You are currently viewing a new version of our website. To view the old version click .
Cryptography
  • Article
  • Open Access

24 January 2024

Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks

,
and
1
School of Information Technology & Computer Science, Nile University, Cairo 3247010, Egypt
2
National Telecommunications Institute, Cairo 3650108, Egypt
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Advances in Authentication, Authorization and Privacy for Securing Smart Communications

Abstract

Conditional Privacy Preserving Authentication (CPPA) schemes are an effective way of securing communications in vehicular ad hoc networks (VANETs), as well as ensuring user privacy and accountability. Cryptanalysis plays a crucial role in pointing out the vulnerabilities in existing schemes to enable the development of more resilient ones. In 2019, Zhang proposed a CPPA scheme for VANET security (PA-CRT), based on identity batch verification (IBV) and Chinese Remainder Theorem (CRT). In this paper, we cryptanalyze Zhang’s scheme and point out its vulnerability to impersonation and repudiation attacks. In 2023, Zhang’s scheme was cryptanalyzed by Tao; however, we point out flaws in Tao’s cryptanalysis due to invalid assumptions; hence, we propose countermeasures to Tao’s attacks. Furthermore, in 2021, Xiong proposed a Certificateless Aggregate Signature (CLAS) scheme which is also cryptanalyzed in this paper. Finally, we analyze the causes and countermeasures by pointing out the vulnerabilities in each scheme that enabled us to launch successful attacks and proposing changes that would fortify these schemes against similar attacks in the future.

1. Introduction

Cooperative Intelligent Transportation Systems (C-ITS) are systems that employ inter-vehicular communication to provide a safer and more comfortable driving experience to road users, by sensing the surrounding road environment and pooling their collective data to make reliable decisions []. A C-ITS is composed of vehicles, roadside infrastructure and a traffic management authority. Therein, communication takes place in an ad hoc manner through self-organized networks called vehicular ad hoc networks (VANETs). The development of C-ITS has garnered substantial attention from the international community. The American government identified intelligence and connectivity as two of its core strategies, Japan recently released a report to share guidelines of autonomous driving, and Korea released a long term development plan aiming to achieve intelligent transportation systems nationwide by 2040 []. While cellular communication can be used in specific cases, the main standards of vehicular communication are the dedicated short-range communications (DSRCs) standard developed in the US, and the Intelligent Transportation System (ITS-G5) protocol developed by the European Telecommunications standards institute (ETSI) []. While both standards are fundamentally based on the IEEE 802.11p access layer developed for vehicular networks, a competing alternative called C-V2X has recently emerged, satisfying the low latency requirements as well as supporting high vehicle densities and/or speeds []. More efficient and scalable alternatives have recently come to light, like 802.11bd and New Radio V2X [], striving to satisfy stringent requirements of low latency, reliability, a maximum packet error rate of 10% with a minimum transmission radius of 300 m. To ensure proper functioning of C-ITS applications, it is required that large amounts of data are continuously exchanged. Owing to the life-critical nature of this data; authentication, confidentiality, integrity, privacy and revocability are non-negotiable security requirements to ensure proper functioning of VANETs.
To that effect, a multitude of works have strived to create Conditional Privacy Preserving Authentication (CPPA) schemes, which can be broadly classified into certificate-based schemes/Public Key Infrastructure (PKI) schemes, Identity-based schemes (IB), Group-signature-based schemes (GS) and Certificateless schemes (CL). In order to support scenarios of large vehicular densities, techniques to verify a batch of digital signatures simultaneously have been developed, leading to extensions of IB and CL schemes into identity-based batch verification schemes (IBV) and certificateless aggregate signature schemes (CLAS), respectively. While researchers are quick to claim that their schemes are provably secure, the literature proves otherwise since many contributions involve pointing out weaknesses in previous schemes, which is a necessary pre-requisite to their development. This highlights the importance of works that cryptanalyze prior works and point out points of vulnerability, which shall undoubtedly enhance the resilience of future schemes.
In 2019, Zhang et al. proposed an IBV scheme, PA-CRT [], based on the Chinese remainder theorem, and in 2023, PA-CRT was cryptanalyzed by Tao et al. []. However, we propose a simple modification to circumvent Tao’s attacks and conduct our own cryptanalysis of the PA-CRT scheme in this paper. In 2021, Xiong et al. proposed a CLAS scheme, CPPA-D [], which was cryptanalyzed by Shim [] in 2023. The authors introduced an improved scheme [] in 2023, which we also cryptanalyze in this paper. Accordingly, in this paper, our main contributions are as follows:
  • We show that Zhang’s IBV scheme [] is vulnerable to impersonation attacks where any member of a VANET can easily obtain the private information of other members and generate and sign messages on their behalf. We discuss causes and propose general improvements to the scheme to mitigate this attack. We also show that the same scheme [] is vulnerable to repudiation attacks where malicious users can send messages with false information using fake identities and escape retribution accordingly. This encourages them to send false information to suit their own purposes and easily escape accountability in case their messages are reported to a trusted authority. Finally, we point out the deficiencies in Tao’s [] cryptanalysis of Zhang’s IBV scheme [].
  • We show that Xiong’s CLAS scheme [] is vulnerable to bogus information attacks since partial private keys and pseudo-identities are not adequately verified and can be replaced by the sender of the message and still perform successful verification at the receiver’s end. We also show that the scheme is vulnerable to the same repudiation attack that afflicts Zhang’s scheme and point out a mistake in the batch verification equation.
The rest of this paper is set out as follows. Section 2 gives a general introduction to VANET security requirements, Section 3 presents related works, in which we succinctly describe earlier contributions of IBV and CLAS schemes and their development in recent years, Section 4 presents mathematical preliminaries, Section 5 presents our crypt analysis of Zhang’s scheme, Section 6 presents our crypt analysis of Xiong’s scheme and Section 7 presents our concluding remarks. A list of notations can be found in Table 1.
Table 1. Notations and terms.

2. VANET Security Requirements

In VANETs, vehicles communicate regularly with other vehicles as well as road infrastructure (RSUs) in order to exchange periodic safety messages. This communication is necessarily subject to stringent security requirements to preserve the safety and well-being of VANET users. In order to receive a message, it must be ensured that the vehicle has the capacity to receive and process the message (availability), furthermore, the vehicle must be able to verify that the message was sent by a legitimate participant (authentication) and contains valid information that is temporally relevant (integrity). From the sender’s perspective, it must be ensured that they are not vulnerable to any revelation of their private information (privacy) except by relevant authorities so that they may be held accountable in case of a dispute (traceability) and cannot deny having sent the message (non-repudiation). The features of privacy and traceability combined together constitute what has come to be one of the fundamental objectives of VANET security systems: conditional privacy. Conditional privacy stipulates that messages are transmitted anonymously by all participating members in VANETs and that all external parties, except law enforcement authorities, are incapable of discerning the identity of the sender of any message. Finally, one of the most important security objectives in any communication network is to guarantee that none but the intended recipient has the ability to infer sensible information from the contents of a message (confidentiality). While the importance of confidentiality in VANETs has been downplayed under the premise that everyone deserves access to the contents of basic safety messages that vehicles periodically transmit [], others have pointed out that confidentially is necessary in paid services and have constructed symmetric key exchange schemes accordingly [].
In order to guarantee the abovementioned security objectives, a combination of cryptographic approaches and intrusion detection approaches is used. Cryptographic protection can be construed as the first line of defense that offers preemptive protection against possible attacks, but once an attack occurs, intrusion detection may be employed to take necessary measures of damage control. This paper is primarily concerned with cryptographic techniques employed to preserve secure communications in VANETs. Intrusion detection in VANETs is also being studied extensively in the contemporary literature and reviews on contributions can be found in [,,].

2.1. Attacks on Availability

The objective of availability in VANETs is threatened by denial-of-service attacks and spamming attacks, in which a malicious user sends an excessive number of spam messages to a vehicle or RSU in order to prevent them from being able to access valid messages containing critical information. The attacker in this case is considered malicious since they do not derive any personal benefits from this attack. They are also considered active since they are not restricted to obtaining information but are instead instigating material change within the network. Finally, they could be insiders or outsiders since both have the ability to jam the network with spam messages. This type of attack is detected by machine-learning-based intrusion detection and could be mitigated by frequency hopping and channel switching techniques. Other threats to the objective of availability include blackhole and greyhole attacks in which malicious VANET users receive safety messages from other vehicles but refrain from transmitting all packets (blackhole) or selected packets (greyhole), and hence, legitimate users do not receive the required information. Attackers in this case are considered malicious since they do not reap personal rewards, active since they affect the network and must be insiders in order to receive the messages to begin with. Finally, the threat of a malware attack very imminently affects the objective of availability since malware afflicts VANET system components like OBUs and RSUs, rendering them unable to send or receive messages.

2.2. Attacks on Authentication

The objective of authentication in VANETs is threatened by a variety of impersonation attacks, in which an attacker claims a false identity in order to illegally obtain confidential information and perhaps send fake messages as well. Different impersonation attacks include a masquerading attack, in which the attacker assumes the identity of a legitimate node and sends and receives messages under this guise; a man-in-the-middle attack, in which the attacker impersonates two legitimate users having a private conversation and addresses each on behalf of the other, thus obtaining sensitive private information about both []; and a certificate replication attack, in which the attacker duplicates the identities of legitimate users in order to avert the trusted authority (TA) that supervises the VANET communications. Other more elaborate forms of impersonation attacks include a sybil attack, where, for example, the attacker generates 100 different identities and sends the same fake message of an upcoming road congestion through all of them, thus reinforcing the validity of this synthesized illusion and encouraging all legal participants to switch course to avoid the congestion, hence freeing up the road for this attacker. Other threats to authentication include attacks in which location information of the sender is falsified, like tunneling/wormhole attacks, in which the attacker exploits an alternative communication channel to create the illusion of being a neighboring node, whereas in fact, they are operating remotely; a similar example is a GPS spoofing attack in which the attacker falsifies their GPS information. Attackers in these cases are usually insiders to the VANET network, they could operate rationally or maliciously depending on whether they intend to simply cause harm or reap personal benefits, as in the example of the Sybil attack, or even more sinisterly launch these attacks for the purpose of terrorism. They could also be active or passive depending on whether they simply seek to extract useful information about other users for future exploitation or whether they seek to immediately send false messages within the network. These attacks are mitigated cryptographically using digital signatures, which are bound to the identity of the user using digital certificates [], as well as message authentication codes (MACs) which are keyed hash functions used to preserve message integrity and authentication.

2.3. Attacks on Integrity

The objective of message integrity is strongly intertwined with that of authentication, since in very simplistic terms, if an attacker were to send false information, they would probably assume a false identity to do so in order to avoid accountability. The same cryptographic primitives used to guarantee authentication (digital signatures and message authentication codes) also implicitly guarantee the integrity of the message since any change in the contents of the message would immediately change the associated digital signature/ authentication code. In [], an alternative way to mitigate attacks on message integrity was suggested, namely, through verification by correlation, where data from multiple sources are correlated using reputation-based systems in order to ensure the validity of received messages. Attacks on message integrity include message tampering, broadcast tampering and bogus information attacks, all of which involve injecting false data into the message and altering its contents. Other attacks on integrity include the replay attack where valid data are transmitted fraudulently under the premise of being temporally relevant, when it actually concerns a previous irrelevant time slot. Defense against replay attacks is achieved by appending a timestamp to each digitally signed message.

2.4. Attacks on Conditional Privacy

The objective of conditional privacy is threatened by attacks in which user data (specifically location data) are extracted from their sent messages, to be later used in exploiting them if valid data are inferred about locations which the user frequently visits. Protection against such attacks is achieved using privacy preserving techniques which include anonymous certificates (pseudo-identities), or group signatures, in which members within a VANET group anonymously sign messages on behalf of the group and other members can verify the signatures using the public key of the group. A group manager/opener is the only entity that has the authority to divulge the identity of the group member that signed the message in case of dispute, but other members can only verify that the signer is one of the legitimate group members without ascertaining which member of the group that is.

2.5. Attacks on Non-Repudiation

The objective of non-repudiation is inherently achieved in any system that employs public key cryptography where users sign messages using their private key and broadcast their public key to enable other users to authenticate. Since the private key of any user is inextricably linked to their public key, this implicitly guarantees that the signer of the message did in fact sign the message, so that they cannot deny having signed it later on. While symmetric key cryptography (in which both parties have equal access to the same encryption/decryption key) is advantageous over public key cryptography (in which users retain their private keys and only share public keys) in terms of efficiency and speed, it is only the latter that can guarantee non-repudiation which renders public key cryptography indispensable in any network security system, despite its relative complexity and high computational cost. The most common attack is a repudiation attack where the attacker can find means by which to escape accountability for their sent messages, this is achieved if the attacker exploits weaknesses in a scheme in order to broadcast messages using fake identities that do not undeniably condemn them.

2.6. Attacks on Confidentiality

Finally, the objective of confidentiality is achieved by simply encrypting messages before transmission. While the importance of confidentiality has been downplayed in many contributions, other contributions like [] focus exclusively on cryptographically ensuring confidentiality in VANETs and devising lightweight ciphers to achieve that. Attacks on confidentiality include eavesdropping attacks, which are passive rational attacks in which the attacker listens in on private conversations to extract useful information for personal gain, and traffic analysis attacks in which attackers analyze the frequency of transmitted messages in order to derive purposeful information.
Having detailed the various security objectives of VANETs, it is also important to mention another important objective without which VANET systems fail to operate reliably, namely, that of efficiency. Vehicles periodically send safety messages every 0.3 s, so for a high-density area, a vehicle would receive a huge number of messages every 0.3 s that need to be verified before the next batch comes in, hence batch verification (the simultaneous verification of a multiple of messages) is an essential component of VANET security.
In Table 2, we provide a summary of different VANET security requirements, threats and protection approaches.
Table 2. Summary of VANET security requirements, threats and protection approaches.
Having outlined the essential security requirements of VANETs, we discuss the historical development of IBV and CLAS schemes in the following section.

4. Preliminaries

In this section, we outline the theoretical underpinnings of the cryptanalyzed schemes, as well as the generic network model for VANET security schemes.

4.1. Elliptic Curves

We assume that F p denotes a finite field with prime order p , for elliptic curve E with equation y 2 = x 3 + a x + b   m o d   p , where 4 a 3 + 27 b 2 0 and a , b   F p . We assume that O denotes the point at infinity. The points of ECC make an additive group G with order q and generator P .
Point addition: Let P and S be two random points on ECC such that ( P , S ) G where the point P generates the group G with large prime order q . When P S , then R = P + S can be computed, where R denotes the intersection point of curve E and line P S , and when P = S , then R = P + S denotes the intersection of curve E with the tangent to E at P .
Scalar Point Multiplication: The scalar multiplication of E is defined as m P = P + P + + P   (m times), where m Z q * ,   m > 0 .
Elliptic Curve Discrete Logarithm Problem (ECDLP): Given two random points P , Q   G on curve E, where Q = x P ,   x Z q * , it has been proven difficult to calculate x , given P , Q .

4.2. Chinese Remainder Theorem

The Chinese Remainder Theorem (CRT) states that knowledge of the remainders of the Euclidean division of an integer n by several integers facilitates the determination of the remainder of the division of n by the product of these integers under the condition that they are pairwise relatively prime.
Let k 1 , k 2 , , k n be pairwise relatively prime positive integers such that gcd k i , k j i j = 1 and t 1 ,   t 2 , t n be any random integers. The Chinese Remainder Theorem (CRT) states that the congruence x t 1   m o d   k 1 ,   x t 2   m o d   k 2 ,   x t 3   m o d   k 3 , ,   x t n   m o d   k n   has a unique solution K , where K = i = 1 n k i = k 1 . k 2 . k n .
To obtain this solution, the key server calculates x = i = 1 n t i . K i . K i 1 m o d K , where K i = K k i and K i . K i 1 1 m o d k i .

4.3. Network Model

The most common network architecture used to model VANET security is the two-layer model which comprises a trusted authority (TA) in the top layer and vehicles and roadside units (RSUs) in the bottom layer.
  • Trusted Authority (TA): This is also known as the Trusted Third Party (TTP) or the Central Authority (CA). It is generally known to comprise a Key Generation Center (KGC) and a Tracing Authority/Tracing Manager (TRA/TRM). IBV schemes tend to combine the role of the KGC and the TRM, while CLAS schemes necessarily posit them as distinct entities. The KGC is meant to generate public and private keys (or partial keys) for all members to enable digital signature verification, while the TRM is meant to generate verifiable pseudo-identities for each member to enable traceability in case of disputes. Schemes occasionally propose redundant TAs with access to the same data repository to avert single points of failure.
  • Roadside Units (RSUs): They are connected to the TA with secure wired links and to vehicles with insecure wireless connections. Different schemes assume different levels of RSU trustworthiness, where the predominant assumption is that RSUs are honest but curious. The role of RSUs varies in different schemes, from being merely a gateway to relay messages from the TA to vehicles (and back) to being a group manager that issues signing and verification keys to members within its domain and managing localized groups.
  • Vehicles: Vehicles are assumed to be untrustworthy. They are equipped with onboard units (OBUs) which contain a tamper proof device (TPD). It is assumed that all vehicles will be equipped with TPDs, but schemes diverge on the assumption of an ideal TPD (secure enough to store the master secret key of the system for self-authentication) or a realistic TPD (where only the secret key of the corresponding user is stored, and authentication is carried out elsewhere).

5. Zhang et al.’s Scheme

In this section, we describe Zhang et al.’s scheme [] then perform cryptanalysis. Posited as a development to traditional IBV schemes, Zhang’s scheme seeks to overcome the traditional problem of storing the master key of the system in the TPD of each vehicle by introducing a Chinese Remainder Theorem-based group key exchange. The idea is that each legitimate vehicle uses its pre-stored secret key to compute a shared group key from information regularly updated by the TA and broadcasted to vehicles via the RSUs. Having obtained the group key by computing the broadcasted value of their prestored key, vehicles then proceed to generate digital signatures on their message using both the obtained group key and their own generated random nonces. In what follows, we describe the detailed proceedings of the scheme and then suggest possible attacks.

5.1. Description

We detail the procedure of Zhang’s scheme in Table 3.
Table 3. Zhang et al.’s scheme.

5.2. Cryptanalysis

In what follows, Bob is assumed to be an honest user and Oscar to be a malicious user, both are legitimate members of the same VANET. Figure 1 shows the setup and group key computation phases of the protocol, in the presence of malicious attacker Oscar.
Figure 1. Setup and group key computation phases in Zhang’s scheme.

5.2.1. Impersonation Attack

Bob broadcasts M B , I D B , T B , σ B to the network, and this information is received by Oscar, who is a legitimate member of the network and therefore has access to the group key k d . Accordingly, Oscar computes α B = H 2 ( I D B | | T B ) then computes S B = α B . k d   m o d   q and β B = H 3 ( I D B | | M B | | T B ) . Then, Oscar computes r B = σ B S B β B and consequently computes R I D B = I D B 2 H 1 ( r B . P P u b ) .
Oscar now has access to Bob’s real identity R I D B and the group key k d and can impersonate Bob in future messages. Figure 2 shows the impersonation attack.
Figure 2. Impersonation attack on Zhang’s scheme.

5.2.2. Repudiation/Spoofing Attack

Oscar obtains k d regularly from the broadcast, generates a fake identity R I D O * and computes a corresponding pseudo-identity P I D O * = I D O , 1 * ,   I D O , 2 *
Oscar uses k d and P I D O * in all further communications, and messages sent will be verifiable since the signature does not change if the value of R I D changes since each member generates the values of P I D based on their own generated random nonce. Even though it could be argued that the TPD prevents any member of the VANET from changing the value of their R I D , Oscar could still collude with Eve who is not constrained by a TPD, by giving her the group key k d and Eve can broadcast valid messages with verifiable signatures using a fake identity P I D E * . Since the value of R I D is fake or non-existent, Oscar (or Eve) could escape retribution for any false messages sent. Figure 3 shows the repudiation attack.
Figure 3. Repudiation attack on Zhang’s scheme.

5.3. Causes and Countermeasures

In what follows, we point out the underlying causes and possible counter measures for each attack.

5.3.1. Impersonation Attack

The problem with Zhang’s scheme is that the signature is only dependent on two private values, the group key and a random nonce, hence knowledge of the group key can immediately lead to the computation of the random nonce. Since σ i = S i + β i . r i , which is equivalent to σ i = α i . k d m o d   q + β i . r i , and since α i ,   β i are hash outputs of public values (and therefore computable by all members), and k d is known to all legitimate members of the VANET, any legitimate member can obtain r i from σ i received from any user. In other words, given σ i , Oscar can compute α i and β i , then they can obtain r i = σ i α i . k d β i . If the scheme is modified so that during signing, the TPD chooses a random value x i q and computes X = x i . P and modifies S i = α i . k d m o d   q to S i = α i . k d + x i m o d   q , then publishes value X with the broadcast, the verification equation at the receiver’s end becomes σ i . P α i . K p u b + β i . I D 1 + X .
This checks out because
σ i . P = S i + β i . r i . P = α i . k d + x i + β i . r i . P = α i . k d . P + x i . P + β i . r i . P = α i . K p u b + β i . I D 1 + X
This simple modification incurs a cost of one additional elliptic point addition at the verifier’s end, and Oscar can no longer compute r i = σ i α i . k d + x i β i since they do not possess knowledge of x i .

5.3.2. Repudiation Attack

The technique of generating pseudo-identities using a random nonce so that the real identity becomes irrecoverable except by the TA/TRM is optimal for solving the pseudonymity problem in VANETs. However, the scheme does not provide a method of verifying that the received pseudo-identities are indeed valid pseudo-identities. We suggest introducing pseudo-identity verification prior to signature verification; in other words, the KGC must authenticate the identity of the user before issuing their private key. Furthermore, the TA must play a role in generating the pseudo-identities for verification to be of any consequence. Delegating the responsibility of the TA to the vehicle’s TPD allows an insider member (Bob) to share the group key with an outsider (Oscar), and then, Oscar can share false information with valid self-generated credentials based on a fake identity. This highlights the importance of not relying on the TPD alone to generate a member’s identity, but rather having the TA sign the identity and not allowing the member to receive a signing key from the KGC until the signature of the TA/TRM on their PID is verified.

5.4. A Commentary on the Cryptanalysis of This Scheme by Tao et al. []

In [], it was stated that an outsider can collect different values of γ d , then, using the equation γ d = μ . k d and the fact that μ is constant and that only k d changes, the outsider can find μ as μ = g c d ( γ 1 ,   γ 2 , ,   γ n ) , the outsider can compute k d = γ . μ 1 .
We contest these claims on the grounds that μ is not in fact a constant, since μ = i = 1 n v a r i and every time a member joins (/leaves) the network, their corresponding v a r i is added (/subtracted) accordingly. Hence, μ changes with every join or leave operation. Despite the fact that it could be suggested that the scheme is still insecure because μ could be computed from successive broadcasts between which no join or leave operations occurred, we propose a simple countermeasure to that proposition. The TA can include a certain number of secret keys not given to any user in its computation of the group key, then, the TA could impose its own join/leave operations between successive broadcasts, utilizing any random subset of the fictitious secret keys to do so. In that sense, the TA could ensure that the value of μ changes between any two successive broadcasts without affecting the system performance in any significant way. Furthermore, a collusion attack between an insider and an outsider can easily achieve the same effect as Tao’s proposed attack, since the insider has access to k d and can share it with an outsider without being implicated. Finally, the group key, k d is meaningless without the possession of a legitimate value of s k i , and the attacker cannot create a valid signature without the latter, even if they are in possession of k d .
Having described and cryptanalyzed Zhang’s scheme, we proceed to describe and cryptanalyze Xiong’s scheme in the following section.

6. Xiong et al.’s Scheme

In this section, we describe Xiong et al.’s scheme [] and then perform cryptanalysis. Xiong’s scheme is an extension of their previous scheme with modifications to resist collusion attacks and also achieve efficiency gains. We now proceed to the detailed description of the scheme followed by a cryptanalysis.

6.1. Description

We detail the procedure of Xiong’s scheme in Table 4.
Table 4. Xiong et al.’s scheme.

6.2. Cryptanalysis

In what follows, Oscar is assumed to be a legitimate member of the VANET with malicious intentions, Bob is also a legitimate member but with honest intentions. Figure 4 depicts the setup, pseudo-identity generation and partial-private-key generation phases of the protocol.
Figure 4. Setup, PID and PPK generation phases in Xiong’s scheme.

6.2.1. Bogus Information and Repudiation Attack

Oscar honestly executes the setup phase, pseudo-identity generation phase and partial-private-key phase of the protocol. Then, Oscar generates a fake identity R I D O * and computes a new P I D O * on the basis of R I D O * . Oscar also substitutes p p k O with p p k O * , which is any randomly self-generated value such that p p k O * Z q * . Oscar continues the rest of the protocol normally and inputs any fake information in the message to suit their own purpose (bogus information attack). Verification of the message is successful because the verifier uses the transmitted P I D O * to verify. Furthermore, if the message is later reported to the tracing manager, it cannot retrieve R I D O since the fake identity R I D O * was used in the generation of the transmitted P I D O * . The attack is depicted in Figure 5.
Figure 5. Repudiation attack on Xiong’s scheme.

6.2.2. Other Flaws

Another issue with the scheme, in the signature aggregation phase, is that the verifier randomly chooses v Z q * then accordingly calculates p k = v . P ; however, the batch verification would not check out unless p k = v . P p u b . We assume that this is an unintentional mistake in the scheme, since all other random nonces in other phases were multiplied by P p u b to obtain their corresponding public values.

6.3. Causes and Counter Measures

There are two main problems in Xiong’s scheme. The first problem is that the TRM does not verify the generated pseudo-identities, as we indicated in our analysis of Zhang’s scheme, which gives malicious users the ability to generate P I D s based on fictitious values of R I D . This issue is common to both schemes. However, in Xiong’s scheme, even though the generation of the p p k by the KGC is mathematically related to the input P I D , by Q i = H 1 ( A i | | P I D i ) and p p k i = α i + s Q i   m o d   q , the verifier only uses the values transmitted by the sender to verify the message, which gives the sender the ability to generate any random p p k i * and use it to calculate subsequent parameters which leads to correct verification.
To counter these problems, we propose that the TRM validates the user-generated P I D s in such a way that the KGC is first able to verify their validity before issuing a p p k i . For example, an identity authentication module could be added to the scheme such that the KGC would not issue a partial private key until authenticating the TRM’s signature on P I D i . We also propose that Q i = H 1 ( A i | | P I D i ) , based on a validated P I D i , be part of the verification equation. This ensures that Oscar would not be able to generate a valid signature using a fake P I D O * since he must find a value for P I D O * that satisfies the equation H 1 A O * | | P I D O * = H 1 A O | | P I D O Q o * = Q O . This can only be accomplished by brute force if the hash function used is collision-resistant, which is an implicit assumption in all CPPA schemes. Finally, we propose that D i = p p k i . P be verified separately in order to prevent Oscar from substituting p p k i with p p k i * since this is a computationally hard problem under ECC.

7. Conclusions and Future Work

Recently, Zhang et al. [] and Xiong et al. [] proposed CPPA schemes based on IBV and CLAS, respectively. We first showed that, in Zhang’s scheme, an attacker Oscar can impersonate an honest user Bob by obtaining their real identity value R I D B and using it to send malicious messages. We also showed that in both schemes, Oscar can generate a fictitious value R I D O * to replace their real identity R I D O which would enable them to broadcast any malicious content or misleading information and escape retribution. Furthermore, in Xiong’s CLAS scheme, Oscar could replace the KGC-granted partial private key with a random value of their own creation and still pass verification successfully. Furthermore, we proposed modifications in Zhang’s scheme to circumvent Tao’s attacks in []. Finally, we discussed causes and countermeasures of our cryptanalysis on both schemes. Having pointed out the vulnerabilities in both schemes, we intend to propose a CLAS scheme that employs CRT-based group key distribution without exposure to impersonation and repudiation attacks. This will be implemented by introducing an identity authentication module to the CLAS scheme and then including the authenticated identity in the signature verification module.

Author Contributions

Conceptualization, writing original draft A.M.K.; review and editing, supervision H.A. and M.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hammi, B.; Monteuuis, J.-P.; Petit, J. PKIs in C-ITS: Security functions, architectures and projects: A survey. Veh. Commun. 2022, 38, 100531. [Google Scholar] [CrossRef]
  2. Chen, H.; Liu, J.; Wang, J.; Xun, Y. Towards secure intra-vehicle communications in 5G advanced and beyond: Vulnerabilities, attacks and countermeasures. Veh. Commun. 2022, 39, 100548. [Google Scholar] [CrossRef]
  3. Mannoni, V.; Berg, V.; Sesia, S.; Perraud, E. A comparison of the V2X communication systems: ITS-G5 and C-V2X. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–5. [Google Scholar]
  4. Cominetti, E.L.; Silva, M.V.M.; Simplicio, M.A., Jr.; Patil, H.K.; Ricardini, J.E. Faster verification of V2X basic safety messages via Message Chaining. Veh. Commun. 2023, 44, 100662. [Google Scholar] [CrossRef]
  5. Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans. Dependable Secur. Comput. 2019, 18, 722–735. [Google Scholar] [CrossRef]
  6. Tao, Q.; Ding, H.; Jiang, T.; Cui, X. B-DSPA: A Blockchain-based Dynamically Scalable Privacy-Preserving Authentication Scheme in Vehicular Ad-hoc Networks. IEEE Internet Things J. 2023, 11, 1385–1397. [Google Scholar] [CrossRef]
  7. Xiong, W.; Wang, R.; Wang, Y.; Zhou, F.; Luo, X. CPPA-D: Efficient conditional privacy-preserving authentication scheme with double-insurance in VANETs. IEEE Trans. Veh. Technol. 2021, 70, 3456–3468. [Google Scholar] [CrossRef]
  8. Shim, K.-A. Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs. IEEE Access 2023, 11, 33956–33963. [Google Scholar] [CrossRef]
  9. Xiong, W.; Wang, R.; Wang, Y.; Wei, Y.; Zhou, F.; Luo, X. Improved certificateless aggregate signature scheme against collusion attacks for vanets. IEEE Syst. J. 2022, 17, 1098–1109. [Google Scholar] [CrossRef]
  10. Raya, M.; Hubaux, J.-P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef]
  11. Chen, Y.; Yuan, J.; Zhang, Y. An improved password-authenticated key exchange protocol for VANET. Veh. Commun. 2021, 27, 100286. [Google Scholar] [CrossRef]
  12. Sharma, S.; Kaul, A. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Veh. Commun. 2018, 12, 138–164. [Google Scholar] [CrossRef]
  13. Gonçalves, F.; Ribeiro, B.; Gama, O.; Santos, A.; Costa, A.; Dias, B.; Macedo, J.; Nicolau, M.J. A systematic review on intelligent intrusion detection systems for VANETs. In Proceedings of the 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Dublin, Ireland, 28–30 October 2019; pp. 1–10. [Google Scholar]
  14. Bangui, H.; Buhnova, B. Recent advances in machine-learning driven intrusion detection in transportation: Survey. Procedia Comput. Sci. 2021, 184, 877–886. [Google Scholar] [CrossRef]
  15. Paar, C.; Pelzl, J. Understanding Cryptography: A Textbook for Students and Practitioners; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
  16. Raya, M.; Hubaux, J.-P. The security of vehicular ad hoc networks. In SASN ‘05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks; Association for Computing Machinery: New York, NY, USA, 2005; pp. 11–21. [Google Scholar]
  17. Noura, H.N.; Salman, O.; Couturier, R.; Chehab, A. LoRCA: Lightweight round block and stream cipher algorithms for IoV systems. Veh. Commun. 2022, 34, 100416. [Google Scholar] [CrossRef]
  18. Shamir, A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84 4; Springer: Berlin/Heidelberg, Germany, 1985; pp. 47–53. [Google Scholar]
  19. Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; pp. 213–229. [Google Scholar]
  20. Zhang, C.; Lu, R.; Lin, X.; Ho, P.-H.; Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 246–250. [Google Scholar]
  21. Zhang, C.; Ho, P.-H.; Tapolcai, J. On batch verification with group testing for vehicular communications. Wirel. Netw. 2011, 17, 1851–1865. [Google Scholar] [CrossRef]
  22. Chim, T.W.; Yiu, S.-M.; Hui, L.C.; Li, V.O. SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 2011, 9, 189–203. [Google Scholar] [CrossRef]
  23. Shim, K.-A. CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 2012, 61, 1874–1883. [Google Scholar] [CrossRef]
  24. Lee, C.-C.; Lai, Y.-M. Toward a secure batch verification with group testing for VANET. Wirel. Netw. 2013, 19, 1441–1449. [Google Scholar] [CrossRef]
  25. Bayat, M.; Barmshoory, M.; Rahimi, M.; Aref, M.R. A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 2015, 21, 1733–1743. [Google Scholar] [CrossRef]
  26. Tzeng, S.-F.; Horng, S.-J.; Li, T.; Wang, X.; Huang, P.-H.; Khan, M.K. Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans. Veh. Technol. 2015, 66, 3235–3248. [Google Scholar] [CrossRef]
  27. Ali, I.; Li, F. An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs. Veh. Commun. 2020, 22, 100228. [Google Scholar] [CrossRef]
  28. Ogundoyin, S.O.; Kamil, I.A. An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy. Veh. Commun. 2021, 31, 100384. [Google Scholar] [CrossRef]
  29. Al-Riyami, S.S.; Paterson, K.G. Certificateless public key cryptography. In Advances in Cryptology—ASIACRYPT 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 452–473. [Google Scholar]
  30. Zhong, H.; Han, S.; Cui, J.; Zhang, J.; Xu, Y. Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 2019, 476, 211–221. [Google Scholar] [CrossRef]
  31. Mei, Q.; Xiong, H.; Chen, J.; Yang, M.; Kumari, S.; Khan, M.K. Efficient certificateless aggregate signature with conditional privacy preservation in IoV. IEEE Syst. J. 2020, 15, 245–256. [Google Scholar] [CrossRef]
  32. Qi, J.; Gao, T.; Deng, X.; Zhao, C. A pseudonym-based certificateless privacy-preserving authentication scheme for VANETs. Veh. Commun. 2022, 38, 100535. [Google Scholar] [CrossRef]
  33. Horng, S.-J.; Tzeng, S.-F.; Huang, P.-H.; Wang, X.; Li, T.; Khan, M.K. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf. Sci. 2015, 317, 48–66. [Google Scholar] [CrossRef]
  34. Li, J.; Yuan, H.; Zhang, Y. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Cryptol. Eprint Arch. 2016. [Google Scholar]
  35. Zhao, Y.; Hou, Y.; Wang, L.; Kumari, S.; Khan, M.K.; Xiong, H. An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 2020, 31, e3708. [Google Scholar] [CrossRef]
  36. Ming, Y.; Shen, X. PCPA: A practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks. Sensors 2018, 18, 1573. [Google Scholar] [CrossRef]
  37. Cui, J.; Zhang, J.; Zhong, H.; Shi, R.; Xu, Y. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Inf. Sci. 2018, 451–452, 1–15. [Google Scholar] [CrossRef]
  38. Kamil, I.A.; Ogundoyin, S.O. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. J. Inf. Secur. Appl. 2019, 44, 184–200. [Google Scholar] [CrossRef]
  39. Li, C.; Wu, G.; Xing, L.; Zhu, F.; Zhao, L. An efficient certificateless aggregate signature scheme designed for VANET. Comput. Mater. Contin. 2020, 63, 725–742. [Google Scholar]
  40. Malhi, A.K.; Batra, S. An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discret. Math. Theor. Comput. Sci. 2015, 17, 317–338. [Google Scholar] [CrossRef]
  41. Kumar, P.; Kumari, S.; Sharma, V.; Li, X.; Sangaiah, A.K.; Islam, S.H. Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 2019, 75, 3076–3098. [Google Scholar] [CrossRef]
  42. Zhang, Y.; Deng, R.H.; Han, G.; Zheng, D. Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J. Netw. Comput. Appl. 2018, 123, 89–100. [Google Scholar] [CrossRef]
  43. Xu, Z.; He, D.; Kumar, N.; Choo, K.-K.R. Efficient certificateless aggregate signature scheme for performing secure routing in VANETs. J. Secur. Commun. Netw. 2020, 2020, 5276813. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.