Edge Computing-Based VANETs’ Anonymous Message Authentication
Abstract
:1. Introduction
1.1. Background and Motivation
1.2. Contributions
- (1)
- propose a lightweight elliptic curve-based message authentication scheme that supports vehicles in bulk for anonymous authentication and message authentication, and provides a security proof process.
- (2)
- We propose a vehicle network architecture that can generate temporary edge computing nodes and validate in our experiments that the efficiency of our architecture will be continuously improved as the number of temporary edge computing nodes increases.
- (3)
- Our simulation results in omnet++ prove that our scheme can keep the packet loss rate below 5% when there are more than three TENs in the case of high traffic. Moreover, as the number of TENs increases, our computation overhead and communication overhead will further exceed those of other methods.
1.3. Organization
2. Related Works
2.1. Lightweight Authentication-Based Schemes
2.2. Edge Computing-Assisted Authentication
3. Materials and Methods
3.1. VANET Framework Overview
- (1)
- A TA is a fully trusted node responsible for the registration tasks of RSU and vehicles, generating the public system’s parameters, and distributing keys to each participating node. The TA can also trace vehicles’ real identities in critical moments. To enhance the security of the whole VANET system, the TA and RSUs use a wired secure transmission protocol. Redundant TAs are generally set up to prevent the efficiency of VANET authentication from being affected by the performance bottlenecks of TAs.
- (2)
- An RSU is a wireless communication device that communicates directly with vehicles and is usually set up on the roadside. It is responsible for retrieving received messages and the message broadcast task.
- (3)
- A TEN is a vehicle involved in message authentication (parked around the RSU). With certain computing and storage capabilities, it is responsible for authenticating the vehicle messages and sending the results of the authenticated messages to the RSU.
- (4)
- A vehicle is the vehicle carrying the OBU device. It is only responsible for sending the correct traffic information to RSU or TEN for authentication.
3.2. Message Authentication Scheme
3.2.1. System Initialization
3.2.2. Generate Vehicle Anonymous Identities and Signatures
- 1
- Users need to enter the real identity of the vehicle and password to verify their legitimacy before using the vehicle’s TPD equipment. If there are problems, such as input errors, then the vehicle refuses to provide services. They can input the correct information and then continue to complete subsequent operations.
- 2
- The TPD device of the vehicle selects a random number V and calculates the anonymous identity :
- 3
- After the anonymous identity is generated for the vehicle, the TPD device generates a private key for the vehicle based on its anonymous identity, which is used to sign the traffic information M.
- 4
- The vehicle inserts the current timestamp , i.e., , into the traffic information that needs to be sent, and then enters into the TPD device to sign it with the private key :
- 5
- The vehicle broadcasts to the network every 100~300 ms.
3.2.3. Generate TEN
Algorithm 1 TEN selection algorithm |
Input: Output: The set of Edge nodes |
3.2.4. Batch Authentication of Messages
4. Security Analysis
4.1. Analysis of Message Correctness and Non-Falsifiability
4.2. Privacy Protection of Vehicles
4.3. Real ID Traceability
4.4. Defensive Capabilities against Replay Attacks
5. Experiment and Analysis
5.1. Simulation Enviroment
5.2. Computational Cost
5.3. Communication Cost and Performance
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
References
- Al-Sultan, S.; Al-Doori, M.M.; Al-Bayatti, A.H.; Zedan, H. A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 2014, 37, 380–392. [Google Scholar] [CrossRef]
- Oh, H.; Yae, C.; Ahn, D.; Cho, H. 5.8 GHz DSRC packet communication system for ITS services. In Proceedings of the Gateway to 21st Century Communications Village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No. 99CH36324), Amsterdam, The Netherlands, 19–22 September 1999; IEEE: Piscataway, NJ, USA, 1999; Volume 4, pp. 2223–2227. [Google Scholar]
- Kong, L.; Wang, L.; Gong, W.; Yan, C.; Duan, Y.; Qi, L. LSH-aware multitype health data prediction with privacy preservation in edge environment. World Wide Web 2022, 25, 1793–1808. [Google Scholar] [CrossRef]
- Malek, Y.N.; Najib, M.; Bakhouya, M.; Essaaidi, M. Multivariate deep learning approach for electric vehicle speed forecasting. Big Data Min. Anal. 2021, 4, 56–64. [Google Scholar] [CrossRef]
- Huang, H.; Zeng, Z.; Yao, D.; Pei, X.; Zhang, Y. Spatial-temporal ConvLSTM for vehicle driving intention prediction. Tsinghua Sci. Technol. 2021, 27, 599–609. [Google Scholar] [CrossRef]
- Liu, Y.; Li, D.; Wan, S.; Wang, F.; Dou, W.; Xu, X.; Li, S.; Ma, R.; Qi, L. A long short-term memory-based model for greenhouse climate prediction. Int. J. Intell. Syst. 2022, 37, 135–151. [Google Scholar] [CrossRef]
- Boukerche, A.; Oliveira, H.A.; Nakamura, E.F.; Loureiro, A.A. Vehicular ad hoc networks: A new challenge for localization-based systems. Comput. Commun. 2008, 31, 2838–2849. [Google Scholar] [CrossRef]
- IEEE Std 1609.2. Trial-Use standard for wireless access in vehicular environments—Security services for applications and management message. IEEE Stand. 2006, 1609, 2. [Google Scholar]
- Lin, X.; Sun, X.; Ho, P.H.; Shen, X. GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 2007, 56, 3442–3456. [Google Scholar]
- Yang, Y.; Yang, X.; Heidari, M.; Khan, M.A.; Srivastava, G.; Khosravi, M.; Qi, L. ASTREAM: Data-Stream-Driven Scalable Anomaly Detection with Accuracy Guarantee in IIoT Environment. IEEE Trans. Netw. Sci. Eng. 2022, 1. [Google Scholar] [CrossRef]
- Qi, L.; Yang, Y.; Zhou, X.; Rafique, W.; Ma, J. Fast Anomaly Identification Based on Multi-Aspect Data Streams for Intelligent Intrusion Detection Toward Secure Industry 4.0. IEEE Trans. Ind. Inform. 2021, 18, 6503–6511. [Google Scholar] [CrossRef]
- Kim, J.H.; Seo, S.H.; Hai, N.T.; Cheon, B.M.; Lee, Y.S.; Jeon, J.W. Gateway framework for in-vehicle networks based on CAN, FlexRay, and Ethernet. IEEE Trans. Veh. Technol. 2014, 64, 4472–4486. [Google Scholar] [CrossRef]
- Wu, W.; Li, R.; Xie, G.; An, J.; Bai, Y.; Zhou, J.; Li, K. A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 2019, 21, 919–933. [Google Scholar] [CrossRef]
- Groza, B.; Murvay, S. Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inform. 2013, 9, 2034–2042. [Google Scholar] [CrossRef] [Green Version]
- Lu, R.; Lin, X.; Zhu, H.; Ho, P.H.; Shen, X. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 1229–1237. [Google Scholar]
- Zhang, C.; Ho, P.H.; Tapolcai, J. On batch verification with group testing for vehicular communications. Wirel. Netw. 2011, 17, 1851–1865. [Google Scholar] [CrossRef]
- Wang, C.; Huang, R.; Shen, J.; Liu, J.; Vijayakumar, P.; Kumar, N. A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs. IEEE Internet Things J. 2021, 8, 14248–14257. [Google Scholar] [CrossRef]
- Xu, X.; Li, H.; Xu, W.; Liu, Z.; Yao, L.; Dai, F. Artificial intelligence for edge service optimization in internet of vehicles: A survey. Tsinghua Sci. Technol. 2021, 27, 270–287. [Google Scholar] [CrossRef]
- Wang, B.; Chang, Z.; Zhou, Z.; Ristaniemi, T. Reliable and privacy-preserving task recomposition for crowdsensing in vehicular fog computing. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Cui, J.; Zhang, J.; Zhong, H.; Xu, Y. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Veh. Technol. 2017, 66, 10283–10295. [Google Scholar] [CrossRef]
- Lee, C.C.; Lai, Y.M. Toward a secure batch verification with group testing for VANET. Wirel. Netw. 2013, 19, 1441–1449. [Google Scholar] [CrossRef]
- Wu, L.; Xie, Y.; Zhang, Y. Efficient and secure message authentication scheme for VANET. J. Commun. 2016, 37, 1–10. [Google Scholar]
- Li, F.; Yu, X.; Ge, R.; Wang, Y.; Cui, Y.; Zhou, H. BCSE: Blockchain-based trusted service evaluation model over big data. Big Data Min. Anal. 2021, 5, 1–14. [Google Scholar] [CrossRef]
- Wang, F.; Zhu, H.; Srivastava, G.; Li, S.; Khosravi, M.R.; Qi, L. Robust collaborative filtering recommendation with user-item-trust records. IEEE Trans. Comput. Soc. Syst. 2021, 9, 986–996. [Google Scholar] [CrossRef]
- Wang, C.; Shen, J.; Lai, J.F.; Liu, J. B-TSCA: Blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs. IEEE Trans. Emerg. Top. Comput. 2020, 9, 1386–1396. [Google Scholar] [CrossRef]
- Lei, A.; Cruickshank, H.; Cao, Y.; Asuquo, P.; Ogah, C.P.A.; Sun, Z. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 2017, 4, 1832–1843. [Google Scholar] [CrossRef]
- Xu, Z.; Liang, W.; Li, K.C.; Xu, J.; Jin, H. A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J. Parallel Distrib. Comput. 2021, 149, 29–39. [Google Scholar] [CrossRef]
- Basudan, S.; Lin, X.; Sankaranarayanan, K. A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J. 2017, 4, 772–782. [Google Scholar] [CrossRef]
- Yao, Y.; Chang, X.; Mišić, J.; Mišić, V.B.; Li, L. BLA: Blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J. 2019, 6, 3775–3784. [Google Scholar] [CrossRef]
- Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
- Xie, Y.; Wu, L.; Zhang, Y.; Ye, L. Anonymous mutual authentication and key agreement protocol in multi-server architecture for VANETs. J. Comput. Res. Dev. 2016, 53, 2323–2333. [Google Scholar]
- Azrour, M.; Mabrouki, J.; Guezzaz, A.; Farhaoui, Y. New enhanced authentication protocol for internet of things. Big Data Min. Anal. 2021, 4, 1–9. [Google Scholar] [CrossRef]
- Wang, F.; Li, G.; Wang, Y.; Rafique, W.; Khosravi, M.R.; Liu, G.; Liu, Y.; Qi, L. Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city. ACM Trans. Internet Technol. (TOIT) 2022, 1–19. [Google Scholar] [CrossRef]
- Azees, M.; Vijayakumar, P.; Deboarh, L.J. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2467–2476. [Google Scholar] [CrossRef]
- Vijayakumar, P.; Azees, M.; Kozlov, S.A.; Rodrigues, J.J. An anonymous batch authentication and key exchange protocols for 6G enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2021, 23, 1630–1638. [Google Scholar] [CrossRef]
- Xia, Z.; Zeng, L.; Gu, K.; Li, X.; Jia, W. Conditional Identity Privacy-Preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-Based IoVs. ACM Trans. Internet Technol. (TOIT) 2022, 22, 1–18. [Google Scholar] [CrossRef]
- Tan, X.; Zhang, J.; Zhang, Y.; Qin, Z.; Ding, Y.; Wang, X. A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network. Tsinghua Sci. Technol. 2020, 26, 36–47. [Google Scholar] [CrossRef]
Lable | Interpretation |
---|---|
TA’s public key | |
Part of TA’s public key | |
Part of TA’s key | |
Anonymous identity of the vehicle | |
Part of anonymous identity of the vehicle | |
Keys of the vehicle | |
The true identity of the vehicle | |
Anonymous identity of proxy vehicles | |
Partial anonymity of proxy vehicles |
Symbol | Operation | Execution Time/ms |
---|---|---|
Point multiplication on elliptic curves | 0.7358 ms | |
Vector point multiplication for elliptic curves | 0.0428 ms | |
Point addition and multiplication operations on elliptic curves | 0.004 ms | |
Bilinear pair operation | 6.4164 ms | |
Bilinear point-to-point multiplication operation | 2.6439 ms | |
Bilinear point addition operation | 0.01646 ms | |
MapToPoint operation | 1.3277 ms | |
One-way hash function operation | 0.0002 ms |
Plan | Verify 1 Message | Verify n Information |
---|---|---|
CPAA | ++ | +++ |
ESMA | ++ | ++ |
AKDT | +++ | ++++ |
Ours | ++ | +++ |
Plan | Verify 1 Message | Verify n Information |
---|---|---|
CPPA | 120 bytes | 120n bytes |
ESMA | 160 bytes | 160n bytes |
AKDT | 292 bytes | 292n bytes |
Ours | 200 bytes | 200n bytes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, C.; Peng, J.; Xu, Y.; Wei, Q.; Zhou, L.; Tang, Y. Edge Computing-Based VANETs’ Anonymous Message Authentication. Symmetry 2022, 14, 2662. https://doi.org/10.3390/sym14122662
Yang C, Peng J, Xu Y, Wei Q, Zhou L, Tang Y. Edge Computing-Based VANETs’ Anonymous Message Authentication. Symmetry. 2022; 14(12):2662. https://doi.org/10.3390/sym14122662
Chicago/Turabian StyleYang, Chengjun, Jiansheng Peng, Yong Xu, Qingjin Wei, Ling Zhou, and Yuna Tang. 2022. "Edge Computing-Based VANETs’ Anonymous Message Authentication" Symmetry 14, no. 12: 2662. https://doi.org/10.3390/sym14122662
APA StyleYang, C., Peng, J., Xu, Y., Wei, Q., Zhou, L., & Tang, Y. (2022). Edge Computing-Based VANETs’ Anonymous Message Authentication. Symmetry, 14(12), 2662. https://doi.org/10.3390/sym14122662