A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT

View article
PeerJ Computer Science

Introduction

The Industrial Internet of Things (IIoT), also known as the industrial Internet, put forward the IoT advances in development (Shaikh, Zeadally & Exposito, 2015; Khalid et al., 2020a). IIoT integrates a wide range of existing industrial automation systems with the latest electronics, computing, machine learning, and communication technologies. IIoT claims that in gathering and communicating data, intelligent machines are more capable than humans (Khalid et al., 2021a). This data makes business intelligence activities simpler for the manufacturing and business communities (Sey, 2018). An extensive network of vehicles and roadside units communicating with each other to share information is the ad hoc vehicle network, an IIoT application (Latif et al., 2018; Al-Heety et al., 2020). VANET is a particular case of wireless multihop network, which has the constraint of fast topology changes due to the high node mobility. With the increasing number of vehicles equipped with computing technologies and wireless communication devices, inter-vehicle communication is becoming a promising field of research, standardization, and development. VANETs enable a wide range of applications, such as prevention of collisions, safety, blind crossing, dynamic route scheduling, real-time traffic condition monitoring, etc. Another important application for VANETs is providing Internet connectivity to vehicular nodes (Badis & Rachedi, 2015). These are networks for naturally created needs from connected vehicles—VANETs aim to provide comfort for travelers and improve road safety and congestion. VANETs, information about vehicle-to-vehicle (V2V), and vehicle-to-infrastructure (V2I) communication between the highway and urban scenarios are shared wirelessly. The growing number of vehicles on the road causes many major traffic problems every day, including traffic delays and pileups of cars (Kaiwartya et al., 2016; Khalid et al., 2017). The industrial IoT is an emerging implementation of IoT technologies in several contexts, such as automation, intelligence controls, smart cities, smart transportation, and smart grids (Rehman et al., 2021). It would be hard to incorporate industrial IoT solutions without the construction of an infrastructural network. It is important to understand unique IoT concepts when applying these methods to wireless IoT networks. One of the significant features of IoT networks is the collaboration between heterogeneous IoT devices. The Internet of Things (IoT) application areas have significantly increased as digital electronics and wireless networking evolve rapidly (Goudarzi et al., 2019). A broad range of technologies is currently funded, including industrial automation, smart transport, medical and e-health services (Javed et al., 2020). Low-weight, efficient communication between sensing devices and interoperability between various communication mechanisms is the IoT’s critical issue (Khalid et al., 2020b). The industrial IoT data created from billions of device-person interactions will be massive and complex and will suffer from many security and privacy issues, particularly concerning device authentication. Computer security researchers have developed many authentication protocols, implemented in the industrial IoT context, to overcome these security concerns (Ferrag et al., 2017). Vehicle ad-hoc networks (VANETs), an essential part of an intelligent transport system, will use less wired communications technologies to provide continuing and reliable network communications services (Manvi & Tangade, 2017). As illustrated in Fig. 1, VANETs are made of three essential entities: trust authority (TA), roadside units (RSU), and on-board vehicles (OBUs) (Sheikh & Liang, 2019).

  • OBU: Each vehicle must be linked to the TA with the private key and the public device’s necessary parameters. Secret information, such as private keys, is inserted into each vehicle’s tamper-proof device to allow only authorized parties to access the tamper-proof device. Individual safe values, such as true vehicle identity and a secret vehicle key, are pre-loaded by the device. The vehicles’ computation mechanism is also included in this system, and the hidden values are never revealed. OBUs routinely disseminate such data while traveling on roads, such as distance, current time, direction, speed, traffic conditions, and traffic events useful for other vehicles and RSUs. The 5.9 GHz Dedicated Short-Range Communication (DSRC) IEEE 802.11p is the communication protocol for neighboring OBUs.

  • TA: TA has registered OBUs and RSUs. It initializes them with the public system’s data or private keys. TA has a general computing and storage capacity and is the only party who can reveal the signers’ identity. The solution to TA is impossible, and both parties to the scheme fully trust it.

  • RSU: RSU is a stationary component system with DSRC wireless access point, stable memory storage, and computational capabilities. The time between requesting and receiving RSU responses is crucial for successfully disseminating data by VANETs, given the restricted transmission range of RSUs and vehicles’ movement. RSUs are known as fully trusted parties in the scheme.

The typical architecture of VANETs.

Figure 1: The typical architecture of VANETs.

However, VANET architecture dealing with a hundred vehicle devices for accessing and management, this large amount of data and information seems to be a large-scale environment. However, these systems are limited resource devices in computation, storage, and energy. Traditionally, most authentication schemes rely on Roadside units (RSUs) that mainly hold the data’s computing and processing. According to the large-scale architecture, the devices will deal with a large amount of data transmitted and processed. In a short time interval, several vehicles can continuously cross-practical areas of several RSUs. Also, at any time beyond prediction, the random vehicle can enter or leave the VANET network. The vehicles are also dynamically moved through different domains. This movement comes out with a critical problem across domain access. Because of the significant number of participating vehicles, the individual RSUs would have enormous time consumption and computation costs, which are crucial for limiting the comprehensive implementation of VANETs. Each vehicle and the RSU passed should be authenticated in time for each vehicle before exchanging vehicle data. Thus, this issue causes a significant delay and high computation costs, and it also increases the number of the interacted messages through a public network. Therefore, the VANET system will take a lengthy verification process before granting access (Picone et al., 2015). Likewise, transmitted data between the RSUs, OBUs, and the trusted party are sensitive. The adversaries are mainly targeting this information to delete, manipulate, eavesdrop on this data. Current authentication schemes are vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), and these attacks make the VANET system week (Deepa et al., 2021). For example, a MiTM attack occurs in the middle of V2V communication to check closely and alter the messages. The attacker can access and control the entire V2V communication, but the communication entities think they can communicate directly in private. Also, this way, each vehicle’s temporary identity changes over time, and a malicious attacker can hardly trace a specific vehicle. This is because after altering the certificate, an attacker would not link the new certificate with the old certificate, which means that the attacker has lost the target. However, this method still has some problems, such as high revocation costs. For example, when a vehicle is revoked, the number of pseudonymous certificates that need to be added to the Certificate Revocation List (CRL) could be too large. The size of CRL increases rapidly when the size of the network increases. These attacks could enable adversaries to enter the VANET system user’s registered ID, password and broadcasting a false message, or repeat/delay the transmission fraudulently (Khalid et al., 2021b). Also, preserving data confidentiality, privacy, and integrity in the trusted information context, where the information is shared between many parties, is becoming one of the most challenging issues for such a community. Therefore, a lightweight cross-domain authentication scheme for the VANET system is critically needed to satisfy the VANET’s security requirements.

Motivated by the above discussion on VANET secure transmission, we proposed an online/offline lightweight authentication scheme for VANET in industrial IoT. The offline joining and handover phase was added to avoid service interruption if the connectivity is down, allowing vehicles to send authentication requests. At the same time, they are temporarily disconnected from the Internet (Deepa et al., 2020). In offline authentication, TA is not involved in the joining procedure since the information is preloaded prior. The combination comprises the Advanced Encryption Algorithm (AES) and the Database Encryption RSA algorithm for the integrity, authentication, and distribution of the key. The algorithms have less encryption and decryption time in processing such extensive data. This mechanism also provides dual protection by taking advantage of the algorithms used, so the data transmission in the network will be more secure. The main advantage of this combination is that the AES-RSA encryption algorithm utilized the features of already existing algorithms which are very secure and difficult to break since it requires two different keys and algorithms. The strength of the security is improved by combining symmetric and asymmetric encryption methods where retrieval of the key is very difficult. The scheme ensures resistance against specific attacks, e.g., such as reply, modification, impersonation, and man-in-the-middle attacks. Also, it provides message integrity, authentication, and identity privacy preserving against change.

The study lists the findings as follows: in “VANETs security requirements,’’ we identify the security requirements of the VANET system; in “Related Work,’’ we review the previous studies and categorize their limitations; in “Preliminaries,’’ we give a brief introduction on RSA, and AES-RSA algorithms; in “proposed Scheme’’ presents the main finding of the study; in “Security analysis’’ verify the security aspects using BAN logic, and AVISPA tool; in “performance evaluation’’ we evaluate the performance of the proposed scheme; in “Conclusion’’ the study is finalized, and a brief conclusion is given.

Vanets Security Requirements

Vehicles in VANETs may detect nearby traffic details or an event to notify neighboring vehicles or the central traffic center. The authentication of messages can reduce these threats because of users’ wrong behaviors, such as false information transmissions, re-transmission of previous messages, and changes in the messages sent. Since users’ data should be kept secret, including driver names, speeds, positions, and relationships with other users, authentication should be performed anonymously (Khan et al., 2021). There is a contradiction between anonymity and dedication. As a result of anonymous authentication, unauthorized users should not utilize the network against external attackers (Hemalatha, 2021). If approved users do something wrong, anonymous authentication will not track them. For TA to determine the sender’s real identity, anonymous authentication should therefore be performed. We thus need the preservation of authentication protocols on conditional privacy. The security criteria for the VANETs are as follows:

  1. Message integrity and authentication: VANETs must be sure to create and send the received message through an approved OBU and that nobody modifies the received message. Moreover, the authentication scheme should be immune to impersonation, and no signature vehicle could be impersonated (Kumar & Singh, 2021).

  2. Identity privacy-preserving: The security of identity information underlines that by monitoring communications in VANETs, an intruder cannot identify either the initiators of the message or the party, including its originators. As vehicle names and locations are private and privacy disclosure is immoral, this is a critical property for VANETs.

  3. Traceability: This means that TA can identify the identity of the originators if appropriate. VANETs are susceptible to insiders without traceability, and a malicious user can easily give the other vehicle a wrong message and fool them.

  4. Unlinkability: Except for DTA, the RSU and the malicious vehicle should not determine two communications from the same vehicle.

  5. Resistance to attacks: Various common attacks occur in VANETs, such as the impersonation attack, the alteration attack, the replay attack, the man-in-the-middle attack, and the stolen verifier table attack, should be able to withstand the system.

Related Works

In recent years, security authentication and privacy protection have been a significant research orientation in VANETs. Several anonymous authentication schemes were suggested for VANETs. Azees, Vijayakumar & Deboarh (2017) proposed in 2017 an effective anonymous authentication scheme (EAAP) for VANETs. No storage of anonymous vehicle certificates and RSUs based on bilinear pairing is required by the trusted authority (TA) in the EAAP. In the case of a dispute, the trust authority will revoke and expose its real identity to a misbehaving vehicle’s privacy. The revoked identity is then put on the TA’s retained identity revocation list (IRL). Furthermore, without incentives, the enthusiasm problem still suffers when sending messages. Verma et al. (2021) presents a short digital signature scheme without pairing in a certificate-based setting with aggregation in an IIoT environment. In the SCBS scheme, each signer/user generates his/her (public and secret) keys and gets a certificate on (ID, public access) pair from CA. Certificates are sent via a public channel. During the execution of the signing phase, the signer requires his/her updated certificate along with a secret key. Similarly, Moni & Manivannan (2021) proposed a distributed and scalable privacy-preserving authentication and message dissemination scheme. Traditionally Certificates and CRLs were used for authenticating entities. However, as the number of entities grows, using CRLs for authentication incurs significant computation and communication overhead. In this scheme, a vehicle only needs to store the public key of the TA and the latest MHT root generation timestamp to authenticate RSUs. Similarly, MMPT is used by RSUs to authenticate vehicles, thus reducing the complexity involved in authenticating vehicles. Xie et al. (2017) subsequently introduced a new, efficient authentication process, using identity to relatively protect VANET applicants’ privacy. The ECC is used to solve the problem of the bilinear pairing because of its complex operations. The proposed system is an improved CPA solution based on (He et al., 2015) that is more effective than the former and fulfills VANET security requirements. The proposed scheme offers a simple message verification and batch message verification, where several messages can simultaneously be verified, and authentication costs are significantly reduced. However, a TA can track this vehicle when a vehicle broadcasts false information without preventing it from transmitting these messages. Furthermore, the identity of each vehicle can be easily discovered by an insider attacker since this attacker has private and public key pairs and has high computational and communication costs.

In Vijayakumar et al. (2018), a signature-based anonymity technique was suggested for vehicular ad hoc networks using bilinear pairing. However, this method eventually introduces enormous computational complexity and overhead, which are unfeasible for the RFID Tag resource restriction. A conditional monitoring mechanism is developed through which the TA tracks the wrong vehicles or RSUs in the IoT environment that misuse the VANET. The TA will, therefore, revoke the privacy of misbehaved vehicles for additional damage. Efficient authentication of the anonymous batch message (ABM) also suggested testing the authenticity of an RSU while sending a batch of messages via RSU to vehicles. However, because of the high overhead of communication, the high computational cost of the Certificate Revocation List (CRL) testing method makes it difficult to validate a large number of VANET messages over a specific period (Lu, Qu & Liu, 2018). Similarly, Pournaghi et al. (2018), proposed the NECPPA scheme, incorporating schemes based on RSU and TPD. The key concept for this system is that the master and public parameter is stored on the RSU TPD. This is because the connection between TA and RSU is secure and fast for communication. The RSU, therefore, generates the sub-master key inside the coverage area to be sent to all vehicles (Zmezm et al., 2015). The execution time during message generation and verification, however, is high (Al-Shareeda et al., 2020). Li et al. (2018) a conditional anonymous authentication of the VSNs’ privacy was proposed, while the authors suggested the VSNs’ design goals. Their scheme is robust and adopts pseudo-identity generation and private key extraction to maintain anonymity. To keep the privacy of its identity, every OBU should restore several pseudo-identities in this scheme. This scheme promotes the security and privacy needed for services rendered by VANET. However, the machine’s private key is pre-loaded into the car’s tamper-proof computer, which attackers can eliminate (e.g., through side-channel attacks). Hence, when the attackers have physical access to the tamper-proof device, their solution is not secure.

Likewise, an available certificates conditional privacy-preserving authentication scheme for vehicular ad-hoc networks was proposed by Ming & Shen (2018). Certificateless cryptography and elliptical curve cryptography form the basis of the proposed scheme (ECC). As an adversary would not connect a vehicle to its transmitted message, the system encourages conditional privacy and ensures unlinkability. In this work, however, the property of non-observability was not considered. Zhong et al. (2019) proposed a privacy protection scheme for safe V2I communications based on a certificateless aggregate signature, and the scheme could achieve complete aggregation. It utilizes the RSU as the aggregator to aggregate under its coverage the signatures signed by the vehicle. The authors attempted to fix the problem in the verification step and had a significant overhead in the signature authentication process. Unfortunately, their latest scheme uses the bilinear pairing operation and the Map-To-Point hash function in the verification process, which has added high overhead in verifier computation expense. A message verification scheme has been suggested for VANET (Cui et al., 2018). However, it is still not comparatively efficient due to the need for many EC operations, and the overhead for communication is high. The system (Cui et al., 2018) is vulnerable to attacks by impersonation, alteration, man-in-the-middle, and concatenation. A protocol for the vehicular environment was also proposed in 2018 by Mukherjee, Gupta & Biswas (2019). In this scheme, lattice-based cryptography is used. This scheme is secure in a quantum computing system, but the identity and password are stored directly in a tamper-proof device. If an opponent catches a TRD, then details may be leaked via the side-channel attack. A mutual authentication scheme was subsequently proposed for V2V in the ad hoc vehicle network to achieve better efficiency and security (Xie et al., 2017). Using elliptic curve encryption technology, the authors attempted to perform privacy-preserving mutual authentication for regular V2V communication. Sadly, their method is vulnerable to man-in-the-middle attacks and modification attacks. In 2020, instead of a map-to-point hash for safe V2I communication, Ali & Li (2020), using BP and a general one-way hash, introduced an ID-based framework. The messages are authenticated easily by an RSU within their scheme. Instead of map-to-point hash functions, it utilizes general one-way hash functions during high traffic density area verification. Since the private key generator (PKG) has access to all users’ private keys in identity-based schemes, the main escrow problems will occur if PKG was compromised. Lightweight security was suggested without using a single verification batch verification system (LSWBVM) scheme to broadcast many safety messages while driving (Al-Shareeda et al., 2020). However, because the verifying vehicle for signature authentication uses only a one-way hash feature, this system is vulnerable to various security threats, such as impersonation and alteration attacks. Also, since the timestamp is not included in the safety message tuple, it is prone to replay attacks. Besides the authentication and honesty requirements, this scheme does not meet in-vehicle systems. Moreover, since the name of the vehicle stored on TPD has not been updated for a long time, it is suspected of side-channel attacks.

In 2020, an anonymous authentication scheme based on community signature in VANETs was proposed by Jiang, Ge & Shen (2020) (AAAS). As a group manager, AAAS adds a regional trust authority (RTA) to provide anonymous vehicle authentication and communication services that can efficiently increase TA’s computing and communication costs and alleviate RSU pressure with low computing and storage capacity. However, the high traffic congestion increases the number of messages transmitted, which increases the overhead of computations and communications from VANET. A refiling framework has been developed for on-demand pseudonyms and certificates by Benarous et al. (2020); anonymous tickets and challenge-based authentication are the foundation of their scheme. The scheme’s effectiveness against the most popular security parameters is tested using several methods and techniques that have proven its efficiency and robustness, such as the BAN logic, SPAN, and AVISPA instruments. Recently, Alfadhli et al. (2020b) proposed a novel and successful CPPA-VANET solution based on lightweight pseudo-identity to overcome the crucial driving area and key escrow problems and provide better efficiency in terms of computation cost and overhead communications. Regrettably, the device also has a high computational cost in the authentication process and is prone to replay attacks. Similarly, Cheng & Liu (2020) an improved ECC authentication scheme based on RSU was proposed, in which RSU distributes vehicle pseudonyms when the vehicle pseudonyms are invalid. However, the password is estimated to have a low entropy secret value and vulnerable to password guessing attacks due to the built-in issues related to the password.

In Thumbur et al. (2020), to avoid the complicated public fundamental infrastructure certificate management problem and the Identity-based key escrow problem, a new VANET certificateless aggregate signature-based authentication scheme was proposed. All signatures/messages received from the surrounding vehicles are aggregated into a single signature by the RSU. AS/RSU can ensure that the related messages are signed by only the registered vehicles. The lack of an effective signature authentication process, however, increases the overhead of computing. Jiang, Ge & Shen (2020) and Jiang, Hua & Wahab (2020) also proposed a Self-checking Authentication Scheme with Higher Efficiency and Security for VANET, called SAES; the proposed scheme adopts pseudonym-based self-checking authentication. Unfortunately, the system also suffers from primary session attacks, modification attacks, and high processing costs due to the bilinear pairing. Similarly, for VANETs that protect privacy, a lightweight multi-factor authentication and security solution was introduced (Alfadhli et al., 2020a). It operates as authentication variables, a mixture of physically unclonable (PUF) functions and one-time dynamic pseudo-identities. The proposed scheme removes the need for a TPD to store sensitive long-term data (such as a fingerprint, password), enhancing the system’s effectiveness and security. Nevertheless, by analyzing the content of such captured messages in VANETs, an intruder can acquire the original identity and track its traveling routes. From the above analysis, we found out that most of the existing schemes suffer from high computation and communication costs because the architecture of VANET contains a considerable quantity of vehicles. Likewise, transmitted data between the RSUs, OBUs, and the trusted party are sensitive. The adversaries are primarily targeting this information to delete, manipulate, eavesdrop on this data. Some attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks) are vulnerable to current authentication systems, and these attacks make the VANET system week. Such attacks will probably allow adversaries to access the registered ID of the VANET device user and password and broadcast a false message or fraudulently repeat/delay the transmission. Though some research attention has been paid to date, the critical issue of cross-domain authentication has not been appropriately addressed in the VANET market. As a matter of fact, under the static trust model, most of the existing VANET authentication mechanisms tend to build up the verification process, where only the initial RSU opportunity is discussed. The CDA ability, in other words, was not considered at all. Both successive RSUs must request sensitive information from the cloud server for the remaining systems where the CDA issue has already been solved, causing unnecessary contact burdens and high latency. The comparison of the existing studies is shown in Table 1.

Table 1:
Comparison of the existing authentication schemes in VANET.
References Issue Structure Method Tool Objective Evaluation Parameters Limitation
Azees, Vijayakumar & Deboarh (2017) Malicious vehicle entering in the VANETs Centralized Bilinear pairing Cygwin 1.7.35-15, PBC library Track the vehicles that misuse the VANET or road-side units Computational cost and signature verification process Suffers from the problem of enthusiasm when forwarding messages
Verma et al. (2021) 2021Security issues, such as authentication, integrity, and confidentiality Centralized ECC JCA library and JPBC library Removes the certificate revocation queries in PKC Computation cost, Communication cost Vulnerability to attacks (e.g., insider attack, server spoofing attacks)
Moni & Manivannan (2021) Significant computation and communication overhead Centralized Merkle HashTree Crypto++ Reducing the complexity involved in authenticating vehicles Computation cost, Communication cost Key session attacks and replay attacks vulnerability
Xie et al. (2017) OBUs and RSUs are constrained in computing and cannot afford the verification of large messages Centralized ECC MIRACL library Ensures security and integrity for V2V and V2I communication messages Computation cost, Communication cost Any vehicle's real identity can be easily discovered by sufferers of high computing and communication costs and an insider attacker
Vijayakumar et al. (2018) High computational cost in the process of checking the certificate revocation list (CRL) Centralized Bilinear pairing PBC library Provide a conditional tracking framework in which the TA traces the misbehaving vehicles or RSUs Computational cost Suffers high communication overhead
Pournaghi et al. (2018) Increasing the number of revoked users allows the CRL volume to increase dramatically, which increases the signature verification period Centralized ECC OMNET ++ Provide a secure and fast communicational link between TA and RSU Computation cost, communication cost The execution time during message generation and verification are high
Li et al. (2018) Elevated computing criteria during certificate generation and message verification phases Centralized ECC, pseudo-identity PBC library To improve efficiency further Computation and communication overheads If attackers have physical access to the tamper-proof device, it is not secure
Ming & Shen (2018) Wrong output due to map-to-point hash and bilinear pairing operations requirements Centralized Certificateless cryptography and ECC MIRACL Crypto SDK, ns-3.26 simulator Reduce the cost of computing and communication Computation and communication costs Vulnerability to attacks (e.g., insider attack, server spoofing attacks)
Zhong et al. (2019) Large overhead in the signature authentication process Centralized Certificateless aggregate signature MIRACL library Reduce the computation cost in the sign phase Computation and communication cost Large overhead in the verification phase
Mukherjee, Gupta & Biswas (2019) An adversary can easily track a mobile node's route and the privacy of its driver Centralized lattice-based cryptography PBC library Assure secure communication Computation and communication costs Side-channel attack information could be leaked
Wu et al. (2019) High computational complexity Centralized ECC MIRACL library Achieve better performance and security Computation and communication costs Vulnerable to man-in-the-middle attack and modification attacks
Ali & Li (2020) Not successful in signing and checking a single message because of the comprehensive operations Centralized Bilinear pairing JPBC library Increases the efficiency Computation and communication costs Key escrow issues
Al-Shareeda et al. (2020) Massive overheads in computation, especially in the batch verification phase Centralized ECC MIRACL library To verify many messages Computation and communication overheads Vulnerable to replay attacks
Jiang, Ge & Shen (2020) The vehicle could not check the legal existence of the RSU response Centralized Pseudonym mechanism and group signature JPBC library To balance security and efficiency Communication overhead, computation cost, and signaling cost Increases the computations and communications overheads
Benarous et al. (2020) To acquire pseudonyms, pseudonym refilling is still preferred Centralized ECC PBC library Ensure the user's unlinkability and anonymity Computation and communication costs High computation cost
Alfadhli et al. (2020b) overcome the system key escrow problems Centralized Hash function only PBC library To protect the vehicle’s privacy Computation and communication costs Key session attacks and replay attacks vulnerability
Cheng & Liu (2020) Vulnerable to impersonation attacks and reveal the privacy of users during the communication process Centralized ECC PBC library Avoiding the risk of compromising the TPD of one vehicle leading Computational and communication overhead Password guessing attack
Thumbur et al. (2020) The complex certificate management problem Centralized ECC MIRACL library Avoid key escrow problem Computational and communication overhead Signature checking increases the computation overhead
Jiang, Hua & Wahab (2020) The batch verification can fail due to an invalid request problem Centralized pseudonym PBC library, NS2.34 Minimize the authentication cost Computational, communication cost, average delay, and the packet loss ratio High computation cost due to the utilized bilinear pairing
Alfadhli et al. (2020a) Cloning or physical attack Centralized bilinear pairing PBC library Enhances the system security and privacy Computational and communication overhead Large overhead in the verification phase
DOI: 10.7717/peerj-cs.714/table-1

Preliminaries

In this section, the mathematical concept of RSA and the AES-RSA algorithm steps proposed are discussed. First, the basic definition and properties of the RSA algorithm are highlighted to explain RSA encryption and decryption. The combined AES-RSA algorithm is also described to understand the workflow on the sender and receivers’ sides. Figure 2 shows the workflow diagram of the AES-RSA algorithm.

The AES-RSA algorithm work diagram.

Figure 2: The AES-RSA algorithm work diagram.

RSA cryptosystem

Here, the basic description of the RSA cryptosystem and its properties are discussed. Two appropriate primes p, q and n = p * q are selected by Server TA as well as (n) = (p − 1) * (q − 1). TA is now choosing an integer e such that gcd(e, (n)) = 1. Further, TA computes de − 1 mod(n). Finally, the public key for TA is (e, n), and d is the private key. The algorithm’s description is given as:

  • Encryption: OBUs take the message m and the public key e from TA in RSA encryption and encrypt the message as c = me and send the output c to TA.

  • Decryption: TA takes cipher c and its private key d on the RSA decryption server and decrypts cipher c as m = cd and gets the message.

AES-RSA encryption/decryption

The AES-RSA algorithms’ steps on both sides, sender, and receiver are shown in this section. The steps are shown as follows:

Encryption:

  1. User data, i.e., identity and information, are given input to the AES and SHA-2 algorithms.

  2. SHA-2 is hashing algorithm used to generate the hash value of the given plaintext.

  3. The RSA is used to encrypt the hash value using the public key and produce the digital signature.

  4. The plaintext is also encrypted with an AES using the AES’s public key.

  5. Then, the RSA public key is used to encrypt the text encrypted with an AES.

  6. The digital signature is now padded with an AES encrypted text and sent through the cross-domain Internet to the receiver side.

Decryption:

  1. The receiver now receives the message it decrypts the digital signature using the sender’s public key to retrieve the encrypted text and the hash value.

  2. The retrieved encrypted text is decrypted using it is the public key to obtain the plaintext.

  3. Then, the hashed value is decrypted into a message digest using the RSA’s private key.

  4. The decrypted text from the AES is passed to SHA-2, and the hash value is generated for the input plaintext.

  5. The generated hash value is then compared to the one generated from the RSA and SHA-2 to check the message’s validity.

  6. If both are matched, then the integrity of the message is achieved.

Proposed Scheme

The lightweight authentication scheme for the VANET cross-domain system in industrial IoT is proposed in this section. The system includes entities such as the Trusted Authority (TA), the Domain Trusted Authority (DTA), road-side units (RSUs), and vehicles (Vi). The proposed scheme comprises eight phases: the setup phase, the vehicle registration phase, the domain TA registration phase, the RSU registration phase, the online joining phase, the online crossover phase, the offline joining phase, and the offline crossover phase. Figure 3 displays the proposed scheme’s network diagram. The notations and definitions used in the scheme are shown in Table 2. The phases of the scheme proposed are described in detail below.

Network diagram of the proposed scheme.

Figure 3: Network diagram of the proposed scheme.

Table 2:
Notations.
Notation Definition
TA Trusted authority
DTA Domain trusted authority
RSU Road-side unit
Vi Vehicle
p,q Large prime numbers
h():{0,1} One-way hash function
sZq, TA’s secret key
VIDi Vehicle’s identity
TArsapk TA’s RSA public key
TAaespk TA’s AES public key
TArsae TA’s RSA private key
texp Expiration of secret key
KTAv,KvTA A key session between Vi and TA
IDdta DTA identity
KTADTA, A key session between TA and DTA
IDrsu RSU identity
KDTARSU The key session between DTA and RSU
rvj, r2dta, rrsu Random numbers
Signdta DTA signature
Signrsu1 RSU signature
T1, T2, T3 Timestamps
DOI: 10.7717/peerj-cs.714/table-2

Setup phase

To initialize the system, the trusted authority TA selects two large primes p, q and computes n = p, q. The trusted authority TA keeps p, q as secret parameters and publishes n as a public parameter. Then, the trusted authority TA chooses a prime e (where 1 < e < (p − 1)(q − 1)) and computes d such that ed1 mod (p − 1)(q − 1). The trusted authority TA also chooses a one-way hash function h(): 0, 1* → Z * q. The trusted authority TA publishes e as public and keeps d as secret. Also, the TA choose an encryption/decryption pair Enc{.}, Dec{.} related to AES-RSA algorithm. The exchanged messages are encrypted using AES public key for secure transmission. The RSA public key is also used to encrypt the generated signature to provide integrity, confidentiality, and authenticity.

Vehicle registration phase

In this phase, the vehicle must be registered at the trusted authority TA to authenticate to the distributed domains. The vehicle initializes the session by sending the identity and other security parameters to the TA via a secure channel. The transmitted message is protected where the information is double encrypted using the AES-RSA algorithm. When the TA receives the message, it checks the existence of the information in the database; if the vehicle is registered, the server will send a notification; otherwise, the vehicle performs the following steps as shown in Fig. 4.

  1. Firstly, the Vehicle Vi randomly picks a secret key sZq, secret value Ri, and computes Ai = a.p. Then, it computes Ti = H(VIDis), and encrypt the hash value with RSA’s public key Enc_TArsapk{Ti}. The vehicle parameters and it is identity are concatenated and encrypted with AES’s public key CTVTA=Enc_TAaespk{Ai,Ri,Enc_TArsae{Ti}}. The vehicle sends the CTV TA to the TA.

  2. The trusted authority TA receives the message CTV TA from the vehicle, it will decrypt the CTV TA using it is public-key Dec_TAaespk{Ai,Ri,Enc_TArsapk{Ti}} to obtain the encrypted identity and the parameters <Ai,Ri,Enc_TArsae{Ti}>.

  3. Then, it uses the RSA private key Dec_TArsad{Ti} to obtain the vehicle identity VIDi. TA will select a few random values rvjZq to calculate vehicles pseudonyms FIDv=H3(VIDi,rvj) and corresponding public key PKvj=H1(psvtexpv), and private keys SKvj=d.PKvj, where texp is the expiration of rvj,1<j<n,n is the total number of each vehicle obtaining pseudonym. Later, TA calculates the session key with the vehicle KTA→v = d.Ai and encrypts <rvj,SKvj,texpv,Ri> to get CTTAv=Enc_KTAv{rvj,SKvj,texpv,Ri}. Finally, it stores <VIDi,rvj,SKvj,texpv,Ri>, and encrypt the ciphertext with AES public key CTTAvaes=Enc_TAaespk{CTTAv} and sends CTTAvaes to the vehicle.

  4. Upon receiving CTTAvaes from TA, Vi decrypts it Dec_TAaespk{CTTAv} to obtain Enc_TAaespk{CTTAv} and calculates the session with TA Kv→TA = s.PKTA and decrypts CTTA v to obtain <rvj,SKvj,texp,Ri>. After obtaining Ni, vehicle verifies it and stores <rvj,SKvj,texp>. Otherwise, the vehicle needs to reapply for registration.

Vehicle registration phase.

Figure 4: Vehicle registration phase.

Domain TA registration phase

This phase enables the domain trusted authority DTA to register itself into the trusted authority TA. The DTA sends a registration request containing the hashed value of the domain along with a freshly generated random number. Figure 5 shows the steps of the current phase. Then, TA checks whether the identity already exists in the database or not; if yes, send a notification; otherwise, apply the following steps:

  1. Firstly, DTA selects a random number r2dtaZq as a secret key and compute Aidta=r2dta.p,andHIDdta=H1(IDdtar2dta). Then encrypt the hashed identity with RSA’s public key Enc_PKTA{HIDdta,r2dta,Aidta,Ri}, to get the ciphertext CTDTATA=Enc_PKTAHIDdta,r2dta,Aidta,Ri, where Ri is the secret value. The AES’s public key is then utilized to encrypt the ciphertext CTDTA TA to get CTDTAβTAaes=Enc_TAaespk{CTDTATA}. DTA sends CTDTATAaes to TA.

  2. When TA receives CTDTATAaes, it will first decrypt Dec_TAaespk{CTDTATA}, and then decrypt the ciphertext Dec_TArsadHIDdta,r2dta,Aidta,Ri using it is the private key to obtain <HIDdta,r2dta,Aidta,Ri>, it also calculates it is a private key SKdta = d.PKdta, where PKdta=H1(IDdtatexpdta) is the public key of DTA, and texpv is the expiration of SKdta. TA calculates the shared session key with DTA KTAβDTA=d.r2dta.p and encrypt the parameters <SKdta,texpv,Ri> with the session key CTTAβDTA=Enc_KTAβDTASKdta,texpv,Ri. Finally, the ciphertext is further encrypted with AES public for secure communication CTTADTAaes=Enc_TAaespk{CTTADTA}, and sends CTTADTAaes to DTA.

  3. Upon receiving CTTADTAaes from TA, DTA decrypts it using AES public key and then decrypts CTTA DTA. DTA computes KTAβDTA=d.r2dta.p to obtain SKdta,texpv,Ri. DTA then validate the Ri, if valid, DTA stores SKdta,texpv; otherwise, DTA rejects it.

Domain trusted authority registration phase.

Figure 5: Domain trusted authority registration phase.

RSU registration phase

All RSUs submit their registration information to DTA within their domain area. Before the RSU registration phase, the DTA select a group private/public key that only valid in this area based on RSA key generation skdta=r2dta, and pkdta=r2dta.p. Then DTA uses the private key skdta to generate signature Signdta=Sign_skdta{HIDdta,texpdta,pkdta}. DTA also calculates Xdta=r2dta.pkdta,Idta=Xdta+H2(Mdta,Xdta) where Mdta is Mdta=HIDdtatexpdtapkdtar2dta. The DTA then concatenated the signature with the message CTDTARSU=Enc_DTADTARSUaes{SigndtaMdta}, and broadcasting CTDTA→RSU to the RSUs in this domain. Upon receiving CTDTA→RSU, RSU decrypts it Dec_DTADTAβRSUaes{SigndtaMdta} to obtain the parameters and compute the public key based on domain identity and expiration time pkdta=H1(HIDdtatexpdta). The RSU validates the Signdta by comparing it with new computed signature SigndtaSigndta, if valid, stores HIDdta,texpdta,pkdta and apply the registration steps and as shown in Fig. 6.

  1. The RSUs generates a random number rrsuZq as a secret key and computes Airsu=rrsu.p, and RIDrsu = H1 (IDrsurrsu). RSU encrypt the parameter RSA’s public key CTRSU→DTA = Enc_PKDTA {RIDrsu, rrsu}, Airsu,Ri, where Ri is the secret value. Then, generate ciphertext using AES’s public key CTRSUDTAaes=Enc_DTAaespk{CTRSUDTA}, and sends CTRSUDTAaes to DTA.

  2. Upon receiving CTRSUDTAaes, DTA decrypts is using Dec_DTAaespk{CTRSUDTA}, and also decrypts Dec_DTArsad{RIDrsu,rrsu,Airsu,Ri} to get <RIDrsu,rrsu,Airsu,Ri>. DTA generates a RSU’s private key SKrsu=r2dta.PKrsu, where PKrsu = H1 (RIDrsu.rrsu). Then, it calculates the session key with DTA KDTARSU=r2dta.rrsu.p, and CTDTARSU:Enc_KDTARSU{SKrsu,texprsu,Ri+1}, where texprsu is the expiration of SKrsu. The ciphertext is further encrypted with AES’s public key CTDTARSUaes=Enc_RSUaespk{CTDTARSU}, and sends CTDTARSUaes to RSU.

  3. After receiving the RSU decrypts Dec_RSUaespk{CTDTARSU}, to obtain CTDTA RSU and compute session key with DTA KDTARSU=r2dta.PKdta and decrypts Dec_KDTARSU{SKrsu,texprsu,Ri+1}, to get <SKrsu,texprsu,Ri+1> if valid, stores SKrsu,texprsu. Otherwise, RSU rejects it.

RSU registration phase.

Figure 6: RSU registration phase.

Online joining phase

In this phase, the vehicle will send a joining request to the DTA through the RSU. The information is broadcasted to each vehicle within the domain to enable the vehicle to get authenticated. The joining steps are shown in Fig. 7 and described as follow:

  1. The RSU1 broadcasts IDrsu1,texpdta,texprsu,T1,Ri,IDdta,PKdta,Signrsu1) and Signdta regularly, where Signrsu1)=Sign_skrsu1){IDrsu1),IDdta,texprsu,T1,Ri}, and calculates Xrsu1=r2rsu.pkrsu1),Irsu1=Xrsu1+H2(Mrsu1),Xrsu1), and Mrsu=IDrsu1IDdtatexprsu1T1Ri. Then, it encrypts it using AES public key CTRSUV=Enc_VRSUVaes{Signrsu1Mrsu}, and sends CTRSUV to the vehicle.

  2. Upon receiving, Vehicle decrypt CTRSU V using the public key Dec_VRSUVaes{Signrsu1)Mrsu} to get the signature. Then, it computes pkdta=H1(HIDdtatexpdta and verifies Signrsu1), if invalid, end the session; otherwise, the vehicle continues to verify the freshness of the timestamp T1 and validity of the Signrsu1), if validation successful, DTA and RSU1 are considered legal entities. Vehicle choose a random number r2vZq and compute session key with RSU1 K(VRSU1)=r2v.Xrsu1) and the session key with DTA KVDTA=r2v.Xdta respectively. The vehicle finally choose pseudonyms FIDv=H3(VIDi,rvj) and generates the signature Signv=Signskv{FIDv,texpv,T2,Ri}. It also calculates Xv=r2v.pkv,Iv=Xv+H2(M(v),Xv), and Mv=FIDvtexpvT2Ri and encrypts the secret value Enc_Kv RSU1Ri, and Enc_Kv DTARi. Then AES public utilized to encrypt the message CTvrsu1/DTA=Enc_Vvrsu1/DTAaes{SignvFIDvT2Mrsu} to RSU1.

  3. When the RSU1 receives the message, it decrypts the Dec_Vvrsu1/DTAaes{SignvFIDvT2Mrsu} and verifies Signv, T2, and texpv accordingly. If the verification goes well, RSU1 generates a shared session key KRSU1v=r2v.Xv to decrypt Enc_Kv RSU1 and check the validity of Ri. Finally computes CTv DTA = Enc_CTv RSU1{Ri} and sends CTrsu1v=Enc_Vvrsu1aes{texpvFIDvCTvDTA} to DTA.

  4. Upon receiving the message, DTA computes the session key KDTAv=r2dta.Xv and decrypts Dec_Vvrsu1aes{texpvFIDvCTvDTA} and also decrypt CT(v DTA) to get Ri. If valid, DTA generates a group of identities MIDvi and the group private key skMIDvi=r2dta,ski for the vehicle. The DTA encrypt the message using the session key CTDTAv=Enc_KDTAv{MIDvi,skMIDvi,texpMIDvi,Ri}, where texpMIDvi is expiration of MIDvi. The DTA sends CTDTA v to RSU1, and RSU1 forwards the CTDTA→v, and CTRSU V to vehicle.

  5. The vehicle decrypts the CTRSU→V and verify the secret value Ri, if valid, then a secure channel is established. The MIDvi, skMIDvi,texpMIDvi), and Ri is obtained now after decryption, and vehicle stores MIDvi,skMIDvi,texpMIDvi.

Online joining phase.

Figure 7: Online joining phase.

Online crossover phase

When the vehicle crosses from one domain to another, it needs to send a joining request to the RSU2 located in different geographical domains. After the RSU2 broadcasted the information to each vehicle, it will send an authentication message to RSU2, where this phase is called the crossover phase. Figure 8 shows the steps of this phase and described as follows:

  1. The RSU2 broadcasts IDrsu2,texprsu2,T3,Ri,Signrsu2 and Signdta regularly, where Signrsu2=Sign_skrsu2{IDrsu2,texprsu2,T3,Ri}, and calculates Xrsu2=r2rsu2.pkrsu2,Irsu2=Xrsu2+H2(Mrsu2,Xrsu2, and Mrsu2=IDrsu2texprsu2T3Ri. Then, it encrypts it using AES public key CTRSUV=Enc_VRSUVaes{Signrsu2Mrsu2}, and sends CTRSUV to the vehicle.

  2. The vehicle gets the message and decrypts it using AES’s public key Dec_VRSUVaes{Signrsu2Mrsu2} to obtain a signature, then it verifies the T3 whether is fresh or not, if not, end the session. Otherwise, the vehicle generates a shared session key with RSU2 KVRSU2=r2v.Xrsu2,G_Sign_SKMIDvi{MIDvi,T4,texpMIDvi,Ri},Xrsu2=r2rsu2.pkrsu2,Irsu2=Xrsu2+H2(Mrsu2,Xrsu2), and Mrsu2=IDrsu2IDdtatexprsu2T4Ri. Then, it encrypts it using AES public key CTVRSU2=Enc_VVRSU2aes{SignvMrsu2}, and sends CTVRSU2 to the RSU2.

  3. The RSU2 first decrypts Dec_VVrsu2aes{SignvMrsu2}, and verifies the timestamp T4, and signature Signv by computing the public of the vehicle pkMIDvi=H1(MIDvitexpMIDvi), if invalid, end session; otherwise, vehicle MIDvi is legal. Finally, RSU2 generates a shared session key with the vehicle KRSU2v=r2rsu2.Xv, and compute CTRSU2v = Enc_kRSU2v {Ri}, then encrypt the ciphertext using AES public key Enc_Vrsu2vaes{CTrsu2v), and send it to the vehicle.

  4. The vehicle uses the AES public key to decrypt the message Dec_Vrsu2vaes{CTrsu2v}, to obtain CTrsu2 v to decrypt it using a shared session key Kvrsu2=r2rsu2.Xrsu2, if the secret value Ri is valid, then a trust relationship is created; otherwise, authentication fails.

Online crossover phase.

Figure 8: Online crossover phase.

Offline crossover phase

As the secret credentials have been preloaded priorly into the RSUs, the movement from RSU1 to RSU2 does occur dynamically. Therefore, when the vehicle leaves RSU1, crossover authentication is required to execute. The following steps are described as follows:

  1. The RSU2 preloads the parameters rvj,SKrsu2j,texp,Ri,TIDv,IDrsu2,texpdta,texprsu,T1,Signrsu2, where the Signrsu2:Sign_SKrsu2{IDrsu2,texprsu2,T2,Ri,TIDv,rrsu2}, where texprsu2 is the expiration of SK rsu2, and rrsu2Zq is a random number. The RSU2 encrypts the offline signature using AES public key CTrsu2 v: {Sign rsu2} and sends CT rsu2v to vehicle.

  2. Upon receiving CT rsu2 v, vehicle decrypts it using the public key to get the offline signature Sign rsu2, then decrypt the signature using the private key of the vehicle to obtain <IDrsu2,texprsu2,T2,Ri,TIDv,rrsu2>. The vehicle verifies the timestamps T2, if not fresh, authentication failed; otherwise, the vehicle generates a shared session key K(vrsu2)=r2v.Xrsu2 and select a unique private key to sign IDrsu2,texprsu2,T2,Ri,TIDv,rrsu2>,Signrsu2:Sign_SKrsu2{IDrsu2,texprsu2,T2,Ri,TIDv,rrsu2>,}, and then it encrypts the signature using AES public key CTv rsu2: {Sign rsu2} and sends CTv rsu2 to RSU.

  3. After receiving CTv rsu2 from the vehicle, RSU2 decrypts it using AES public key to obtain the signature Sign rsu2, then use the RSU2 private key to get the parameters texprsu2,T2,Ri,TIDv,rrsu2. RSU2 verifies the texprsu2,Ri,and T2, if verification is not equal, end session. Otherwise, generate a shared session key with the vehicle Krsu2v=r2v.Xrsu2, and compute CT_Krsu2 v {Ri} and sends CT_Krsu2→v to vehicle.

  4. The vehicle receives the message using CT_Krsu2 v {Ri}, if the secret value is not matched, terminate the session. Otherwise, an offline authentication is established between the vehicle and RSU2.

Security Analysis

We provide a complete overview of the proposed scheme’s security in this section to illustrate how the proposed scheme has provided robust security. The study was carried out using Burrows, Abadi, and Needham’s logic in our scheme to demonstrate mutual authentication between the vehicle and other participating entities (BAN). Finally, in this section, a theoretical security examination, called informal analysis, has been discussed.

Informal analysis

The proposed scheme’s security has been discussed in this sub-section in an informal review to show that the scheme provides strong security protection for associated security properties and attacks. We justify the defence of the device and attacks in the following terms of security properties. Table 3 shows the comparison of the security features of the proposed scheme against other schemes.

  1. Message Integrity and authentication: In the proposed scheme, a hash function h(·): 0,1 *→Z * q is utilized to the message signature that makes the faking of the message is impossible. To generate the signature, the message is further attached with secret key of the RSA algorithm to the hashed value of the message, e.g., Signdta=Sign_skdta{HIDdta,texpdta,pkdta} by the sender. Upon receiving, the receiver can decode the message and check its validity by comparing it with the latest computed message and the RSUs. DTA can effectively ensure the message’s integrity. Therefore, message integrity and authentication are supported by the proposed scheme.

  2. Message unforgeability: The proposed scheme is achieved by Signdta, and h(·). The trusted authority generates the signature with a private key d, and this key is held secretly by the TA. The attacker is, therefore, cannot compute the session key that shared between entities and TA; the session KTA→v = d.Ai is based on the secret key of the TA, and the attacker cannot forge the message. Also, the exchanged messages are further encrypted using the AES public key for secure communication; thus, the attacker cannot obtain the secret value Ri of the entity. Therefore, only the specified RSUs, can obtain Ri, and the proposed scheme can protect the message from being forged and generate the related hash function.

  3. Identity privacy-preserving: The pseudonyms FIDv=H3(VIDi,rvj),HIDdta=H1(IDdtar2dta), and RIDrsu = H1 (IDrsurrsu) are hashed along with identity and the random number; hence, the adversaries cannot obtain the vehicle’s real identity and RSUs. Furthermore, it used to calculate several parameters Ti=H(VIDis),PKdta=H1(IDdtatexpdta), and Mdta=HIDdtatexpdtapkdtar2dta the attacker cannot obtain the real identity because the identity is secured using a one-way hash function. Also, in each communication session, the pseudonyms used are different, so no opponent can obtain the identity and trace the vehicle from the message it sends. Therefore, identity and location privacy is achieved by the proposed scheme.

  4. Non-repudiation: In the proposed scheme, the messages CTRSUV,Enc_KvDTA{Ri}, and CTDTA→v contains different values, e.g., {SignvFIDvT2Mrsu}, where Mrsu=IDrsu1IDdtatexprsu1T1Ri, it has the secret value Ri that know to RSUs, and DTA, the vehicle cannot deny the message it has received because of the secret value. The freshness of the timestamps also plays a vital role in checking the validity of the message. Therefore, the proposed scheme achieved the non-repudiation property.

  5. Unlinkability: The message IDrsu1,texpdta,texprsu,T1,Ri,IDdta,PKdta,Signrsu1 in each broadcasting operation, the RSUs are transmitted, which is different. Also, the secret SKrsu is valid only for one session communication. Furthermore, the identity of the vehicle is further secured with a one-way hash function. Therefore, the adversary cannot expect that messages belong to the same vehicle. Thus, the proposed scheme provides desired unlinkability.

  6. Forward secrecy: In the proposed scheme, the broadcasted parameters IDrsu1,texpdta,texprsu,T1,Ri, IDdta, PKdta, Signrsu1 indicates the legitimacy of the entity’s identities. All these broadcasted parameters do not contain information about other credentials of the vehicles. Also, the session keys are used only for a single session to communicate, and although that the message is encrypted with these short-lived keys, the keys are further encrypted with AES public key. Consequently, attackers cannot obtain any information about other credentials. Therefore, the proposed scheme provides perfect forward secrecy.

  7. Cross-domain Property: According to the proposed scheme’s specification, two vehicles belong to different domains and are separately registered with domain trusted authorities. Every domain trusted authority has separate RSUs with vehicles and can connect mutually through the domain trusted authority.

  8. Offline Authentication: In the proposed scheme, TA preloads the credentials rvj,SKvj,texp,Ri,TIDv in RSUs priorly in their domain. Then, RSU1 preloads IDrsu1,texpdta,texprsu,T1,Ri,IDdta,PKdta,Signrsu1 into the vehicles in prior deployment. This helps the vehicle to authenticate to the domain in offline mode while the connectivity is temporarily unavailable. Therefore, the proposed scheme provides an offline authentication.

  9. 9. Impersonation Attacks: If the adversary impersonate one of the registered vehicles or RSUs, it should construct a message IDrsu1,texpdta,texprsu,T1,Ri,IDdta,PKdta,Signrsu1 to meet the verification process. However, it will be difficult for the adversary to pass the verification because the signature is generated using the public key of the entity, and the parameters Mrsu=IDrsu1IDdtatexprsu1T1Ri are concatenated with signature and encrypted using the public key CTRSUV=Enc_VRSUVaes{Signrsu1Mrsu}. The message also contains a secret Ri value that the recipient verifies to verify the message’s validity. Therefore, no impersonation attack on the current technique can be launched by the adversary.

  10. Modification attack: Assume the adversary get the encryption key during the transmission and modify the message Enc_VRSUVaes{Signrsu1Mrsu, he/she will not be able to obtain the signature values IDrsu1,IDdta,texprsu,T1,Ri because it is encrypted using the secret key of the vehicle or RSUs. Also, the adversary will not pass the verification process because the message cannot be decrypted. However, the receiver who has the private key and the secret value stored in the initial registration phase is used to check the message’s validity. Therefore, the proposed scheme withstands the modification attack.

  11. Reply attack: In the proposed scheme, a timestamp is used in every message, e.g., Mrsu=IDrsu1IDdtatexprsu1T1Ri has the timestamp of the current session, and respectively after receiving, the freshness of the timestamp will be validated by comparing it with the current timestamp T1 ΔT of the system. Furthermore, the shared session key between entities has an expiration time, e.g., texprsu1, and texpdta. Therefore, the proposed scheme resistance to reply attacks.

  12. Man-in-the-middle attack: The transmitted messages may be intercepted, and the adversary could do a particular modification. In the proposed scheme, the secret vehicle key sZq, is generated randomly; also, the Ti = H(VIDis), is computed based on the random number. The secret value Ri is generated randomly, sent alongside the message, and encrypted using the vehicle private key to create the signature. So, the message is transmitted in encrypted form, and it will be difficult for the adversary to get this information. Besides, if the attacker intercepts the message, the receiving message will be delayed, and it will not pass the validation process due to the timestamp usage T1T. The proposed scheme, therefore, withstands the man-in-the-middle attack.

  13. Brute-force attack: In our scheme, various generated random, e.g., sZq,r2dtaZq, and rrsuZq are used to secure the identities and sent securely to the vehicle or RSUs by encrypting them using AES public key and RSA key. If the adversary wants to break the authentication message, he/she needs to know the secret vehicle parameters or identity VIDi. But, in the proposed scheme, the identity is secured using a one-way hash function and concatenated with random number Ti = H(VIDis). Then, this hash value is encrypted using RSA Enc_TArsapk{Ti}, to find the value, the adversary will try all the numbers (brute-force) till find the value which transmission will be delayed and results in authentication fails due to the timestamp. So, the chance of the adversary to get/brute-force the correct value is infinitesimal. Therefore, the proposed scheme has resistance to a brute-force attack.

Table 3:
Comparison of security features.
ID-CPPA Ali & Li (2020) AAAS Jiang, Ge & Shen (2020) HCDA (Tan, Xuan & Chung (2020)) Proposed scheme
Message integrity and authentication ×
Message unforgeability × ×
Identity privacy-preserving
Non-repudiation × × ×
Unlinkability ×
Forward secrecy × ×
Cross-domain Property
Offline authentication × × ×
Impersonation Attacks ×
Modification attack
Reply attack
Man-in the middle attack × ×
Brute-force attack × × ×
DOI: 10.7717/peerj-cs.714/table-3

Burrows, abadi, and needham (BAN) logic

We use Burrows, Abadi, and Needham BAN logic in this subsection, which is used to prove the correctness of authentication methods, beginning with the solution’s formalization, followed by postulates to achieve the objectives emphasized. Nonetheless, with the commonly used BAN logic technique, we show the mutual authentication validity between the vehicle and RSU. In the BAN logic analysis, Table 4 displays the related notations. We start by explaining the notes used to do the demonstration, followed by BAN logic postulates, followed by the formal idealization of the scheme’s messages; we also list the assumptions of the solution and highlight the goals.

Table 4:
Notation and description in BAN logic.
Notation Description
P|B P believes B
#(B) B is fresh
PB P has jurisdiction over B
PB P sees B
P|B P once said B
(B,Y) B or Y is one part of (B, Y)
BY B combined with Y
(B)Y B is fresh with the key K
PKQ P and Q use the shared key K to communicate
SK The current session key
P|PkQ,P{B}kP|Q|B The message-meaning rule
P|#(B)P|#(B,Y) The freshness-conjuncatenation rule
P|#(B),P|Q|BP|Q|B The nonce verification
P|QB,P|Q|BP|B The jurisdiction rule
DOI: 10.7717/peerj-cs.714/table-4

Security Goals: This process shows the session key authentication goals between vehicles and RSU that authenticated mutually. Thus, there five goals primarily used in the proposed scheme and established as follows:

  • Goal 1: DTA| ≡ Vi| ≡ (VIDi).

  • Goal 2: DTA| ≡ (VIDi).

  • Goal 3: DTA| ≡ RSU| ≡ (RIDrsu).

  • Goal 4: DTA| ≡ (RIDrsu).

  • Goal 5: RSU| ≡ DTA| ≡ (kdta→rsu).

  • Goal 6: RSU| ≡ (kdta→rsu).

  • Goal 7: Vi|RSU|(pkdta).

  • Goal 8: Vi|(pkdta).

Messages: In this process, we idealize the scheme phase to represent the exchanged messages between the main entities of the scheme; the message representation is shown as follows:

  • Msg1: ViRSU:{SignvFIDvT2Mrsu}.

  • Msg2: RSUDTA:{texpvFIDvCTvDTA}.

  • Msg3: DTARSU:{texpvFIDvCTvDTA}.

  • Msg4: RSUVi:{MIDvi,skMIDvi,texpMIDvi,Ri}.

The messages of scheme can be idealized as follows:

  • SMI 1. Vi→TA:(Signv)PKTA.

  • SMI 2. DTATA: (IDdta)PKTA.

  • SMI 3. RSUDTA:(IDrsu)pkdta).

  • SMI 4. DTA→RSU: (KDTAßRSU)(PKrsu).

  • SMI 5. RSUVi:(pkMIDvi)(h(MIDvi).

Assumption: The initialization situation of the proposed scheme depends on some assumptions to prove the scheme; the assumptions are as follow:

  • AS 1. TA| ≡ #(T1,Ri).

  • AS 2. DTA| ≡ #(T1,T2,Ri).

  • AS 3. RSU| ≡ #(T3).

  • AS 4. Vi| ≡ #(T2,Ri).

  • AS 5. TA| ≡ | kTAvVi.

  • AS 6. DTA| ≡ | KDTAvVi.

  • AS 7. DTA| ≡ | KDTARSURSU.

  • AS 8. Vi| ≡ Vi VIDRSU.

  • AS 9. DTA| ≡ Vi ⇒ (VIDi).

  • AS 10. DTA| ≡ RSU ⇒ (RIDrsu).

  • AS 11. Vi | ≡ RSU ⇒ (SKrsu).

  • AS 12. RSU| ≡ | KDTARSUDTA.

  • AS 13. RSU| ≡ DTA ⇒ (KDTA→RSU).

Proof: The stated security goals (Goal 1, Goal 2, Goal 3, Goal 4, Goal 5, Goals 6, Goal 7, and Goal 8) will be demonstrated in this process and achieved in this respect.

According to SMI 1. Vi→TA: (Signv)PKTA, we get:

S1: TA ◃ (VIDi)KTA→v).

From S1, AS 4. Vi| ≡ #(T2,Ri), by utilizing message meaning ruling, we obtain:

S2: DTA| ≡ Vi| ∼ (VIDi).

From S2, AS 1. TA| ≡ #(T1,Ri), and by utilizing the rule of freshness and nonce verification, we get:

S3: DTA| ≡ Vi| ≡ (VIDi).

Thus, the Goal 1: DTA| ≡ Vi| ≡ (VIDi) is achieved.

According to S3: DTA|Vi|(VIDi), AS 9. DTA| ≡ Vi ⇒ (VIDi)., and by utilizing the rule of jurisdiction, we obtain:

S4: DTA| ≡ (VIDi),

Thus, the Goal 2: DTA| ≡ (VIDi), is achieved.

According to SMI 2. DTA→TA: (IDdta)PKTA, we have:

S5: DTA(IDrsu)(pkdta)

Based on S5: DTA(IDrsu)pkdta, AS 7. DTA| ≡ | KDTARSURSU, and by utilizing meaning rule, we get:

S6: DTA| ≡ RSU |∼ (RIDrsu).

From S6: DTA|≡ RSU |∼ (RIDrsu), AS 2. DTA| ≡ #(T1,T2,Ri), and by utilizing the rule of freshness and nonce verification, we obtain:

S7: DTA| ≡ RSU| ≡ (RIDrsu)

Therefore, the Goal 3: DTA| ≡ RSU| ≡ (RIDrsu) is achieved.

According to S7: DTA| ≡ RSU | ≡ (RIDrsu), AS 10. DTA| ≡ RSU ⇒ (RIDrsu) and by utilizing jurisdiction rule, we get: S8: DTA| ≡ (RIDrsu). Thus, the Goal 4: DTA| ≡ (RIDrsu) is accomplished.

According to SMI 4. DTA→RSU: (KDTA→RSU)PKrsu, we get:

S9: RSU ◃ (KDTA→RSU)PKrsu.

From S9: RSU ◃ (KDTA→RSU)(PKrsu), AS 12. RSU|≡ | KDTARSUDTA, and by utilizing message meaning rule, we obtain:

S10: RSU|≡ DTA| ∼ (KDTA→RSU).

According to S10: RSU| ≡ DTA| ∼ (KDTA→RSU), AS 3. RSU| ≡ #(T3) and by utilizing the freshness rule and nonce verification, we get:

S11: RSU|≡ DTA| ≡ (KDTA→RSU).

Therefore, the Goal 5: RSU| ≡ DTA| ≡ (kDTA→DTA) is achieved.

Based on S11: RSU| ≡ DTA| ≡ (KDTA→RSU), AS 13. RSU| ≡ DTA⇒ (KDTA→RSU) and utilizing the rule of jurisdiction, we obtain:

S12: RSU| ≡ (KDTA→RSU).

Thus, the Goal 6: RSU| (kdta→rsu) is achieved. From SMI 5. RSUVi:(pkMIDvi)h(MIDvi), we get:

S13: Vi(pk(MIDvi)h(MIDvi).

According to S13: Vi(pkMIDvih(MIDvi), AS 8. Vi | ≡ Vi VIDRSU, and using the rule of the message meaning, we obtain:

S14: Vi | ≡ RSU| ∼ (SKrsu).

From S14: Vi|RSU|(SKrsu), AS 4. Vi | ≡ #(T2,Ri), and utilizing the freshness rule and nonce-verification, we get:

S15: Vi | ≡ RSU| ≡ (SKrsu).

Thus, the Goal 7: Vi|RSU|(pkdta) is achieved.

Based on S15: Vi | ≡ RSU| ≡ (SKrsu), AS 11. Vi |≡ RSU⇒(SKrsu) and using jurisdiction rule, we obtain:

S16: Vi | ≡ (SKrsu).

Therefore, the Goal 8: Vi|pkdta is achieved. Consequently, the proposed scheme’s mutual authentication is proven based on achieving the stated goals, and the vehicles can mutually communicate with RSU and DTA.

The Simulation of Our Scheme Using AVISPA

AVISPA refers to Internet Security Protocols and Applications Automated Validation. It is a web-based push-button tool used to simulate the authentication protocols’ security and formally validate them. To code the protocol, AVISPA uses the High-Level Protocol Specification Language (HLPSL). It is made up of four back-ends called HLPSL2IF and a tool for translators. The translator method is used to convert a scheme written in HLPSL to Intermediate Format (IF). This IF is a general language understood by all back-ends and used to evaluate and analyze multiple properties defined in the scheme by different back-ends. Four back-ends are available: Constraint-Logic-based At-tack Searcher (CL-AtSe), On-the-fly Model-Checker (OFMC), Automatic Approximate Tree Automata for Security Scheme Analysis (TA4SP), and SAT-based Model-Checker (SATMC). The architecture of AVISPA is illustrated in Fig. 9 (Vigano, 2006; Chevalier, 2004). It is crucial to specify designed protocols in the HLPSL language in AVISPA (Chevalier, 2004) HLPSL is based on roles: each participant role determines the primary roles, and the scenarios of fundamental roles describe composition roles. Each function is independent of the others and, by requirements, obtains some initial information and then communicates with the other roles across channels. The intruder is often modelled in HLPSL using the Dolev-Yao model (Dolev & Yao, 1983) (as in the threat model used in this paper) with the possibility of assuming a proper function for the intruder in the running of a protocol. The positioning system decides the number of meetings, the number of principals and the roles. By using one of the four back-ends, the output format (OF) of AVISPA is created. If a protocol analysis (by detecting an attack or not) has been successful, the performance determines precisely what the outcome is and under what conditions it has been obtained. Comprehensive formats for the OF can be found in Chevalier, 2004.

The AVISPA structure.

Figure 9: The AVISPA structure.

Scheme specification in HLPSL

There are three roles played by the Vi vehicle, RSU road-side unit, and DTA domain trusted authority in the proposed scheme. The other role is the role of the session, environment, and goal. As shown in Figs. 11 and 12, all the specified roles are coded in HLPSL. First, in Figs. 11 and 12, the role played by the vehicle is shown. The agent vehicle Vi receives the start signal / RCV (start) = |> and the states changes from 0 to 1. Then, it transmits the registration message (VIDi.Ri′. CTvTA′. Ti′_SKvirsu) to the road-side unite via a secure channel / SND () command. The / secret(VIDi, Ai, Ki, s1, Vi) declares that the information (VIDi, Ai, Ki) is kept secret permanently to the agent Vi, and the label (s1) is the protocol (id) used to identify the goal. The declaration / secret (SKrsudta, s3, RSU, DTA) indicates that the value (SKrsudta) is shared between the RSU and DTA using the label (s3). While, the declaration / secret (SKvirsu, s4, Vi, RSU) shows that the value (SKvirsu) is known to the Vi and RSU. The identity of the domain trusted authority (IDdta) used in the declaration / secret (IDdta, s6, Vi, RSU, DTA)and stated that it is known to the agents’ Vi, RSU, and DTA. In the login phase, the vehicle sends the message / SND (Ai′. Sign_vi′.CT_v_RSU′.VIDi. IDrsu_J.CIDi′.CT_v_RSU′.TS1′) using / SND () command, and the declarations / witness (Vi,RSU,vehicle_rsu_ts1, TS1’), and /witness(Vi,RSU,vehicle_rsu_ri,Ri) indicates that the timestamp (TS1), and (Ri) have generated freshly by the vehicle for the RSU. State 3 shows that the vehicle receives / RCV (H (VIDi.NIDi′. FIDi′. VIDi CT_RSU_v. IDrsu_J. IDdta. H(H(NIDi’.IDdta.Ri’.Rn’)).Rn’.TS4’), and the declarations / request(RSU, Vi, rsu_vehicle_ts4, TS4′), and / request(DTA, Vi, domainTA_vehicle_rn, Ri′) indicates the vehicle acceptance of the timestamp that generated by the RSU, and the (Ri) that sent by the DTA. The role specification of the role played by the RSU is shown in Fig. 10B. The RSU computes the necessary parameters after receiving the message (VIDi.H(VIDi.Ki)SKvirsu) through a secure channel.

The vehicle and RSU roles in HLPSL.

Figure 10: The vehicle and RSU roles in HLPSL.

The DTA role in HLPSL.

Figure 11: The DTA role in HLPSL.

Role specification of the proposed scheme in HLPSL for the session, goal, and environment.

Figure 12: Role specification of the proposed scheme in HLPSL for the session, goal, and environment.

The declaration secret (IDrsu, IDdta, Ki, s1, Vi) indicates that the values are kept secret to the Vi using the label (s1). The secret (VIDi, s2, Vi, RSU) declaration shows that VIDi is shared between the Vi and the RSU. The statement secret (SKrsudta, s3, RSU, DTA) states that SKrsudta is shared between RSU and DTA. At the same time, secret (SKvirsu, s4, Vi, RSU) indicates SKvirsu is known to the Vi and RSU. In the authentication phase, the RSU sends the message (Mi’.TS4’) via a secure channel using SND ( ). However, the witness (RSU, Vi, rsu_vehicle_ts4, TS4′) declaration specifies that the RSU has freshly generated TS4 for the vehicle. The declaration request (Vi, RSU, vehicle_rsu_ri, Ri) indicates that the vehicle accepts Ri’s value. The specification of domain trusted authority role (domainTA) is shown in Fig. 11. The DTA receives the message ({H (NIDi′. IDdta.Ri′.TS2′). NIDi′. IDdta.xor (Ri′, H (SKrsudta. NIDi′. IDdta.)).TS2′} SKrsudta) from the RSU. However, the declaration secret (SKrsudta, s3, RSU, DTA) indicates that the value SKrsudta is shared between the RSU and DTA using the label (s3: protocol_id). In the command secret (SKvirsu, s4, Vi, RSU), we declare that the SKvirsu shared between the vehicle and RSU generated freshly by the DTA. The value IDdta as stated in declaration secret (IDdta, s6, Vi, RSU, DTA) is known to the vehicle, RSU, and DTA. Later, the domain trusted authority sends the message (Gi′. CTDTAvi′.TS3′) using secure channel SND (). Nevertheless, the declarations witness (DTA, RSU, domainTA_rsu_ts3, TS3′, and witness(DTA,RSU,domainTA_rsu,Rn) states that the DTA has freshly generated TS3’, and Rn’ for the RSU. We presented the roles for the session, goal, and environment in the HLPSL code in Fig. 12. All primary roles, including roles for the (Vi, RSU, and DTA), are incorporated with concrete arguments in the session segments. The environment section contains the global constant and composition of one or more sessions, and knowledge of the intruder is also provided. We define six secrecy objectives in our scheme simulation, and five authentications are tested.

  • The secrecy_of s1: It represents that the (VIDi, Ai, Ki) is kept secret only (Vi).

  • The secrecy_of s2: It states that the (VIDi) is known secretly (Vi, RSU).

  • The secrecy_of s3: It indicates that the value (SKrsudta) is shared secretly (RSU, DTA).

  • The secrecy_of s4: The (SKvirsu) is secretly shared between the Vi and RSU.

  • The secrecy_of s5: indicates that the (J, K, Q, IDrsu) is known (RSU).

  • The secrecy_of s6: It states that the identity (IDdta) is known to all entities (Vi, RSU, DTA).

  • The authentication_on vehicle_rsu_ts1, vehicle_rsu_ri: It represents that the values (TS1′), and (Ri′) are generated randomly and known to the (Vi) and (RSU).

  • The authentication_on rsu_domainTA_ts2, rsu_domainTA_ri: It indicates that the values (TS3′), and (Rn′) are generated by the DTA and sent to the RSU securely, and the values are fresh.

  • The authentication_on domainTA_rsu_ts3, domainTA_rsu_rn: The values TS3′ and Rn′ are generated freshly for the RSU by the DTA and authenticates the RSU to DTA.

  • The authentication_on rsu_vehicle_ts4, rsu_dta_ts2: It represents that the timestamp TS2′ is generated freshly by the RSU for the vehicle.

  • The authentication_on domainTA_vehicle_rn: indicates that the value Rn′ generated freshly by the DTA for the vehicle.

Simulation results

For an execution test and a limited number of model checking sessions, we chose the back end OFMC (Basin, Mödersheim & Vigano, 2005). This back-end tests whether legitimate agents can execute the specified protocol by conducting a passive intruder search for replay attack checks. After that, the intruder is given the information of some regular sessions between the legitimate agents by this back-end. This back end also checks whether the attacker can carry out any man-in-the-middle attack for the Dolev-Yao model search. With the OFMC back-end, under the AVISPA web tool, we simulated our schema for formal security verification. Figures 13A and 13B in Fig. 13 show the simulation results for our scheme’s formal security verification using OFMC. The first written part, called the Summary, indicates in these statistics whether the protocol is stable, risky, or whether the analysis is inconclusive. The written Overview segment safeguards our scheme. The information section explains what state the device is considered secure, what conditions were used to detect an attack, or why the analysis was inconclusive. It is recognized that our architecture is deemed to be protected, and our system does not detect an attack. Consequently, the result of this figure suggests that our system is safe from passive and active attacks, including man-in-the-middle replay attacks and attacks. Knowledge of daily sessions between the authentic agents is given to the intruder. Figures 13A and 13B in Fig. 13 show the OFMC and CL-AtSe back-end simulation results and demonstrate that the scheme is secure and stable against attacks.

(A0B) The simulation results of the proposed scheme.

Figure 13: (A0B) The simulation results of the proposed scheme.

Performance Evaluation

In this section, we evaluate the performance of the proposed system in terms of cost of computation and communication with other VANET authentication schemes, e.g., ID-CPPA (Ali & Li, 2020); AAAS (Jiang, Ge & Shen, 2020), and HCDA (Tan, Xuan & Chung, 2020). The performance of the schemes against those schemes is shown in Table 6. The performance metrics evaluation is described as following:

Table 6:
Comparison of the computation and communication costs of schemes.
Scheme Computation cost (ms) Communication cost (bits)
Vehicle side (Vi) RSU side TA side Total
ID-CPPA (Ali & Li, 2020) 3TBP12.633 ms Tsmbp+TBP5.776 ms 1Tsmbp+2TBP9.9874 ms 28.3964 ms 2,432 bits
AAAS (Jiang, Ge & Shen (2020)) 2Tsmbp+1TBP7.3418 ms 1Tsmbp+1TBP+1Tmtp9.9488 ms 3Tsmbp+1TBP+1Tmtp13.0796 ms 30.3702 ms 3,264 bits
HCDA (Tan, Xuan & Chung, 2020) 2Th+1Tpe+1Tsmbp10.5756ms 2Th+2Tpe18.0184 ms 2Th0.002 ms 28.596 ms 2,528 bits
Proposed scheme 3Th+1Tas+1Tse+1Tsd+1Tav4.0547 ms 1Th+1Tas+2Tse+2Tsd+1Tav4.0619 ms 1Tse+1Tsd0.0092 ms 8.1258 ms 1,408 bits
DOI: 10.7717/peerj-cs.714/table-6

Computation cost

Here, we analyze the computation cost of the proposed scheme against other authentication schemes for the VANET system, e.g., ID-CPPA (Ali & Li, 2020); AAAS (Jiang, Ge & Shen, 2020), and HCDA (Tan, Xuan & Chung, 2020) are summarized in Table 6. In this study, the cryptographic operations involved are counted. To represent the comparison, Table 5 shows the notations, definition, and calculation of their estimated execution time by using the PBC library stated by Al-Shareeda et al. (2020) for different cryptographic operations. It is noted that the XOR operation and concatenated operation k are ignored because their execution time is negligible. The proposed scheme’s simulation was carried out on Intel Core™i7-5700HQ, CPU 2.70 GHz platform using Java Pairing-Based Cryptography Library (JPBC) library. In the proposed scheme, we applied five cryptographic operations hash function, symmetrical encryption, symmetrical decryption, asymmetric signature, and asymmetric signature verification that related to AES and RSA algorithm, which are respectively donated as Th, Tse, Tsd, Tas, and Tav. The utilized operations execution time is independently 0.001 ms, 0.0046 ms, 0.0046 ms, 3.8500 ms, and 0.1925.

Table 5:
The execution time of different cryptographic operations.
Cryptographic operation Time (ms)
Bilinear pairing operation (TBP) 4.211
Scalar multiplication bilinear pairing in G1 Tsmbp. 1.5654
Point addition of the bilinear pairing in G1 Tpapb. 0.0106
Map- to-point of the bilinear pairing in G1 Tmtp. 4.1724
Scalar multiplication of the ECC Tsmecc. 0.6718
Point addition of the ECC in an additive group G Tpaecc. 0.0031
Hash function Th 0.001
Point exponentiation Tpe 9.0082
Symmetrical encryption ( Tse) 0.0046
Symmetrical decryption ( Tsd) 0.0046
Asymmetric signature ( Tas) 3.8500
Asymmetric signature verification ( Tav) 0.1925
DOI: 10.7717/peerj-cs.714/table-5

In ID-CPPA Scheme Ali & Li (2020), the vehicle needs to execute three times bilinear pairing operation 3TBP that has the execution time 4.211 ms, and it related to the ECC algorithm, thus, the computation cost in the vehicles side was 3TBP ≈ 12.633 ms. In the RSU side, there were two cryptographic operations Scalar multiplication bilinear pairing in G1 Tsmbp, and bilinear paring operation TBP. The Tsmbp, and TBP have been used one time only for each. Thus, the computation cost is Tsmbp + TBP ≈ 5.776 ms. In the trusted authority side, it needs to execute 1Tsmbp, and 2TBP, and their execution time is ≈ 9.9874 ms. Therefore, the total computation cost of Ali’s scheme (Ali & Li, 2020) is approximately ≈ 28.3964 ms. In AAAS (scheme Jiang, Ge & Shen, 2020), the message <fvi,Expfvi,TS4,N8> is signed by the vehicle for authentication, and computes the signature α = Vv, Wv, where Vv=rvp,Wv=rv1ski+H2(fviExpfviTS4N8,Vv)bi, and select a random number rvZq. Later, it sends <fvi,Expfvi,TS4,N8,α> to the RSU. After the RSU receives he message, it checks e(fvi,Ppub,fvi)e(Vv,H2((fviExpfviTS4N8,Vv))==e(Vv,fviWv) to verify the signature. The scheme performed six-point multiplication operations 6Tsmbp, three bilinear map operations 3TBP, and two map-to-point hash function 2Tmtp. operation in G1. Therefore, the total computation cost of Jiang scheme (Jiang, Ge & Shen, 2020) is equal to ≈ 30.3702 ms.

In the HCDA scheme (Tan, Xuan & Chung, 2020), it applied three cryptographic operations hash function, point exponentiation, scalar multiplication bilinear pairing in G1, and they are respectively donated as Th, Tpe, and Tsmbp. The estimated execution time is 0.001, 9.0082, and 1.5654 independently. However, the vehicle needs to apply two times hash function 2Th, one-time exponentiation operation 1Tpe, and multiplication operation 1Tsmbp, thus, the computation cost in vehicle side is ≈ 10.5756 ms. In RSU side, two-time hash function 2Th, and two-times exponentiation operation 2Tpe, and the computation cost in RSU is nearly ≈ 18.0184 ms. In the TA side, there were two times hash function operation used 2Th and it costs 0.002 ms. Therefore, the total computation cost of Tan’s scheme (Tan, Xuan & Chung, 2020) is approximately ≈ 28.596 ms. In the proposed scheme, the vehicle needs to execute three times hash function 3Th, one times asymmetric encryption 1Tas, one times symmetric encryption 1Tse, one times symmetric decryption 1Tsd , and one times asymmetric signature verification 1Tav related to RSA, and AES. The execution time of these operation is approximately 0.003, 3.8500, 0.0046, 0.0046, and 0.1925 respectively. Therefore, the computation cost in the vehicle side is 3Th + 1Tas + 1Tse + 1Tsd + 1Tav ≈ 4.0547 ms. In the RSU side, there are five operations needed to be executed e.g., one-time hash function 1Th, one-time asymmetric encryption 1Tas, two times symmetric encryption 2Tse, two times symmetric decryption 2Tsd, and one-time asymmetric signature verification 1Tav. Their execution time is independently 0.001, 3.8500, 0.0092, 0.0092, and 0.5775 ms. Therefore, the computation cost in RSU side is 1Th + 1Tas + 2Tse + 2Tsd + 1Tav ≈ 4.0619 ms. Likewise, the DTA needs to execute two cryptographic operations, one-time symmetric encryption 1Tse, and one time symmetric decryption 1Tsd, The execution time of these operations is 0.0046 ms, and 0.0046 ms. Thus, the computation cost in the DTA side is 1Tse + 1Tsd ≈ 0.0092 ms. Therefore, the total computation cost of the proposed scheme is approximately 8.1258 ms. Comparing to other schemes and as shown Table 6, the proposed scheme has less computation cost due to the use of lightweight cryptographic operations which makes the scheme suitable for Industrial IoT environment.

Communication cost

The communication cost refers to the size of the interacted messages between the system entities. Our proposed scheme has four interacted messages exchanged in the whole joining phase amongst the vehicle, road-side units, and domain trusted authority. 32 bits represent the size of the identity, general hash function 160 bits, secret value 160 bits, time expiration of the value, and the timestamp with the size of 32 bits, respectively. In AAAS scheme (Jiang, Ge & Shen, 2020), the message α=Vv,Wv,Vv,WvG1,N8Zq with pseudo-identity fvi , expiration Expfvi, timestamp TS4, and challenge value N8 is signed by the vehicle and transmitted to the RSU. As we mentioned above, the size of the identity is represented as 32 bits, expiration and time stamp is represented as 32 bits, and the challenge value is represented as 1,024 bits. The communication can be calculated as 160 + 32 + 32 + 16 + 1024 × 2. Therefore, the total communication cost of In Jiang scheme (Jiang, Ge & Shen, 2020), is 2,432 bits. In ID-CPPA Scheme Ali & Li (2020), the vehicle needs to transmit the message αi = (Ai, Bi ) ∈ G1 along together with the pseudo-identity PIDi = (PIDi, 1, PIDi, 2), where PIDi,1 ∈ G1, and PIDi,1,2Zq. However, in their scheme, they take the signature’s size in the message and the corresponding identity only into account. Thus, the communication cost of Ali’s Scheme (Ali & Li, 2020) can be calculated as 128 ÷ 3 + 20 + 4 = 408 bytes, where, (128 bytes = 1,024 bits), (20 bytes = 160 bits), and (4 bytes = 32 bits), therefore, the total communication cost of their scheme is 3264 bits. In the HCDA scheme Tan, Xuan & Chung (2020), the vehicle publishes a set of parameters <Request,TS3j,IDj,ϕj,Certvj> with the RSU for mutual authentication. The vehicle is generates requesting packet <TS4i,IDj1,CertRSUj,ϕj> and sent to the RSU. Hence, the communication cost in the vehicle side is 32 × 13 + 256 × 3 + 160 × 2 + 24 × 3 = 1,576 bits. In the RSU, uses an acknowledgment packets <TS2i,IDRSUi,Oi,hbari,Ri,CertRSUi> and the communication cost can be calculated as 32 × 6 + 256 × 1 + 160 × 3 + 24 × 1 = 952 bits. Therefore, the total communication cost of Tan’s scheme (Tan, Xuan & Chung, 2020) is 2,528 bits. The vehicle sends the message in the proposed scheme CTvrsu1/DTA=Enc_Vvrsu1/DTAaes{SignvFIDvT2Mrsu}, where the Signv=Sign_skv{FIDv,texpv,T2,Ri}, The size of the message can calculated as 256 + 32 + 32 + 160 = 480 bits. Also, the RSU sends the message CTrsu1v=Enc_Vvrsu1aes{texpvFIDvCTvDTA} to the DTA , where is CTv→DTA = Enc_CTv→RSU1 {Ri} needs 32 + 32 + 160 = 224 bits. In the DTA side, it needs to send the message CTDTAv=Enc_KDTAv{MIDvi,skMIDvi,texpMIDvi,Ri} to the RSU and needs 32 + 128 + 32 + 160 = 352 bits. Later, the RSU will perform the same length of the message to forward it to the vehicle which costs 352 bits. Therefore, if the proposed system is 1408 bits, the total communication cost. Therefore, the comparison of the cost of communication as shown in Table 6 indicates that the proposed system has a lower cost of communication relative to other systems.

Conclusion

This paper presents a lightweight online and offline cross-domain authentication scheme to support the large-scale industrial IoT environment of the VANET system. The scheme aimed to support the domain vehicles and reduce the system workload by adding a domain trusted authority. To support offline authentication, the scheme enables the automotive industrial to preload the secret credentials and information into the vehicles in their prior deployment to enable them to authenticate wherever the network’s connectivity is unavailable. The study proposed a lightweight cryptographic method by combining asymmetric and symmetric cryptographic algorithms AES and RSA to ensure confidentiality, authentication, and data integrity. This combination performs a lightweight cryptographic operation and takes advantage of the AES-RSA algorithm since they require less computation. The security of the VANET system is improved due to the secure transmission and verification process, making it secure against such known attacks replay attack, modification attack, impersonation attack, and brute-force attacks. The system’s security is checked using the well-known AVISPA security verification tool. Also, using BAN logic, mutual authentication of the scheme is verified. The results indicate that by testing it informally, our scheme achieves some security requirements and attacks. It also showed that the scheme provides better efficiency in terms of communication and cost of computation. In the future, we plan to implement the proposed scheme in the automotive industry for complete offline authentication functionality.

Supplemental Information

Security Validation Code.

The code of the cross-over phase between the vehicle and RSU2. The code files are categorized based on the role of each component in the proposed scheme.

DOI: 10.7717/peerj-cs.714/supp-1

Simulation Code.

The simulation of the VANET environment.

DOI: 10.7717/peerj-cs.714/supp-2
5 Citations   Views   Downloads