have any information for the session key. Thus, the adversary selects a random bit O. By the definition in [9], we can obtain the following Equation (1):
C D S B R ( M ) = | 2 A [ W I N G 0 ] 1 |
G 1 : The adversary executes the E x e c ( . ) query and obtains { T P m v i , V S m v a , V S m v b , t s i } and { T P m e k , E S m e a , t s k } . Then, the adversary conducts the T ( . ) query to verify whether the session key is secure or not. However, the adversary cannot decrypt messages because each parameter utilized various forms of security technology, such as ECC, PUF, and biometrics, in the proposed scheme. This means that the adversary has the same probability of winning the game as G 0 . Thus, the winning possibility is same as A [ W I N G 0 ] . We can obtain the following Equation (2):
A [ W I N G 0 ] = A [ W I N G 1 ]
G 2 : Using the send and hash queries, the adversary tries to reveal the session key security in this game. However, the proposed protocol can resist hash-collision problems through the use of the “cryptographic one-way hash function”. Thus, we can obtain the following inequality (3) using the birthday paradox [37]:
A [ W I N G 2 ] A [ W I N G 1 ] t n h 2 | h |
G 3 : The adversary utilizes send and P U F queries to break the security of the session key. According to Section 3.4, it is practically impossible to guess the secret parameter derived from PUF circuit, which means that the adversary cannot reveal the secret key of edge nodes. Thus, we can obtain the inequality (4), which is similar to (3):
| A [ W I N G 3 ] A [ W I N G 2 ] |     t n P U F 2 | P U F |
G 4 : The adversary tries to compute the session key using { T P m v i , V S m v a , V S m v b , t s i } and { T P m e k , E S m e a , t s k } . However, T K m v i = r s i · s k E D k · P and T K m e k = r s k · s k V E i · P have security based on the ECDDH problem. Thus, the winning probability of G 4 is solving this problem in polynomial time. The inequality (9) can be obtained:
| A [ W I N G 4 ] A [ W I N G 3 ] |     C D S B R E C C ( M )
G 5 : This game is the final game in which the adversary collects the secret parameter of the vehicle using C ( . ) query. After that, the adversary tries to compute the secret parameters using { z n s V E i ,   z P I D V E i ,   z C M K T A V i ,   z P u b V E i ,   V V E i ,   h s V E i } . However, the proposed scheme utilizes the identity, password, and biometrics to perform local login process. Thus, it is a computationally infeasible task to guess them simultaneously. Therefore, we can obtain the inequality (6) using Zipf’s parameters:
| A [ W I N G 5 ] A [ W I N G 4 ] |     { C t n s s , t n s 2 i B }
After G 5 , the adversary guesses a bit t. Because the winning probability in G 5 is 0.5, we can obtain the Equation (7):
A [ W I N G 5 ] = 1 2
We can obtain the following after uniting Equations (1) and (2):
1 2 C D S B R ( M ) = | A [ W I N G 0 ] 1 2 | = | A [ W I N G 1 ] 1 2 |
We also obtain the following after uniting Equations (7) and (8):
1 2 C D S B R ( M ) = | A [ W I N G 1 ] A [ W I N G 5 ] |
We obtain the following after using (9) and triangular inequality:
1 2 C D S B R ( M ) = | A [ W I N G 1 ] A [ W I N G 5 ] | | A [ W I N G 1 ] A [ W I N G 4 ] | + | A [ W I N G 4 ] A [ W I N G 5 ] | | A [ W I N G 1 ] A [ W I N G 2 ] | + | A [ W I N G 2 ] A [ W I N G 3 ] | +   | A [ W I N G 3 ] A [ W I N G 4 ] | + | A [ W I N G 4 ] A [ W I N G 5 ] | .
t n h 2 2 | h | + t n P U F 2 2 | P U F | + C D S B R E C C ( M ) + { C t n s s , t n s 2 i B }
After multiplying (10) by 2, we can obtain the following result, which is same as Theorem 1:
C D S B R ( M ) t n h 2 | h | + t n P U F 2 | P U F | + 2 C D S B R E C C ( M ) + 2 { C t n s s , t n s 2 i B }

5.2. Informal Analysis

5.2.1. Replay and Man-in-the-Middle Attacks

The adversary can capture messages from the public channel and send them to other network participants. In the proposed login and authentication phase, each entity generates and sends timestamp t s to prove the freshness of message. If the timestamp is out of time, the communication partner regards the message as failed information. Thus, the adversary cannot have an advantage when using replay and man-in-the-middle attacks.

5.2.2. Impersonation Attacks

In this attack, the adversary attempts to disguise itself as a legitimate user using messages transmitted via an open channel. Thus, the adversary must generate T P m v i , V S m v a , V S m v b , and t s i , which are the elements of authentication request message. However, the adversary cannot generate V S m v a because P I D V E i is a secret parameter of the legitimate vehicle V E i . Thus, the adversary cannot compute the message. For the reason above, the proposed scheme can prevent impersonation attacks.

5.2.3. Insider Attacks

In this attack, an adversary registers with the TA as a vehicle and performs the login and authentication phase. Then, the adversary collects public messages to reveal secret credentials. With the leaked credentials, the adversary invades the other vehicle’s session and tries to compute the session key. However, the adversary cannot decrypt any sensitive information because of the use of ECC and PUF. To compute P I D V E i and S K E k V i , the adversary must obtain T K m v i and T K m e k , which are based on the ECC and PUF technology. Therefore, the proposed scheme has robustness against insider attacks.

5.2.4. Privileged Insider Attacks

In the real environment, users utilize same identity and password in various network systems. Thus, a privileged insider attempts to compute the identity and password of legitimate users in this attack. In the registration phase, the adversary can obtain the identity I D V E i . However, the adversary cannot guess the password of V E i because { z n s V E i ,   z P I D V E i ,   z C M K T A V i ,   z P u b V E i ,   V V E i ,   h s V E i } are masked in biometrics B i o V E i . Thus, the proposed protocol can prevent privileged insider attacks.

5.2.5. Verification Table Leakage Attacks

In this attack, the adversary obtains the verification table { I D E D k , h ( I D E D K n s E D k ) } and { P I D V E i , S I D V E i , n s T A V i } . From this information, the adversary can try to compute the session key S K E k V i = h ( T K m e k t s i t s k P I D V E i P u b V E i ) . However, the adversary cannot compute the session key because T K m e k is composed of s k V E i , which is the secret key of V E i . Thus, the proposed scheme is secure against verification table leakage attacks.

5.2.6. Ephemeral Secret Leakage (ESL) Attacks

In this attack, an adversary tries to compute the session key if the ephemeral secret parameters r s i and r s k are leaked. To compute the session key, the adversary must obtain T K m e k , P I D V E i , and P u b V E i . However, the adversary still does not have the secret key s k V E i which means the adversary cannot compute T K m e k . Thus, the proposed scheme can prevent ESL attacks.

5.2.7. Perfect Forward Secrecy

If an adversary obtains the master key m k T A of TA, it can try to leak the secret parameters. However, the adversary has no advantage from that because all messages are masked in ECC and the secret parameter s k V E i . Thus, the proposed protocol can achieve perfect forward secrecy.

5.2.8. User Anonymity and Untraceability

In edge intelligence-enabled VANET environments, the history of a vehicle can be critical information. Thus, the anonymity and untraceability must be protected in the proposed scheme. In the proposed protocol, V E i sends a temporal parameter V S m v a to guarantee freshness and the confusion of identity. Thus, the adversary cannot specify the actual vehicle from the message. Thus, the proposed protocol can achieve anonymity and untraceability.

5.2.9. Mutual Authentication

When the vehicle V E i tries to authenticate with the edge node, V E i generates a request message using secret parameters and a random number and timestamp. The edge node checks the freshness of the timestamp using Δ t and verifies the legitimacy of V E i using ECC and PUF. If the process is a success, the edge node can demonstrate that V E i is a legitimate participant. Thus, the proposed protocol can guarantee mutual authentication.

5.3. Scyther Tool

We evaluate the security of the proposed protocol using an automatic verification and simulation tool, named Scyther [10,11]. The Scyther tool analyzes possible behavior patterns in security protocols and evaluates various security properties, such as the robustness of the authentication and the confidentiality of variables. The Scyther tool can represent the behaviors of the security protocol by characterizing protocols. Thus, we convert the proposed scheme into SPDL (Security Protocol Description Language), which is the programming language used in the Scyther tool. Then, the Scyther tool conducts a security simulation. After that, the Scyther tool conducts the security verification using various claim events, which are described in Table 3. When the protocol is secure and well-authenticated, the Scyther tool outputs “OK” and “No attacks” in the results window. Figure 5 shows that the proposed scheme is secure against various security attacks and has robust mutual authentication.
Table 3. Claim events in Scyther tool.
Figure 5. Results window of the proposed scheme using the Scyther tool.

6. Performance Analysis

In this section, we measure the computational, communicational overhead of the proposed protocol. Based on the results, we conduct comparative studies with the related schemes. Moreover, we simulate the practical deployment of the proposed scheme using NS-3.

6.1. MIRACL Testbed

MIRACL [13] is a C/C++ language-based open-source SDK that can implement various security schemes using built-in cryptographic primitives. MIRACL can be effectively applied to small equipment such as embedded and mobile devices through the optimization of cryptographic primitives. In our paper, we measure ECC multiplication ( C E m u l ), ECC addition ( C E a d d ), AES encryption ( C A e n c ), AES decryption ( C A d e c ), bilinear pairings ( C B P ), exponentiation ( C e x p ), and hash function ( C H a s h ) using MIRACL. The testbed environments in our study are as follows:
  • Desktop environments: “Linux Ubuntu 20.04 LTS, Intel Core i3-8100 CPU @ 3.60 GHz, 16 GB RAM”
  • Raspberry Pi environments: Raspberry Pi 4B (Quad-core ARM Cortex-A72 @ 1.5 GHz, 8 GB RAM)
We conduct the experimental study using these environments to measure the execution time for each of the cryptographic primitives. We execute the cryptographic primitives for 100 times and deduce the results. Table 4 and Table 5 represent the maximum, minimum, and average execution times for each cryptographic primitive.
Table 4. MIRACL testbed result of Raspberry Pi platform.
Table 5. MIRACL testbed result of desktop platform.

6.2. Computational Overheads

In this section, we conduct a comparative study of our proposed scheme with other related research [22,23,24,25,26,27] in terms of computational overhead. In the proposed login and authentication phase, the vehicle uses 3 ECC multiplications ( C E m u l ) and 11 hash functions ( C H a s h ). Additionally, the edge node performs 3 ECC multiplications and 5 hash functions. Based on Table 4 and Table 5, we measure the computational overhead of the vehicle and the edge node. The overall overhead is shown in Table 6. The proposed scheme has from 10% to 48% better performance compared with the state-of-the-art research [26,27]. Therefore, the results demonstrate that the proposed scheme uses lower computational overheads compared to other related schemes [22,23,24,25,26,27].
Table 6. Comparative study of computational overheads.
We also analyze computation complexity through the primitives used in the proposed scheme. In the initialization phase, TA picks various random numbers and selects an elliptic curve. Thus, the computation complexity is O ( n 2 ) . In the registration phase, edge nodes and vehicles register with the network using the hash function, PUF, and fuzzy extractor, which can be indicated as O ( k ) and O ( 1 ) . In the login and authentication phase, vehicle and edge nodes utilize various ECC multiplication, hash function and exclusive-OR computations. Thus, computation complexity is O ( n 2 ) , O ( k ) , and O ( n ) in this phase. Through the analysis conducted across the proposed scheme, the computation complexity is O ( n 2 ) .

6.3. Communication Overheads

We analyze the communication overhead of the proposed scheme to verify the efficiency. To measure the message load on the public channel during the authentication phase, we define the communication cost as follows: the ECC point, hash, random number, identity, and timestamp are 320, 160, 160, 160, and 32, respectively. Thus, the messages in the proposed method are { T P m v i , V S m v a , V S m v b , t s i } and { T P m e k , E S m e a , t s k } , amounting to ( 320 + 160 + 160 + 32 ) + ( 320 + 160 + 32 ) = 1184 bits. Table 7 presents the results of measuring the overall communication overhead and the number of messages for the proposed scheme and other related schemes [22,23,24,25,26]. The results show that the proposed scheme has lower communication overhead than [22,23,25,26,27], and slightly higher than [24]. However, the proposed scheme has lower computational overhead compared to the comparison schemes [22,23,24,25,26,27].
Table 7. Comparative study of communicational overheads.

6.4. NS-3 Simulation

In this section, we conducted a simulation study to estimate the practical deployment of the proposed scheme using NS-3 [12]. In NS-3, each network node is executed according to the coded application layer. Then, the node generates a network packet to “NetDevice” and sends it to the other node through a “Channel”. The proposed scheme is composed of several edge nodes and various vehicles in the mutual authentication phase. In our system model, edge nodes are fixed infrastructures to communicate with vehicles that have dynamic movement properties. Moreover, message bytes are 84 and 64 bytes in our login and authentication phase. We conducted NS-3 simulation under desktop platform (Intel(R) Core(TM) i5-11400 @ 2.60 GHz with 24.0 GB RAM, Ubuntu 16.04 LTS). Table 8 represents the parameters used in our NS-3 simulation study. With these parameters, we simulate the proposed scheme using NS-3 through four scenarios as follows:
Table 8. NS-3 parameters in our simulation.
  • Scenario 1: 10 vehicles are placed in a single edge node’s service range.
  • Scenario 2: 30 vehicles are placed in a single edge node’s service range.
  • Scenario 3: 60 vehicles are placed in three edge nodes’ service range.
  • Scenario 4: 90 vehicles are placed in three edge nodes’ service range.

Throughput and End-to-End Delay Analysis

We perform throughput analysis to determine whether the proposed scheme can provide VANET services. Since throughput is the minimum transmission capability including protocol efficiency in the end-to-end data path, we can measure the performance of the proposed scheme. We define P a r e c v , S i p a c k e t , T i t o t as the number of received packets, the packet size, and the total time, respectively. Thus, the formula of throughput is as follows:
P a r e c v × | S i p a c k e t | T i t o t
Also, we measure the end-to-end delay recording the time it takes data to move from one point to another. We define total packets, and one data packet; the times for receiving and sending messages are P a t o t , k, T i r e c v , and T i s e n d , respectively. Thus, the formula of the end-to-end delay is as follows:
Σ k = 1 P a t o t ( T i r e c v T i s e n d ) P a t o t
Through the throughput and end-to-end delay formulas, we conduct the NS-3 simulation study according to the four scenarios. The results are shown in Figure 6.
Figure 6. Results of the end-to-end delay and throughput analyses using NS-3.

6.5. Security Features

We show the security and functionality features of the proposed scheme and the related schemes [22,23,24,25,26,27] in Table 9. According to Table 9, the proposed scheme can prevent various security attacks, including replay, impersonation, verification table leakage, ESL, and insider attacks. Moreover, the proposed scheme can ensure anonymity and perfect forward secrecy. Thus, we can demonstrate that the proposed scheme has high security and functionality features compared with the related schemes [22,23,24,25,26,27].
Table 9. Comparison of security and functionality features.

7. Conclusions

In this paper, we proposed a secure authentication scheme for edge intelligence-enabled VANET environments. The proposed scheme can provide secure and efficient mutual authentication between edge nodes and vehicles using PUF, biometrics, and ECC. With the established session key, vehicles can receive various edge intelligence services. Moreover, the proposed scheme can support a privacy-preserving data collection scheme using local differential privacy. We conducted various security analyses, including the use of the ROR model, the Scyther tool, and carrying out an informal security analysis, to prove the security robustness of the proposed protocol. Furthermore, we measured the performance of cryptographic primitives using MIRACL SDK under Raspberry Pi 4B and a desktop platform. Based on the performance result, we compare the computational and communication overheads of the proposed scheme with the related schemes. We simulated the proposed protocol to check the practical deployment in VANET environments using NS-3. In future work, we will extend the proposed scheme considering edge intelligence-enabled VANET environments. In addition, we will perform various analyses, such as the scalability test, and a machine learning analysis using differential privacy-based actual VANET data.

Author Contributions

Conceptualization, D.K.; methodology, D.K. and K.P.; software, D.K. and S.S.; validation, S.S. and K.P.; formal analysis, D.K.; writing—original draft preparation, D.K.; writing—review and editing, S.S. and K.P.; supervision, Y.P.; project administration, Y.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea (NRF) funded by the Ministry of Education under grant 2020R1I1A3058605.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liu, Y.; Peng, M.; Shou, G.; Chen, Y.; Chen, S. Toward edge intelligence: Multiaccess edge computing for 5G and Internet of Things. IEEE Internet Things J. 2020, 7, 6722–6747. [Google Scholar] [CrossRef]
  2. Plastiras, G.; Terzi, M.; Kyrkou, C.; Theocharides, T. Edge intelligence: Challenges and opportunities of near-sensor machine learning applications. In Proceedings of the 2018 IEEE 29th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), Milan, Italy, 10–12 July 2018; pp. 1–7. [Google Scholar]
  3. Zhang, J.; Letaief, K.B. Mobile edge intelligence and computing for the internet of vehicles. Proc. IEEE 2019, 108, 246–261. [Google Scholar] [CrossRef]
  4. Balasubramanian, V.; Otoum, S.; Reisslein, M. VeNet: Hybrid stacked autoencoder learning for cooperative edge intelligence in IoV. IEEE Trans. Intell. Transp. Syst. 2022, 23, 16643–16653. [Google Scholar] [CrossRef]
  5. Haris, M.; Shah, M.A.; Maple, C. Internet of intelligent vehicles (IoIV): An intelligent VANET based computing via predictive modeling. IEEE Access 2023, 11, 49665–49674. [Google Scholar] [CrossRef]
  6. Dwork, C. Differential privacy. In Proceedings of the International Colloquium on Automata, Languages, and Programming, Venice, Italy, 10–14 July 2006; pp. 1–12. [Google Scholar]
  7. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
  8. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  9. Abdalla, M.; Fouque, P.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Public Key Cryptography—PKC 2005, Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, 23–26 January 2005; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2005; pp. 65–84. [Google Scholar]
  10. Cremers, C.J. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols: Tool Paper. In Proceedings of the International Conference on Computer Aided Verification, Princeton, NJ, USA, 7–14 July 2008; pp. 414–418. [Google Scholar]
  11. Scyther Tool. Available online: https://people.cispa.io/cas.cremers/scyther/ (accessed on 5 July 2024).
  12. NS-3.29. Available online: https://www.nsnam.org (accessed on 5 July 2024).
  13. MIRACL Cryptographic SDK. Available online: https://github.com/miracl/MIRACL (accessed on 5 July 2024).
  14. Zhou, Z.; Chen, X.; Li, E.; Zeng, L.; Luo, K.; Zhang, J. Edge intelligence: Paving the last mile of artificial intelligence with edge computing. Proc. IEEE 2019, 107, 1738–1762. [Google Scholar] [CrossRef]
  15. Deng, S.; Zhao, H.; Fang, W.; Yin, J.; Dustdar, S.; Zomaya, A.Y. Edge intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet Things J. 2020, 7, 7457–7469. [Google Scholar] [CrossRef]
  16. Qi, W.; Li, Q.; Song, Q.; Guo, L.; Jamalipour, A. Extensive edge intelligence for future vehicular networks in 6G. IEEE Wirel. Commun. 2021, 28, 128–135. [Google Scholar] [CrossRef]
  17. Gong, T.; Zhu, L.; Yu, F.R.; Tang, T. Edge intelligence in intelligent transportation systems: A survey. IEEE Trans. Intell. Transp. Syst. 2023, 24, 8919–8944. [Google Scholar] [CrossRef]
  18. Zhang, Y.; Huang, H.; Yang, L.X.; Xiang, Y.; Li, M. Serious challenges and potential solutions for the industrial internet of things with edge intelligence. IEEE Netw. 2019, 33, 41–45. [Google Scholar] [CrossRef]
  19. Li, Y.; Yu, Y.; Susilo, W.; Hong, Z.; Guizani, M. Security and privacy for edge intelligence in 5G and beyond networks: Challenges and solutions. IEEE Wirel. Commun. 2021, 28, 63–69. [Google Scholar] [CrossRef]
  20. Xu, D.; Li, T.; Li, Y.; Su, X.; Tarkoma, S.; Jiang, T.; Crowcroft, J.; Hui, P. Edge intelligence: Empowering intelligence to the edge of network. Proc. IEEE 2021, 109, 1778–1837. [Google Scholar] [CrossRef]
  21. Villar-Rodriguez, E.; Pérez, M.A.; Torre-Bastida, A.I.; Senderos, C.R.; López-de-Armentia, J. Edge intelligence secure frameworks: Current state and future challenges. Comput. Secur. 2023, 130, 103278. [Google Scholar] [CrossRef]
  22. Jia, X.; He, D.; Kumar, N.; Choo, K.K.R. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 2019, 14, 560–571. [Google Scholar] [CrossRef]
  23. Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.; Choo, K.K.R.; Park, Y. On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system. IEEE Trans. Veh. Technol. 2021, 70, 1736–1751. [Google Scholar] [CrossRef]
  24. Ke, C.; Zhu, Z.; Xiao, F.; Huang, Z.; Meng, Y. SDN-based privacy and functional authentication scheme for fog nodes of smart healthcare. IEEE Internet Things J. 2022, 9, 17989–18001. [Google Scholar] [CrossRef]
  25. Seifelnasr, M.; AlTawy, R.; Youssef, A.; Ghadafi, E. Privacy-preserving mutual authentication protocol with forward secrecy for IoT-edge-cloud. IEEE Internet Things J. 2023, 11, 8105–8117. [Google Scholar] [CrossRef]
  26. Yadav, A.K.; Shojofar, M.; Braeken, A. iVFAS: An improved vehicle-to-fog authentication system for secure and efficient fog-based road condition monitoring. IEEE Trans. Veh. Technol. 2024, 1–16. [Google Scholar] [CrossRef]
  27. Kumar, P.; Om, H. Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET. Veh. Commun. 2024, 47, 100785. [Google Scholar] [CrossRef]
  28. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  29. Canetti, R.; Krawczyk, H. Universally composable notions of key exchange and secure channels. In Advances in Cryptology—EUROCRYPT 2002, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, 28 April–2 May 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 337–351. [Google Scholar]
  30. Oh, J.; Son, S.; Kwon, D.; Kim, M.; Park, Y.; Park, Y. Design of secure and privacy-preserving data sharing scheme based on key aggregation and private set intersection in medical information system. Mathematics 2024, 12, 1717. [Google Scholar] [CrossRef]
  31. Son, S.; Oh, J.; Kwon, D.; Kim, M.; Park, K.; Park, Y. A Privacy-preserving authentication scheme for a blockchain-based energy trading system. Mathematics 2023, 11, 4653. [Google Scholar] [CrossRef]
  32. Hou, W.; Sun, Y.; Li, D.; Guan, Z.; Liu, J. Lightweight and privacy-preserving charging reservation authentication protocol for 5G-V2G. IEEE Trans. Veh. Technol. 2023, 72, 7871–7883. [Google Scholar] [CrossRef]
  33. Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
  34. Park, K.; Lee, J.; Das, A.K.; Park, Y. BPPS: Blockchain-enabled privacy-preserving scheme for demand-response management in smart grid environments. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1719–1729. [Google Scholar] [CrossRef]
  35. Park, K.; Park, Y. MIoT-CDPS: Complete decentralized privacy-preserving scheme for medical internet of things. Internet Things 2024, 27, 101250. [Google Scholar] [CrossRef]
  36. Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
  37. Boyko, V.; MacKenzie, P.; Patel, S. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; pp. 156–171. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.