Next Article in Journal
A Range Ambiguity Suppression Processing Method for Spaceborne SAR with Up and Down Chirp Modulation
Next Article in Special Issue
PS-CARA: Context-Aware Resource Allocation Scheme for Mobile Public Safety Networks
Previous Article in Journal
An Ultra-Low-Power RFID/NFC Frontend IC Using 0.18 μm CMOS Technology for Passive Tag Applications
Previous Article in Special Issue
Classification of Incomplete Data Based on Evidence Theory and an Extreme Learning Machine in Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles

1
School of Computer Science and Technology, Anhui University, Hefei 230039, China
2
Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei 230039, China
3
Department of Computing and Mathematics, University of Derby, Derby DE22 1GB, UK
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(5), 1453; https://doi.org/10.3390/s18051453
Submission received: 14 March 2018 / Revised: 21 April 2018 / Accepted: 1 May 2018 / Published: 7 May 2018
(This article belongs to the Special Issue Sensor Networks for Collaborative and Secure Internet of Things)

Abstract

:
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.

1. Introduction

In recent years, the Internet of Vehicles (IoV) [1,2,3,4] has aimed to enhance driving safety through inter-vehicle communications and communications between vehicles and roadside infrastructure [5,6,7]. Both academia and industry show great interests in developing a secure and efficient IoV. A typical IoV consists of a trusted third party (TA), a set of Roadside Units (RSUs) distributed along the roads, and many vehicles driving on the road. In IoV, the RSUs communicate with the TA via wired connections, and communicate with the vehicles via wireless channels. A vehicle periodically broadcasts traffic safety related messages such as the speed of the vehicle, the road condition, etc., to nearby vehicles and RSUs using the Dedicated Short Range Communications (DSRC) [8] protocol. These messages can be helpful to deal with emergency road conditions and reduce the risk of accidents.
After receiving messages sent by a vehicle, the RSU or vehicle needs to verify the integrity of the message to ensure that it is not modified by the attacker during the transmission. Meanwhile, the real identity of the vehicle should not be known by a malicious attacker during the transmission to preserve the identity privacy of the sender. However, false messages from attackers may cause significant damages; therefore, for security concerns, a trusted third party is needed to retrieve the real identify and locate the attackers who send the false messages. Many efforts have been made to tackle the above challenge, and many authentication schemes including Chim [9] have been proposed. Most of them are heavy in computation and communication.
To reduce the computation and communication overhead of the existing authentication scheme, in this paper, we propose the novel privacy-preserving authentication using a double pseudonym for the Internet of Vehicles. Our scheme makes use of the double pseudonym method and dynamic update technology. The computation and communication overhead are reduced because no bilinear paring is needed in the signature generation and verification. In addition, we show that the proposed scheme is secure via comprehensive security analysis. Finally, we periodically update the informations (e.g., member secret, authentication key, IPID) stored in the tamper-proof device; therefore, our scheme can resist the side-channel attack.
The remainder of this paper is organized as follows. Section 2 shows the related work about the identity-based scheme for IoV. The system model and security requirements are presented in Section 3. We describe the design of our scheme in Section 4 and the security analysis of the proposed scheme is indicated in Section 5. Section 6 analyzes the computational overhead and the communication overhead of the proposed scheme. Finally, conclusions and future work are presented in Section 7.

2. Related Work

Security and Privacy issues have attracted wide attention in IoV. Based on our knowledge, there are three types of authentication methods, namely, an anonymous certificate authentication scheme based on Public Key Infrastructure (PKI) [10], a group authentication scheme based on group signature, and a signature verification scheme based on identity. In 2006, Gamage et al. [11] used an identity-based ring signature scheme to protect the true identity of the signer. However, it was not possible to retrieve the true identity of the sender when the message was disputed. Later, Raya and Hubaux [12] proposed a PKI-based authentication scheme to achieve privacy preserving. Firstly, in order to protect the real identity of the vehicle, every vehicle needs to pre-load a large number of public and private key pairs and the corresponding certificate, which caused a serious storage management burden for a vehicle. Secondly, the trusted third party (TA) also suffers from a heavy certificate management burden to maintain all the anonymous certificates of all the vehicles. Furthermore, when the RSU or vehicle checks the validity of the signature, it is necessary to check the validity of the corresponding certificate, which also causes additional overhead to the system.
Some group-based signature schemes [13,14,15] were also proposed in the same year, where the group manager holds the private key of the group and can restore the true identity of the message signed by any vehicle in the group. In Lin’s scheme [14], many vehicles form a group in which each vehicle has its own private key and shares a group of public keys. They use a group signature to implement anonymous authentication of messages sent from a vehicle, and to use identity-based signatures to ensure the integrity of the messages sent from the RSU. A vehicle generates a signature of the corresponding message with its own private key, and the adversary could not link two anonymous identities or two signatures generated by the same vehicle. Hence, the proposed scheme provides unlinkability. Although a traditional certificate management problem is avoided in the group signature-based authentication scheme, the size of the CRL (Certificate Revocation List) grows as the number of recovered signers increases. Each CRL checking operation involves two pairing operations, which results in serious computational overhead for signature verification.
In order to neutralize the above two schemes, in 2008, Zhang et al. [16] first proposed an identity-based batch authentication scheme using a bilinear mapping. Firstly, in Zhang’s scheme [16], a large number of public and private key pairs and the corresponding certificate do not need to pre-load into a vehicle, which greatly reduces the overhead of transmitting and verifying the public key certificate. Secondly, the scheme uses the batch authentication method to verify the many messages at the same time, which can reduce the computation overhead. Thirdly, since a vehicle uses a pseudonym identity attached to the message during the transmission process, some untrustworthy parties and malicious attackers could not know the real identity of the vehicle. Finally, when a false message is found, a trusted third party has the ability to reveal the true identity of a vehicle. Therefore, the conditional privacy protection could be achieved.
However, in 2013, Lee and Lai [17] pointed out that Zhang’s scheme [16] had some flaws. First of all, Zhang’s scheme [16] cannot resist replay attack. In the absence of the corresponding inspection device, the receiver maybe receive a valid signature that has been verified before. Secondly, Zhang’s scheme [16] could not achieve non-repudiation. Although a trusted third party (TA) could recover the real identity of a false message that is sent by an adversary, the attacker could also deny sending the corresponding message. Hence, Lee and Lai [17] proposed an improved scheme to achieve better privacy preserving.
Recently, Zhang et al. [18] and Bayat et al. [19] found that Lee and Lai’s scheme [17] was not able to resist impersonation attacks, that is, malicious attackers could simulate a legal vehicle to send false messages. Therefore, Zhang et al. [18] and Bayat et al. [19] proposed two improved schemes to address the problem in Lee and Lai’s scheme [17]. However, as pointed out in He et al.’s scheme [20], the two schemes above have flaws in that they cannot prevent the modification attack in which the signature of message could be modified by the malicious attacker. Therefore, He et al. [20] proposed a conditional privacy protection scheme that does not use bilinear paring.
In He et al.’s scheme [20], since the system’s master private key is stored in a tamper-proof device (TPD), which is a device from which that no attacker can extract any stored data, the attacker could not acquire the system’s master private key to control the whole system. However, in a side-channel attack, the adversary collects a side channel information leak from some cryptographic operations. Once the TPD is compromised, the attacker could acquire the system’s master private key so that the whole system will be compromised. In order to prevent side-channel attacks, Zhang et al. [21] proposed a novel privacy-preserving authentication scheme. Instead of storing the master private key in the TPD that cannot be updated, their scheme stores security-related information in the TPD, which can be periodically updated. This approach can get rid of the ideal TPD, so it is more practical. However, this scheme uses bilinear mapping and multiple Map-to-Point operations, and thus leads to a heavy computational overhead.

3. System Model and Design Goals

In this chapter, we briefly introduce the network model and security requirements. Some notations are defined as shown in Table 1.

3.1. Network Model

As shown in Figure 1, an IoV consists of a third-party trusted authority (TA), some RSUs distributed on the roadside and multiple vehicles.
  • TA: TA is a trusted third party in IoV, with sufficient storage and computing power, and is considered impossible to compromise by an adversary. When an attacker simulates that a vehicle sends a false message, the TA can resume the true identity of the sent message.
  • RSUs: The RSU is an infrastructure that is distributed on the roadside and communicates with the TA via a wired connection, and communicates with vehicles over a wireless connection to verify the validity of the received message.
  • Vehicles: Each vehicle is equipped with TPD, and communicates with other vehicles and RSUs through wireless connections. The vehicle periodically broadcasts security-related messages to nearby vehicles and RSUs through the Dedicated Short Range Communications (DSRC) protocol.

3.2. Security Requirements

A security scheme for IoV should meet some of the following features:
  • Message integrity: In IoV, we need to ensure that the recipient received the message from the sender, and the message during the sending process has not been modified by the attacker to maintain integrity.
  • Non-forgery: The attacker should not generate a valid signature on behalf of any vehicle under the randomly selected message attack in the random oracle model.
  • Traceability: When an attacker presents as being a legal vehicle and sends a false message that may cause damage, the TA can reveal the real identity of the false message.
  • Non-repudiation: When the trusted third party (TA) retrieves the real identity of the false message, the sender of the message could not deny the attack.
  • Resistance against side-channel attack: The attacker should not be able to obtain any information stored in the tamper-proof device through the side-channel attack.

4. The Proposed Scheme

Recently, some safety-related authentication schemes for IoV have been proposed. However, most of them are heavy in computation and communication, and could not resist some attack existing in IoV. In order to deal with the security problem existing in IoV, we proposed the privacy-preserving authentication using a double pseudonym that does not use bilinear paring, which can be used in the inter-vehicle communications and vehicle to RSU communications. Figure 2 graphically describes the details of our scheme. TA generates the private key and system parameters in our scheme. Each RSU has its own public-private key pairs and the corresponding certification from the TA. When a vehicle enters the range of RSU, then it will request the shares (member secret) of RSU, after authenticating the identity of vehicle via the TA, the shares and the corresponding authenticated period will be sent to the vehicle. This authenticated period is valid for a short time. Once it expires, it should be executed once again. Upon the vehicle receiving the shares and authenticated period, it generates a one-time use private key and signature. This signature could be verified by other vehicles and RSUs. If a vehicle sends a false message, the TA could trace the real identity of the vehicle.
This scheme can be divided into the following modules:
  • System Setup: In this phase, the TA generates the private key and system parameters.
  • RSU Setup: In this phase, the RSU can generate its own public-private key and the corresponding certification c e r t R j from the TA.
  • Vehicle Setup: In this phase, when the vehicle joins into the IoV, the TA generates the inter-pseudonym identity (IPID). The vehicle chooses the authentication key λ i , and puts the IPID and the λ i into the tamper-proof device.
  • Member key generation: In this phase, when the vehicle enters the range of the RSU, the vehicle will request to acquire the member secret of the RSU. After the RSU authenticates the identity of the vehicle, it sends the member secret ( β j , γ j ) and the corresponding valid period ( V P i ) to the vehicle.
  • Vehicle Sign: In this phase, if the vehicle wants to send a message, it will first generate its own external pseudonym identity and one-time signing key, and then generate the signature of the corresponding message.
  • Message Verification: In this phase, we will use batch authentication to verify the validity of signatures without bilinear pairing, which greatly reduced the computation overhead.
  • IPID and authentication key updated: In this phase, vehicles can use the online mode to update their own inter-pseudonym identity and authentication key and to prevent the attacker from tracking the true identity of the vehicle.

4.1. System Setup Phase

In this phase, there are some initialization parameters that preload into the vehicles and RSUs generated by the TA using the following steps. This can be done once, unless the private key of the system is compromised by an attacker, or the system wants to periodically update the system parameters and private key to enhance the system security level:
  • TA selects two large prime p and q as well as a non-singular elliptic curve E defined by the equation y 2 = x 3 + a x + b m o d n, where a , b F p .
  • TA selects the cyclic addition group G, where the P is the generator and q is the order of group.
  • TA selects a random number s Z q * as the secret key of the TA, and calculates P p u b = s · P as the public key of the TA.
  • TA selects E π ( ·)/ D π ( ·) and some hash functions: h 1 : G Z q , h 2 : 0 , 1 * Z q , H 1 k e y · : 0 , 1 * 0 , 1 l , H 2 · : 0 , 1 * Γ , H 3 · : 0 , 1 * 0 , 1 l , where H 1 k e y · as a keyed hash.
  • The system parameters are ψ = ( p , q , a , b , P , P p u b , h 1 , h 2 , H 1 k e y · , H 2 · , H 3 · , E π . / D π . ) , putting the system parameters ψ into the vehicles and RSUs in advance.

4.2. RSU Setup Phase

In this phase, the RSU generates its own public-private key pairs and the corresponding certification from the TA. This certification can be used only in a short time. Once the period is over, the RSU should execute the step once again. To generate its own public-private key pairs, the RSU randomly chooses two numbers k j , η j Z q * and computes P K R j 1 = k j P , P K R j 2 = η j P . The private key is k j , η j and the public key is P K R j 1 , P K R j 2 , where k j is used to generate the shares of vehicle, and η j is used to generate the secure channel between the RSU and vehicle. After generating its public key, the RSU sends the public key P K R j 1 , P K R j 2 and its own identity information to the TA through the secure channel. When the TA receives the messages, it generates the certification of RSU, and then the RSU broadcasts the c e r t R j within its own range.

4.3. Vehicle Setup Phase

In this phase, when the vehicle joins the range of the IoV, the information stored in the TPD should be initialized. Assuming the real identity of vehicle is RID, the TA can compute the inter-pseudonym identity I P I D V i = H 1 Λ ( R I D | | V P i ) , where the V P i is the valid period of the inter-pseudonym identity like 2 March 2017–3 April 2017. The vehicle chooses the authentication key λ i , putting the ψ , I P I D V i , λ i into the TPD. RID , V P i , I P I D V i , λ i is stored into the member list ML in the TA.

4.4. Member Key Generation Phase

In this phase, a vehicle can obtain the member secrets and the corresponding valid period from the nearest RSU. This process among the vehicle, the RSU and the TA should be confidential. When a vehicle enters the communication range of RSU, the vehicle will receive the certification from RSU, and send the request of acquiring the member secrets and the corresponding valid period of RSU. After the RSU authenticates the identity of the vehicle, it sends the member secret and the valid period to the vehicle. The details are as the following steps:
  • When the vehicle enters the communication range of RSU, the vehicle will receive the certification from RSU and first check the validity of the c e r t R j that has the format ( I D R j , ( P K R j 1 , P K R j 2 , s i g j ) ) , where s i g j is a signature on ( I D R j , ( P K R j 1 , P K R j 2 ) ) issued by the TA. If the certification is valid under the public key of the system, extract the public key and identity of RSU from the certification c e r t R j .
  • The vehicle chooses a random number r Z q * , and computes f = r P , π i 1 = H 2 ( f , P K R j 2 , r P K R j 2 , I D R j , T i ) , π i 2 = H 2 f , P p u b , r P p u b , I D R j , T i , where T i is a timestamp, and π i 1 , π i 2 are used as the keys of the symmetric encryption scheme E π . / D π . . Finally, the vehicle computes p j = E π i 2 λ i , T i and sends s = f , I D R j , p j , T i to RSU.
  • The RSU receives s from vehicle, if T i is invalid, then it aborts; otherwise, it sends s to the TA through the secure channel. When the TA receives s and first computes π i 2 = H 2 f , P p u b , sf , I D R j , T i , D π i 2 p j to get ( λ i , T i ) . If the equation λ i λ i does not appear in a tuple of the member list RID , V P i , I P I D V i , λ i of the TA or T i T i or V P i is invalid, it aborts; otherwise, the TA authenticates the vehicle and sends the authenticated message to RSU.
  • When the RSU receives the authenticated message from the TA, it means the vehicle is legal. RSU first computes π i 1 = H 2 f , P K R j 2 , f η j , I D R j , T i ; and chooses an authenticated period τ p and member secret ( β j , γ j ) , where β j and γ j satisfy k j = β j · γ j ; it computes h R j = H 1 π i 1 β j , γ j , τ p , and p j = E π i 1 β j , γ j , τ p , h R j ; and sends t = ( H 3 f , p j ) to the vehicle.
  • When the vehicle receives the t and D π i 1 p j to get β j , γ j , τ p , h R j , it verifies whether the equation h R j = H 1 π i 1 β j , γ j , τ p holds. If so, it lets the member secret and authenticated period in the TPD; otherwise, it aborts. This member key can only be used under the authenticated period, and, once it expires, the member key stored in the TPD is deleted.

4.5. Vehicle Signature Phase

In this phase, when a vehicle obtains the member secret ( β j , γ j ) from the RSU and the validity period of member secret is within the authorized period, the vehicle will generate the external pseudonym identity of the vehicle and the digital signature of the message. Finally, a vehicle broadcasts the external pseudonym identity, the message as well as the digital signature to other vehicles and the RSU. The details are as the following steps:
  • Vehicle computes the external pseudonym identity P P I D i = H 3 I P I D V i , T i and the one time signature key s k i = β j · γ j · h 1 P P I D i m o d n .
  • The vehicle chooses a random number r i Z q * , and computes R i = r i · P , β i = h 2 P P I D i R i M i , S i = s k i + β i · r i . Then the vehicle sends M i , P P I D i , R i , S i to nearby vehicles and RSUs.
  • The member secret ( β j , γ j ) stored in the TPD needs to be periodically updated. Choose a random number r Z q * , and set β j = r · β j , γ j = r · γ j as the new member secret.

4.6. Message Verification Phase

This phase allows the verifier to check the validity of the received message without bilinear pairing, which greatly reduces the computation overhead. Moreover, our scheme can support the batch verification function, which can verify many messages at the same time to improve performance. Then, we will show the details of verifying a single message and many messages.
  • Single message verification: When the verifier receives the safety-related message M i , P P I D i , R i , S i broadcasted from the vehicle, it could use the system parameters ψ to verify the validity of the message. The details are as following:
    • The verifier first checks the validity of timestamp T i . If T i is invalid, it aborts; otherwise, it executes the next step.
    • The verifier checks whether the equation S i · P = h 1 P P I D i · P K R j 1 + β i · R i holds. If it holds, the verifier receives the message; otherwise, it rejects the message.
    Due to s k i = ( β j · γ j ) · h 1 P P I D i m o d n , β j · γ j = k j , P K R j 1 = k j · P , R i = r i · P , β i = h 2 P P I D i R i M i and S i = s k i + β i · r i , we can check the equation through the following steps:
    S i · P = s k i + β i r i · P = β j · γ j · h 1 P P I D i + β i · r i · P = β j · γ j · h 1 P P I D i · P + β i · r i · P = h 1 P P I D i · P K R j 1 + β i · R i .
    Hence, the correctness of the single message verification is verified.
  • Multiple messages batch verification: We used a small index test technique during the batch verification procedure to ensure the non-repudiation of the signature. A vector, including the small random integer, is used to detect the modification of the batch signature in the small index test technique. After receiving multiple messages M 1 , P P I D 1 , R 1 , S 1 , M 2 , P P I D 2 , R 2 , S 2 , ..., M n , P P I D n , R n , S n , a verifier uses the system parameter to verify the validity of the many messages at the same time. The details are as the following steps:
    • Verifier first checks the validity of T i , where i = 1 , 2 , , n . If T i is invalid, the verifier rejects the messages; otherwise, it executes the next step.
    • Verifier chooses a random vector v = { v 1 , v 2 , , v n } , where v i is a small random integer in 1 , 2 t and t is a small integer with low overhead. Then, the verifier checks the correctness of the equation ( i = 1 n v i · S i ) · P = i = 1 n ( V i · h 1 P P I D i ) · P K R j 1 + i = 1 n ( v i · β i · R i ) . If it does not hold, the verifier rejects the messages; otherwise, the verifier receives the messages.
    Due to s k i = α j · β j · h 1 P P I D i m o d n , β j · γ j = k j , P K R j 1 = k j · P , R i = r i · P , β i = h 2 P P I D i R i M i and S i = s k i + β i · r i , we can check the equation through the following steps:
    i = 1 n v i · S i · P = ( i = 1 n v i s k i + β i · r i ) · P = i = 1 n v i β j · γ j · h 1 P P I D i + β i · r i · P = i = 1 n ( v i · ( β j · γ j · h 1 P P I D i · P + β i · r i · P ) ) = i = 1 n ( v i · h 1 P P I D i · P K R j 1 + v i · β i · R i ) = i = 1 n ( v i · h 1 P P I D i ) · P K R j 1 + i = 1 n ( v i · β i · R i ) = i = 1 n v i · h 1 P P I D i · P K R j 1 + i = 1 n v i · β i · R i .
Hence, the correctness of the multiple messages verification is verified.

4.7. IPID and Authentication Key Update Phase

At this phase, the vehicle can use the online model to update the internal pseudo-identity and authentication key stored in the TPD. The details are as following:
  • When a vehicle wants to update the internal pseudo-identity and authentication key, it first chooses a random number t Z q * , and computes g = t · P , π i = H 2 g , P p u b , t P p u b , T i , p i = E π i λ i , T i . Then, it sends z = g , T i , p i to the TA through the nearby RSU.
  • The TA receives z and checks the validity of T i . If T i is invalid, it aborts; otherwise, it executes the following steps:
    • TA computes π i = H 2 ( g , P p u b , s · g , T i ) and D π i p i to get ( λ i , T i ).
    • TA checks the validity of T i , if T i is invalid, it aborts; otherwise, it executes the next step.
    • TA searches the member list for a tuple ( RID , V P i , I P I D V i , λ i ) such as λ i = λ i . If such a tuple does not exist, it aborts; otherwise, it executes the next step.
    • TA checks the validity of V P i . If it is invalid, choose a new valid period V P i . TA computes I P I D V i = H 1 Λ ( R I D | | V P i ) and chooses a new authentication key λ i ^ ; otherwise, it aborts.
    • TA computes p i = E π i ( I P I D V i , λ i ^ , T i , h T A ) . If h T A = H 1 λ i ( I P I D V i , λ i ^ , T i ) is an H A M C , sends ( H 3 ( g ) , p i ) to the vehicle and put ( RID , V P i , I P I D V i , λ i ^ ) into ML.
  • After a vehicle receives ( H 3 ( g ) , p i ) , it first computes D π i ( p i ) to get ( I P I D V i , λ i , T i , h T A ) . Then, the vehicle checks the validity of T i and h T A . If it is invalid, set the I P I D V i , λ i as the new internal pseudo-identity and authentication key.

5. Security Proof and Analysis

In this section, because it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, we prove that the proposed identity-based scheme has the feature of non-forgery. In addition, we also show that our scheme can satisfy the security requirement and illustrate the differences between our scheme and others.

5.1. Security Analysis

In this sub-section, we will show that an attacker could not generate a valid signature on behalf of any vehicle through the game that is made up of a challenger C and an adversary A.
Definition 1.
Since it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, the proposed scheme is security existential forgery under the randomly selected message attack in the random oracle model. The proof is as follows.
Theorem 1.
Our scheme for IoV is secure in the random oracle.
Assuming there is an adversary that could forge message M i , P P I D i , R i , S i , then we construct a challenger C, which could solve the ECDL problem through running A as a subroutine. The details are as the following steps:
Setup stage: Challenger C first sets Q = P K R j 1 , then it sends the system parameters ψ = ( p , q , a , b , P , P p u b , h 1 , h 2 , H 1 k e y · , H 2 · , H 3 · , E π . / D π . ) to an adversary A.
h 1 - o r a c l e : Challenger C first initializes the list L h 1 with the form of P P I D i , τ h 1 . When receiving the query of the message with the form of < P P I D i > from the adversary A, the challenger C checks a tuple of the < P P I D i > to find out whether it appears in the list L h 1 . If the tuple exists in the list L h 1 , then send τ h 1 = h 1 P P I D i to the adversary A; otherwise, C chooses a random number τ h 1 Z q * and sets the tuple P P I D i , τ h 1 into the L h 1 , finally sending the τ h 1 = h 1 P P I D i to A.
h 2 - o r a c l e : Challenger C first initializes the list L h 2 with the form of L h 2 P P I D i , R i , M i , τ h 2 . When receiving the query of the message with the form of P P I D i , R i , M i from the adversary A, the challenger C checks a tuple of the P P I D i , R i , M i for whether it appears in the list L h 2 . If the tuple exists in in the list L h 2 , then sends τ h 2 = h 2 P P I D i R i M i to the adversary A; otherwise, C chooses a random number τ h 2 Z q * and sets the tuple P P I D i , R i , M i , τ h 2 into the L h 2 , and finally sends the τ h 2 = h 2 P P I D i R i M i to A.
s i g n - o r a c l e : Upon receiving the message M i from an adversary A, challenger C generates random numbers S i , h i , 1 , β i Z q * and P P I D i . Challenger C puts P P I D i , h i , 1 and M i , P P I D i , R i , S i to the adversary A, and it is easy to verify that the equation S i · P = h 1 P P I D i · P K R j 1 + β i · R i holds. Therefore, the message and signature M i , P P I D i , R i , S i , which A acquired from the inquiry from C, are valid.
Output: Finally, A outputs the message ( M i , P P I D i , R i , S i ) . C checks whether the equation holds:
S i · P = h 1 P P I D i · P K R j 1 + β i · R i .
If it does not hold, C aborts the process; otherwise, because of the forged lemma, if A executes h 1 - o r a c l e once again, a valid message ( M i , P P I D i , R i , S i ) will be generated. It can also conclude the similar equation:
S i · P = h 1 P P I D i · P K R j 1 + β i · R i .
According to Equations (3) and (4), we could get
S i - S i · P = S i · P - S i · P = h 1 P P I D i · P K R j 1 + β i · R i - h 1 P P I D i · P K R j 1 + β i · R i = h 1 P P I D i - h 1 P P I D i · P K R j 1 = h 1 P P I D i - h 1 P P I D i · k j · P
and
S i - S i = h 1 P P I D i - h 1 P P I D i · k j .
Therefore, C outputs the h 1 P P I D i - h 1 P P I D i - 1 · S i - S i . However, it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, and the security of the proposed scheme is secure against forgery under the randomly selected message attack in the random oracle model.
  • Message integrity: According to Theorem 1, because it is difficult to solve the ECDL problem, the signature used in our scheme is not forged under the random oracle model. Therefore, no adversary can simulate a legal vehicle to generate a valid signature or modify a legal signature. We can verify the equation that S i · P = h 1 P P I D i · P K R j 1 + β i · R i holds to check the validity and integrity of the message M i , P P I D i , R i , S i . Thus, the proposed scheme can achieve message integrity.
  • Non-forgery: Since it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, the attacker could not generate a valid signature on behalf of any vehicle under the randomly selected message attack in the random oracle model. Thus, the proposed scheme can achieve non-forgery.
  • Traceability: During this stage, when the adversary sends false messages which cause damage, the TA can trace the real identity of the corresponding message. Assuming the public pseudonym identity of the vehicle is P P I D i , the TA can extract the timestamp from the message M i , which can find the valid period V P i of the internal pseudo-identity of vehicle. Then, the TA can verify whether the equation H 3 I P I D V i , T i = P P I D i holds, where the I P I D V i is in the tuple of member list RID , V P i , I P I D V i , λ i . If it holds, the TA outputs the real identity of vehicle.
  • Non-repudiation: Once the TA traces the real identity of false message, the message sender could not deny that he has sent this false message. To achieve this goal, in our scheme, we use a random vector v = v 1 , v 2 , , v n to ensure an attacker cannot deny its signature in a message sent by exchanging signatures among several different messages.
  • Resistance side channel attack: In this paper, we use the more realistic TPD to resist side channel attack. There are three types of related information (IPID, authentication key, and member secret) stored in the TPD of our scheme. Due to the first type of secret often being used, if the vehicle does not periodically update this information, it will give the attacker a chance to recover the real identity of vehicle. In our scheme, before the attacker can probe the related information to recover the IPID through the side channel attack, the IPIP has already been updated. Secondly, the authenticated key can only be used during the authentication of vehicle. It is much harder for the attacker to resume the authenticated key than recover the IPID. In addition, as for the member secret, even if the adversary could recover the member secret, only the vehicle in the nearby RSU can be influenced. Furthermore, because the RSU can periodically update its public-private key pairs, the attacker could not acquire enough information through the side channel to resume the member key stored in the TPD.

5.2. Security Comparison

In this sub-section, we compare the proposed scheme with other existing schemes in terms of satisfactory security requirements. The comparison results are summarized in Table 2, where sr1, sr2, sr3, sr4, sr5 denote the message integrity, non-forgery, traceability, non-repudiation and resistance side channel attack, respectively.
As shown in Table 2, we can conclude that the schemes of Zhang et al. [18], Bayat et al. [19], and He et al. [20] could not satisfy all five of the security requirements. However, our scheme could satisfy all security requirements.

6. Performance Analysis and Comparison

In this section, we will analyze the proposed identity-based scheme compared with other related schemes in terms of the computation overhead and communication overhead.

6.1. Computation Overhead Analysis

In the scheme-based bilinear pairing proposed by Zhang et al. [18] and Bayat et al. [19], the order q of group G in the bilinear pairing e : G × G G T , generated by the Elliptic Curve y 2 = x 3 + x m o d n to achieve the security level of 80 bits, where n is the 512-bit prime number and the order q of the group G is a 160-bit prime number. However, among the schemes based on the Elliptic Curve, such as the scheme proposed by He et al. [20], the order q of group G is generated by the Elliptic Curve y 2 = x 3 + a x + b m o d n to achieve the same security level compared with the scheme based on the bilinear pairing, where n and q are the 160-bit prime numbers. For convenience, some time-consuming cryptographic operations [22] are defined as follows: T p denotes the execution time of the bilinear pairing operation; T m p - p denotes the execution time of the small scale multiplication operation; T m t p denotes the execution time of a Map-to-Point operation; and T m p - E C C denotes the execution time of the small scale multiplication operation based on the Elliptic Curve. Table 3 lists the execution time required for these operations [20].
The computation overhead of our scheme can be compared with other schemes in three aspects, letting PSGH and SMVH and MMVH denote the pseudonym and signature generation phase, signal message verification phase and multiple messages verification phase, respectively. Details are only shown in Zhang et al.’s scheme [21] and our scheme. The other schemes can be analyzed by the same method. Table 4 lists the computation overhead of our scheme compared with the schemes of Zhang et al. [18], Bayat et al. [19], Zhang et al. [21] and He et al. [20].
In the pseudonym and signature generation phase of Zhang et al’s scheme [21], which needs to execute the two Map-to-Point operations, the whole computation time of this phase is 2 T m t p = 8 . 812 ms. During the signal message verification phase, there are two bilinear pairing operations and two Map-to-Point operations that need to be executed. Thus, the whole computation time of this phase is 2 T p + 2 T m t p = 17 . 234 ms. In the multiple messages verification phase, there are two bilinear pairing operations and 2 n Map-to-Point operations that need to be executed. Thus, the whole computation time of this phase is 2 T p + 2 T m t p = 8 . 812 n + 8 . 422 ms.
In the pseudonym and signature generation phase of our scheme, which needs to execute a small scale multiplication operation based on the Elliptic Curve, the whole computation time of this phase is T m p - E C C = 0 . 442 ms. During the signal message verification phase, there are three small scale multiplication operations based on the Elliptic Curve that need to be executed. Thus, the whole computation time of this phase is 3 T m p - E C C = 1 . 326 ms. In the multiple message verification phase, there are ( n + 2 ) small scale multiplication operation based on the Elliptic Curve that need to be executed. Thus, the whole computation time of this phase is n + 2 T m p - E C C = 0 . 442 n + 2 ms. Figure 3 shows the computation overhead to sign and verify the single message in each scheme. Compared with the schemes of Bayat et al. [19] and Zhang et al. [21] using the bilinear pairing, our scheme’s computation is lower. At the same time, our scheme is also lower than the scheme of He et al. [20] in terms of computation. Figure 4 shows the total execution time of the batch verification as the amount of the vehicle increasing in each scheme. When the authenticated vehicle is increased to 100, in our scheme, the total execution time is less than 50 ms. Hence, our scheme is more suitable for the scene of multiple vehicles in IoV.

6.2. Communication Overhead Analysis

In this section, the communication overheads of our scheme compared with other schemes will be analyzed. In the group G 1 based on bilinear mapping, the size of the elements in G 1 is 64 × 2 = 128 byte [23]. However, in the group G based on the Elliptic Curve, the size of the elements in G 1 is 20 × 2 = 40 byte. Furthermore, we assume that the size of result of the general hash function is 20 bytes and the size of the timestamp is 4 bytes [24]. In addition, we do not consider the size of the message that is transmitted by the vehicle in this phase [25]. Table 5 lists the computation overheads of our scheme compared with other schemes.
In Table 5, the communication message is { A I D i , M i , S i , T i } in Zhang et al.’s scheme [18], where A I D i = A I D 1 , A I D 2 , A I D 1 , A I D 2 , S i G 1 , hence the communication overhead of sending single message is 128 × 3 + 4 = 388 bytes. When multiple messages are broadcasted, which needs n pseudonym, signature and timestamp, the total communication overhead of sending multiple messages is 388n bytes. In addition, in He et al.’s scheme [20], due to the A I D 1 , A I D 2 , R i G , σ i Z q * , T i is a timestamp, and the communication overhead of sending a single message and multiple messages are 40 × 3 + 20 + 4 = 144 byte and 144 n bytes, respectively. The other scheme’s communication overhead can be concluded by the same method. In our scheme, the communication messages include P P I D i Z q * , R i G , S i Z q * , whose overhead is 20 × 2 + 40 = 80 byte. The communication overhead of sending multiple messages is 80n bytes.

7. Conclusions

In this paper, we propose a privacy-preserving authentication scheme using a double pseudonym that supports both Vehicle to Vehicle (V2V) communication and Vehicle to Infrastructure (V2I) communication in IoV. Firstly, unlike other schemes, which store the system master secret (that cannot be updated) in the TPD, in our scheme, the information stored in the TPD is regularly updated. Therefore, the proposed scheme can resist side-channel attacks and hence is more practical. Secondly, the security analysis shows that our scheme can satisfy the security requirements for IoV. Furthermore, performance analysis and comparison show that our scheme is better than other schemes in terms of computation overhead and communication overhead. This shows that our scheme is more suitable used in the IoV.
As for future work, we will pay more attention to addressing the extreme environment in which the system suffers Denial of Service (DoS) attack during the messages broadcast. Since the Dos attack is hard to defend and causes huge damage in the batch verification, addressing the DoS attack has become an urgent task in future research.

Author Contributions

This paper is completed by all authors. W.X. is responsible for proposing the idea of the paper and J.C. checks whether the idea is feasible and give some suggestions to improve this idea. J.Z. is responsible for writing this paper and the security analysis is completed by H.Z. Y.X. is responsible for the performance analysis and comparison. Finally, the language of the paper is improved by L.L.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61572001, Grant 61502008, and Grant 61702005, in part by the Key Program of National Natural Science Foundation of China under Grant U1405255, in part by the Natural Science Foundation of Anhui Province under Grant 1708085QF136, and in part by the Excellent Talent Project of Anhui University.

Acknowledgments

The authors thank the Associate Editor and the anonymous reviewers for their useful comments and suggestions which helped us improve the quality and presentation of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sha, K.; Xi, Y.; Shi, W.; Schwiebert, L.; Zhang, T. Adaptive privacypreserving authentication in vehicular networks. In Proceedings of the 1st International Conference on Communications and Networking in China, Beijing, China, 25–27 October 2006; pp. 1–8. [Google Scholar]
  2. Xi, Y.; Sha, K.; Shi, W.; Schwiebert, L.; Zhang, T. Enforcing privacy using symmetric random key-set in vehicularnetworks. In Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems, Sedona, AZ, USA, 21–23 March 2007; pp. 344–351. [Google Scholar]
  3. Qu, F.; Wu, Z.; Wang, F.-Y.; Cho, W. A security and privacy review of vanets. IEEE Trans. Intell. Transp. Syst. 2015, 16, 2985–2996. [Google Scholar] [CrossRef]
  4. Cheng, J.J.; Cheng, J.L.; Zhou, M.C.; Liu, F.Q.; Gao, S.C.; Liu, C. Routing in internet of vehicles: A review. IEEE Trans. Intell. Transp. Syst. 2015, 16, 2339–2352. [Google Scholar] [CrossRef]
  5. Zeadally, S.; Hunt, R.; Chen, Y.-S.; Irwin, A.; Hassan, A. Vehicular ad hoc networks (vanets): Status, results, challenges. Telecommun. Syst. 2012, 50, 217–241. [Google Scholar] [CrossRef]
  6. Toor, Y.; Muhlethaler, P.; Laouiti, A. Vehicle ad hoc networks: Applications and related technical issues. IEEE Commun. Surv. Tutor. 2008, 10, 3. [Google Scholar] [CrossRef]
  7. Wang, F.-Y.; Zeng, D.; Yang, L. Smart cars on smart roads: An ieee intelligent transportation systems society update. IEEE Pervasive Comput. 2006, 5, 68–69. [Google Scholar] [CrossRef]
  8. Oh, H.; Yae, C.; Ahn, D.; Cho, H. 5.8 ghz dsrc packet communication system for its services. In Proceedings of the Vehicular Technology Conference, Amsterdam, The Netherlands, 19–22 Septemper 1999; Volume 4, pp. 2223–2227. [Google Scholar]
  9. Chim, T.W.; Yiu, S.-M.; Hui, L.C.; Li, V.O. Specs: Secure and privacy enhancing communications schemes for vanets. Ad Hoc Netw. 2011, 9, 189–203. [Google Scholar] [CrossRef] [Green Version]
  10. Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates. Available online: https://tools.ietf.org/html/rfc3709 (accessed on 14 March 2018).
  11. Gamage, C.; Gras, B.; Crispo, B.; Tanenbaum, A.S. An identitybased ring signature scheme with enhanced privacy. In Proceedings of the Securecomm and Workshops, Baltimore, MD, USA, 28 August–1 September 2006; pp. 1–5. [Google Scholar]
  12. Raya, M.; Hubaux, J.-P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef]
  13. Lin, X.; Lu, R.; Zhang, C.; Zhu, H.; Ho, P.-H.; Shen, X. Security in vehicular ad hoc networks. IEEE Commun. Mag. 2008, 46, 4. [Google Scholar]
  14. Lin, X.; Sun, X.; Ho, P.-H.; Shen, X. Gsis: A secure and privacypreserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 2007, 56, 3442–3456. [Google Scholar]
  15. Studer, A.; Shi, E.; Bai, F.; Perrig, A. Tacking together efficient authentication, revocation, privacy in vanets. In Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Rome, Italy, 22–26 June 2009; pp. 1–9. [Google Scholar]
  16. Zhang, C.; Lu, R.; Lin, X.; Ho, P.-H.; Shen, X. An efficient identitybased batch verification scheme for vehicular sensor networks. In Proceedings of the 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 246–250. [Google Scholar]
  17. Lee, C.-C.; Lai, Y.-M. Toward a secure batch verification with group testing for vanet. Wirel. Netw. 2013, 19, 1441. [Google Scholar] [CrossRef]
  18. Jianhong, Z.; Min, X.; Liying, L. On the security of a secure batch verification with group testing for vanet. Int. J. Netw. Secur. 2014, 16, 351–358. [Google Scholar]
  19. Bayat, M.; Barmshoory, M.; Rahimi, M.; Aref, M.R. A secure authentication scheme for vanets with batch verification. Wirel. Netw. 2015, 21, 1733. [Google Scholar] [CrossRef]
  20. He, D.; Zeadally, S.; Xu, B.; Huang, X. An efficient identitybased conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
  21. Zhang, L.; Wu, Q.; Domingo-Ferrer, J.; Qin, B.; Hu, C. Distributed aggregate privacy-preserving authentication in vanets. IEEE Trans. Intell. Transp. Syst. 2017, 18, 516–526. [Google Scholar] [CrossRef]
  22. He, D.; Kumar, N.; Shen, H.; Lee, J.-H. One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 2016, 5, 1–14. [Google Scholar] [CrossRef]
  23. Identity-Based Cryptography Standard (Ibcs)#1: Supersingular Curve Implementations of the bf and bb1 Cryptosystems. Technical Report. 2007. Available online: https://www.rfc-editor.org/rfc/rfc5091.txt (accessed on 14 March 2018).
  24. 509 Public Key Infrastructure Time Stamp Protocol (TSP)[J]. 2001. Available online: https://tools.ietf.org/html/rfc3161 (accessed on 14 March 2018).
  25. Lo, N.-W.; Tsai, J.-L. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans. Intell. Transp. Syst. 2016, 17, 1319–1328. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 18 01453 g001
Figure 2. Graphical representation of our scheme.
Figure 2. Graphical representation of our scheme.
Sensors 18 01453 g002
Figure 3. Computation overhead comparison of signing and verifying a single message.
Figure 3. Computation overhead comparison of signing and verifying a single message.
Sensors 18 01453 g003
Figure 4. Computation overhead comparison of verifying multiple message.
Figure 4. Computation overhead comparison of verifying multiple message.
Sensors 18 01453 g004
Table 1. List of notations and definitions.
Table 1. List of notations and definitions.
NotationDefinitions
T A A trusted authority
R j The j-th RSU
V i The i-th vehicle
s , P p u b the private key and public key of TA
c e r t R j A certificate of R j issued by TA
I D R j , V i The real identity of R j or V i
V P i The validity period of I P I D
I P I D V i An internal pseudonym identity of V i , generated by the TA based on I D V i
P P I D i , t The public pseudonym identity of V i , generated from I P I D V i of V i
h R j , TA A hash-based message authentication code generated by R j or the TA
E π . / D π . A symmetric encryption scheme, where π is the key
Table 2. The security comparisons of each scheme.
Table 2. The security comparisons of each scheme.
sr1sr2sr3sr4sr5
Zhang et al. [18]××
Bayat et al. [19]××
Zhang et al. [21]
He et al. [20]×
Our Scheme
Table 3. Different execution time of each cryptographic operations.
Table 3. Different execution time of each cryptographic operations.
Cryptographic OperationExecution Time
T p 4.211 ms
T m p - p 1.709 ms
T m t p 4.406 ms
T m p - E C C 0.442 ms
Table 4. The computation overhead of each scheme.
Table 4. The computation overhead of each scheme.
SchemePSGHSMVHMMVH
Zhang et al. [18] 6 T m p - t p
+ T m t p
14 . 66 ms
3 T b p +
2 T m p - b p
≈16.051 ms
n + 1 T m p - b p +
3 T b p 12 . 633 +
1.709 (n + 1) ms
Bayat et al. [19] 5 T m p - b p
+ T m t p
12.951 ms
3 T b p + T m t p
+ T m p - b p
18 . 748 ms
3 T b p + n T m p - b p
+ n T m t p 6 . 115 n
+ 12 . 633 ms
Zhang et al. [21] 2 T m t p
8.812 ms
2 T b p + 2 T m t p
≈17.234 ms
2 T b p + 2 n T m t p
8 . 812 n + 8 . 422 ms
He et al. [20] 3 T m p - E C C
1 . 326 ms
3 T m p - E C C
1 . 326 ms
n + 2 T m p - E C C
0 . 442 n + 2 ms
Our Scheme T m p - E C C
0 . 442 ms
3 T m p - E C C
1 . 326 ms
n + 2 T m p - E C C
0 . 442 n + 2 ms
Table 5. The communication overhead of each scheme.
Table 5. The communication overhead of each scheme.
SchemeSending a Single MessageSending n Messages
Zhang et al. [18]388 bytes388 n bytes
Bayat et al. [19]388 bytes388 n bytes
Zhang et al. [21]148 bytes148 n bytes
He et al. [20]144 bytes144 n bytes
Our Scheme80 bytes80 n bytes

Share and Cite

MDPI and ACS Style

Cui, J.; Xu, W.; Zhong, H.; Zhang, J.; Xu, Y.; Liu, L. Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles. Sensors 2018, 18, 1453. https://doi.org/10.3390/s18051453

AMA Style

Cui J, Xu W, Zhong H, Zhang J, Xu Y, Liu L. Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles. Sensors. 2018; 18(5):1453. https://doi.org/10.3390/s18051453

Chicago/Turabian Style

Cui, Jie, Wenyu Xu, Hong Zhong, Jing Zhang, Yan Xu, and Lu Liu. 2018. "Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles" Sensors 18, no. 5: 1453. https://doi.org/10.3390/s18051453

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop