Next Article in Journal
PerFication: A Person Identifying Technique by Evaluating Gait with 2D LiDAR Data
Previous Article in Journal
Electrical Characterization of a Unimorph Vibration Energy Harvester with Al/AlN/Al Structure Realized by Magnetron Sputtering
Previous Article in Special Issue
Software-Defined Virtual Private Network for SD-WAN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles

1
Department of Computer Engineering (Smart Security), Gachon University, Seongnam 13120, Republic of Korea
2
System Security Research Section, Electronics and Telecommunications Research Institute, Daejeon 34129, Republic of Korea
3
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(16), 3136; https://doi.org/10.3390/electronics13163136
Submission received: 16 July 2024 / Revised: 1 August 2024 / Accepted: 6 August 2024 / Published: 8 August 2024

Abstract

:
In the Internet of Vehicles (IoV) environments, vehicles and roadside units (RSUs) communicate predominantly through public channels. These vehicles and RSUs exchange various data, such as traffic density, location, speed, etc. Therefore, secure and efficient authentication and key establishment (AKE) are needed to guarantee user privacy when exchanging data between vehicles and RSUs. Recently, a secure and computationally AKE scheme have been proposed to construct secure IoV environments. In their research, the authors asserted that their AKE scheme provides comprehensive security properties, protecting against various potential threats while simultaneously ensuring session key integrity, robust mutual authentication. This paper proved that the previous scheme does not prevent various attacks using logical and mathematical analyses. Moreover, we demonstrated that this scheme does not meet the essential security requirements and correctness of security assumptions. We perform the simulation proof using AVISPA, which is well known as a formal verification tool. To enhance the resilience of attacks, we propose solutions aimed at developing more robust and efficient AKE for IoV environments.

1. Introduction

The Internet of Vehicles (IoV) plays a crucial role in advancing intelligent transportation systems, significantly enhancing traffic efficiency and the capabilities of autonomous vehicles. The IoV architecture comprises a network of roadside units (RSUs), a central trusted authority (TA), and vehicles equipped with onboard units (OBUs). This interconnected system utilizes the “Dedicated Short Range Communications” (DSRCs) protocol for vehicle-to-RSU wireless communication, while RSUs maintain wired connections to the TA. By facilitating real-time exchange of critical data such as vehicle telemetry and traffic conditions, the IoV environments promise to create a more responsive and efficient transportation ecosystem.
Despite its promising potential, the IoV confronts significant challenges in data security and environmental sustainability [1]. The proliferation of sensitive information within the IoV system amplifies vulnerability to data leakages and potential attacks, necessitating robust security protocols [2,3]. The expanding vehicle population also contributes to escalating carbon emissions, demanding the integration of eco-friendly strategies. Therefore, to enhance security and minimize energy consumption, there is a critical need to develop a computationally efficient and sustainable AKE scheme for the IoV.
The contemporary AKE protocols in IoV systems typically employ a centralized architecture, wherein all vehicles authenticate only with the trusted authority (TA), while roadside units (RSUs) function as intermediary nodes enabling vehicle–TA communication. The IoV environment is characterized by high-speed vehicular mobility, resulting in a highly dynamic network topology and communication patterns. Consequently, vehicles need to establish secure mutual AKE with the TA and exchange encrypted data within strict time limits. Moreover, many current AKE methods are based on computationally intensive public key cryptosystem as Elliptic Curve Cryptography (ECC). As traffic density rises, these centralized AKE with higher computational demands are more prone to encountering communication or computational bottlenecks at the TA. In high-density traffic environments, the timely transmission of messages between vehicles and the trusted authority (TA) becomes increasingly challenging. This situation could lead to extended authentication queues or necessitates multiple re-transmissions of authentication messages, resulting in substantial energy waste.
To overcome these issues, several research works have been proposed for ensuring efficiency and sustainability in IoV [4,5,6,7,8,9,10]. He et al. [4] introduced a multi-server AKE scheme that operates without the need for a trusted online third party. Ying and Nayak [5] presented an anonymous and lightweight AKE scheme utilizing smart cards. Their protocol significantly lowers communication and computational costs and is resistant to offline password guessing attacks. However, Chen et al. [6] proved that Ying and Nayak’s [5] scheme does not resist several attacks such as fixation, replay, and offline identity guessing attacks. Chen et al. [6] also proposed a secure AKE scheme for IoV, which can reduce a computation cost during the authentication phases. However, Chen et al.’s [6] scheme suffers from high storage costs as it necessitates storing a large amount of data in memory [7]. Cui et al. [8] proposed a double pseudonym-based AKE scheme for IoV. Dua et al. [9] also proposed a robust AKE scheme for IoV, which has considered only vehicle-to-vehicle communications. Li et al. [10] proposed a privacy-preserving AKE scheme for data privacy in IoV. However, all the aforementioned works [6,7,8,9,10] have high computational cost and are unsuitable for workable IoV environments.
Recently, Xu et al. [11] presented an efficient AKE scheme for providing high security and computational efficiency in IoV environments. However, we demonstrate that Xu et al.’s scheme does not resist various security attacks, such as physical capture and impersonation. Since the security parameters stored in memory are easily leaked to an adversary, the adversary can obtain the secret parameters via a threat model.
To address these issues, research is being conducted on physically secure AKE schemes in vehicular network environments [12,13]. In 2024, Yu and Park [12] proposed the robust and anonymous AKE scheme using the physical unclonable function (PUF) for V2G networks. Wang et al. [13] also proposed a lightweight and physically secure AKE scheme for vehicular networks. In this paper, we propose solutions that use lightweight and physically secure techniques to enhance data security and protect user privacy.
This paper is organized as follows: Section 1, Section 2 and Section 3 present a review and cryptanalysis of Xu et al.’s [11] scheme. Section 4 offers a solution to enhance security and protection against attacks. Section 5 presents conclusions and future works.

1.1. Motivations and Contributions

The main goal of our work is to prove the important security flaws of the Xu et al.’s scheme [11]. In their scheme, an attacker can easily generate the session key between entities using impersonation attacks. Therefore, we pointed out that Xu et al.’s scheme does not guarantee the security of a session key using formal (mathematical) security analysis, called the “Real-or-Random (ROR) model” [14], which is well known for formal security proof models [15,16]. Finally, we prove that their scheme is unsuitable for practical IoV environments and propose solutions for overcoming these flaws and enhancing its security.

1.2. Threat Model

In Xu et al.’s scheme [11], they perform the security analysis under the “Dolev–Yao (DY) threat model” [17]. According to the DY threat model, an adversary can inject, delete, modify and obtain the all public messages between communicating parties, including the vehicle, RSUs, and TA. The TA is a trusted entity that cannot be compromised by an adversary.
The adversary is unable to access the data stored in the RSU’s memory because RSUs are equipped with a tamper-proof device (TPD) designed to prevent external data access. However, the adversary can freely capture and retrieve data from any number of OBUs. Through this capturing, the adversary can obtain all the secret information stored in the OBU’s memory, as OBUs in vehicles lack physical protection [11].

2. Review of Xu et al.’s Scheme

This section concisely reviews Xu et al.’s [11] scheme and introduces the threat model for performing a cryptanalysis of their scheme. Xu et al.’s scheme consists of three phases: initialization, registration, and authentication. Table 1 shows the notations utilized in this paper.

2.1. Initialization Phase

This phase is carried out by TA to build up the initial parameters. The TA generates the master key K T A and stores it in memory of TA. The TA also selects the collision-resistant hash function h.

2.2. Registration Phase

In this phase, vehicles register with the TA to access the IoV networks. The detailed steps of the process are outlined below.
(1)
The TA selects an identity I D V / R and a temporary identity T I D V / R for vehicles and RSUs, respectively, and then TA chooses a nonce P K s for each vehicle.
(2)
The TA chooses a random number r, and computes A V = r K T A , B R = h ( I D R , K T A ) , X V = I D V h ( r , K T A ) . After that, the TA stores { I D V , T I D V , A V , P K s } and { I D R , T I D R , B R , K T A } in the memory of the vehicle and RSU, respectively.
(3)
Finally, the TA stores { I D V , T I D V , A V , P K s } and { I D R , T I D R , B R , K T A } in the database.

2.3. Authentication and Key Agreement Phase

In this phase, the vehicle, TA, and RSU perform a mutual authentication to establish the session key. This phase is shown in Figure 1 and its detailed description is presented below.
(1)
The vehicle first generates a nonce n 1 and timestamp t 1 , and computes B V = h ( I D V , P K s ) , S 1 = n 1 B V , and S 2 = h ( I D V , T I D V , A V , S 1 , t 1 , n 1 ) . Then, the vehicle sends messages for authentication { T I D V , A V , S 1 , S 2 , t 1 } to the RSU.
(2)
After receiving the messages, the RSU checks the freshness of timestamp t 1 . If it is valid, the RSU generates nonce n 2 and a timestamp t 2 , and then the RSU computes S 3 = n 2 B R , S 4 = h ( T I D V , T I D R , I D R , S 3 , t 2 , n 2 ) , and sends messages { ( T I D V , T I D R , S 3 , S 4 , t 2 ) } to the TA.
(3)
The TA checks the freshness of timestamp t 2 . If it is verified, the TA checks if { T I D V , T I D R } are in the database. Then, the TA retrieves the corresponding data { T I D R , I D R , B R } and computes n 2 * = S 3 B R , S 4 * = h ( T I D V , T I D R , I D R , S 3 , t 2 , n 2 * ) .
(4)
The TA checks whether S 4 * = ? S 4 , and if it is correct, the TA generates a nonce n 3 and a timestamp t 3 . After that, the TA computes M 1 = h ( n 2 * , n 3 , K T A ) , S 5 = n 3 B R , S 6 = M 1 P K s , S 7 = h ( I D R , S 5 , S 6 , X V , n 3 , t 3 ) , and sends the messages { S 5 , S 6 , S 7 , X V , t 3 } to the RSU.
(5)
On receiving the messages for the TA, the RSU checks the freshness of timestamp t 3 , and then computes n 3 * = S 5 B R and S 7 * = h ( I D R , S 5 , S 6 , X V , n 3 * , t 3 ) . The RSU also checks whether S 7 * = ? S 7 . If it is correct, the RSU computes M 1 = h ( n 2 , n 3 * , K T A ) , P K s = M 1 S 6 , r * = A V K T A , I D V * = X V h ( r * , K T A ) , B V = h ( I D V * , P K s ) , n 1 * = S 1 P K s , and S 2 * = h ( I D V * , T I D V , A V , S 1 , t 1 , n 1 * ) . After that, the RSU generates a nonce n 4 , r + and timestamp t 4 , and checks if S 2 * = ? S 2 . If it is valid, the RSU computes K s = h ( n 1 * , n 4 , P K s ) , P K s + = h ( n 1 * , n 4 , K s ) , X V + = I D V * h ( r + , K T A ) , S 8 = n 2 M 1 P K s + , S 9 = n 3 * M 1 , X V + , S 10 = h ( S 8 , S 9 , K T A , n 2 , n 3 * , t 4 ) , and sends these messages { S 8 , S 9 , S 10 , t 4 } to the TA.
(6)
TA checks the freshness of timestamp t 4 . If it is correct, the TA computes S 10 * = h ( S 8 , S 9 , K T A , n 2 * , n 3 , t 4 ) and checks if S 10 * = ? S 10 . The TA computes P K s + = n 2 * M 1 S 8 , X V + = n 3 M 1 S 9 and selects a new identity T I D V + , a new temporary identity T I D R + , and a timestamp t 5 . Then, the TA calculates M 2 = h ( n 2 * , n 3 , P K s ) , M 3 = h ( I D R , n 2 * , n 3 ) , S 11 = M 2 T I D V + , S 12 = M 3 T I D R + , S 13 = h ( S 11 , S 12 , K T A , M 2 , M 3 , t 5 ) and replaces { T I D V , X V , P K s } and { T I D R , I D R , B R } with { T I D V , X V , P K s , T I D V + , X V + , P K s + } and { T I D R , I D R , B R , T I D R + } in database. The TA also sends the messages { S 11 , S 12 , S 13 , t 5 } to the RSU.
(7)
After receiving the messages, the RSU checks the freshness of timestamp t 5 . If it is satisfied, the RSU computes M 2 * = h ( n 2 , n 3 * , P K s ) , M 3 * = h ( I D R , n 2 , n 3 * ) , S 13 * = h ( S 11 , S 12 , K T A , M 2 * , M 3 * , t 5 ) , and then checks whether S 13 * = ? S 13 . If it is valid, the RSU computes a timestamp t 6 , T I D V + = M 2 * S 11 , T I D R + = M 3 * S 12 , A V + = r + K T A , M 4 = h ( n 1 * , n 4 , I D V * ) , S 14 = M 4 A V + , S 15 = M 4 T I D V + , S 16 = n 4 B V , S 17 = h ( S 14 , S 15 , S 16 , S 17 , t 6 ) and replaces T I D R with T I D R + in the memory. The RSU sends the messages { S 14 , S 15 , S 16 , S 17 , t 6 } to the vehicle.
(8)
The vehicle checks the freshness of timestamp t 6 . If it is valid, the vehicle computes n 4 * = S 16 B V , S 17 * = h ( S 14 , S 15 , S 16 , I D V , n 4 * , t 6 ) , and then checks if S 17 * = ? S 17 . If it is true, the vehicle computes M 4 = h ( n 1 , n 4 * , I D V ) , A V + = M 4 S 14 , T I D V + = M 4 S 15 , K s = h ( n 1 , n 4 * , P K s ) , and P K s + = h ( n 1 , n 4 * , K s ) . Finally, the vehicle replaces the parameters { T I D V , A V , P K s } with the updated parameter { T I D V + , A V + , P K s + } in its memory.

3. Security Flaws of Xu et al.’s Scheme

In this section, we prove that Xu et al.’s scheme is insecure against physical capture and impersonation attacks. Moreover, we also demonstrate that Xu et al.’s scheme is unable to guarantee the essential security requirements such as session key security and secure mutual authentication.

3.1. Formal Analysis Using ROR Model

We show that Xu et al.’s scheme cannot ensure the security of the session key using formal security analysis as the “ROR model [14]”, which is generally the accepted formal proof method [15,16]. To evaluate its security, we first describe the fundamentals of this model, and then analyze the security of Xu et al.’s scheme through this proof.
  • Participants: The instances i n s t 1 , i n s t 2 , and i n s t 3 of the protocol for the vehicle (VH), trust authority (TA), and roadside unit (RSU) are represented by Π V H i n s t 1 , Π T A i n s t 1 , and Π R S U i n s t 2 , respectively.
  • Accepted state: Upon completion of the message exchange, the oracle Π i n s t enters an accepted state, and its current session identifier s i d is defined by the ordered concatenation of all exchanged messages.
  • Partnering: Π V H i n s t 1 , Π T A i n s t 2 , and Π R S U i n s t 3 are defined as partners when they share the same session identifier ( s i d ), reach the accepted state, and successfully complete a mutual AKE.
  • Freshness: To carry out the ROR proof, the instances ( Π V H i n s t 1 , Π T A i n s t 2 , and Π R S U i n s t 3 ) are considered fresh if the current session key shared between the VH, TA, and RSU remains uncompromised by attacker A.
  • Attacker: According to Xu et al.’s threat model [11], an A can completely control the public networks and utilize the ROR queries described in Table 2 to break its security.
  • Semantic Security: A tries to guess the session key of instance from a random nonce. A first guesses a bit c using ROR queries. If A can correctly guess a bit c, A wins the game and breaks the semantic security of the scheme. The event of adversary A winning the game is denoted as “ W i n ”, with the breaking advantage of the session key of Xu et al.’s scheme P defined as A d v P = | 2 P r [ W i n ] 1 | .
  • Random Oracle: All entities can have access to a Random Oracle, which is implemented as a collision-resistant hash function H.
We demonstrate that Xu et al.’s scheme is unable to guarantee the security of a session key by the Theorem 1.
Theorem 1. 
Under the assumption that the TA remains uncompromised, we define q h , q s , q e , N, and l s as the number of Random Oracle queries, Send queries, Execute queries, the range space of random numbers, and the hash function output length, respectively. Let adversary A, operating within polynomial time t against Xu et al.’s scheme P, have an advantage A d v P A in compromising the security of session key. Then,
A d v P A q h 2 2 l s + ( q s + q e ) 2 N
The Real-or-Random (ROR) model-based formal proofs are performed around a series of games G i ( i = 0 , 1 , 2 ) , where S u c c i denotes the event in which adversary A successfully wins game G i .
  • Game G 0 : Game G 0 simulates an active attack by adversary A against the protocol, with a randomly selected c at the game’s outset and a specific winning advantage.
    A d v P A = | 2 . P r [ S u c c 0 ] 1 |
  • Game G 1 : Game G 1 models an eavesdropping attack where A controls exchanged messages via E x e c u t e queries, followed by a T e s t query to distinguish between the actual S K and a arbitrary value. In Xu et al.’s scheme, the VH, TA, and RSU make an S K computed by K s = h ( n 1 , n 4 , P K s ) . Although A obtains all the messages transmitted in public channel, A does not compute the S K and increase the probability of A winning games. Then, we could obtain
    P r [ S u c c 1 ] = P r [ S u c c 0 ]
  • Game G 2 : Game G 2 models an impersonation attack, where A attempts to impersonate the legitimate V H using S e n d ( Π i n s t , M s g ) , C o r r u p t U E ( Π V H i n s t 1 ) , and some H a s h queries. Under the threat model of Xu et al., A first executes the C o r r u p t U E ( Π V H i n s t 1 ) query, and then obtains the value { I D V , T I D V , A V , P K s } in the vehicle’s memory. The collision probability for hash and random number are given by q h 2 2 l s + 1 and ( q s + q e ) 2 2 N , respectively. A can break the S K by utilizing the obtained real identity I D V , P K s , and A V because A can execute the AKE procedure without needing to resolve the hash collision problem. Therefore, Game G 1 and G 2 are distinguishable. Then, we could obtain the following:
    | P r [ S u c c 1 ] P r [ S u c c 2 | q h 2 2 l s + 1 + ( q s + q e ) 2 2 N
Upon completion of all games ( G 0 , G 1 , G 2 ) , A attempts to correctly determine the c using T e s t query. Therefore,
A d v P , G 2 A = 1 2
The result can be derived using Equations (2), (3), and (5).
1 2 . A d v P A = | P r [ S u c c 0 ] 1 2 | = | P r [ S u c c 1 ] 1 2 | = | P r [ S u c c 1 ] P r [ S u c c 2 ] |
Then, the final result can be derived using Equations (4)–(6):
A d v P A q h 2 2 l s + ( q s + q e ) 2 N
Finally, we can break the S K without solving the problem of hash collision. Therefore, we demonstrate that Xu et al.’s scheme does not ensure the S K security using the ROR proof.

3.2. Informal Security Analysis

We point out that Xu et al.’s scheme is unable to resist physical capture and impersonation attacks, and achieve secure mutual AKE using this analysis.

3.2.1. Physical Capture Attack

During the registration procedure, the TA stores the values { I D V , T I D V , A V , P K s } in the memory of VH without adopting any cryptographic methods. Moreover, under the threat model of Xu et al.’s scheme (Section 1.2), an adversary A can easily extract these values by power analysis attacks [18,19]. Based on this attack, A could easily perform impersonation attacks and compromise the privacy of users.

3.2.2. Vehicle Impersonation Attack

In Xu et al.’s scheme [11], they analyze its security using the proposed threat model. Unfortunately, if an adversary A compromises the vehicle and obtains the data of the vehicle’s memory using the physical capture attacks, A can easily generate the request messages { T I D V , A V , S 1 , S 2 } and calculate the correct session key K s = h ( n 1 , n 4 * , K s ) because the private parameters of vehicle’s memory is stored without applying any cryptographic techniques. Therefore, Xu et al.’s scheme does not resist impersonation attacks, and its description of the processes included in this attack is presented in Figure 2.

3.2.3. Secure Mutual Authentication

According to the above-mentioned attacks, A can easily impersonate a legitimate vehicle to access the IoV networks presented by Xu et al.’s scheme and successfully authenticate among participated nodes. Moreover, A can compute the session key between vehicle/RSU and TA. Therefore, Xu et al.’s scheme is unable to ensure a mutual AKE.

3.2.4. Insecure Authentication Mechanism

In Xu et al.’s scheme, the vehicle sends the access request { T I D V , A V , S 1 a , S 2 a , t 1 } and only receives final response messages { S 14 , S 15 , S 16 , S 17 , t 6 } without verification. However, it becomes highly vulnerable to various attacks because the vehicle is not physically protected. Therefore, it is essential to include steps in the three-party authentication process where messages exchanged with the vehicle during its processes can be verified.

3.2.5. Correctness of Threat Model

Xu et al. indicate security assumptions to evaluate the protocol’s security, and then asserted that the proposed scheme can resist against physical capture and impersonation attacks. Unfortunately, we proved that Xu et al.’s scheme is insecure against these attacks under Xu et al.’s threat model and they were unable to contemplate various security attacks. Therefore, we propose the solutions to enhance the security level in Section 4.

3.3. Comparative Analysis of Security Properties

We perform a comparative analysis of the security properties of Xu et al.’s scheme and other related works [4,5,6,11,13]. Table 3 presents the security features of both Xu et al.’s and prior schemes. The earlier schemes failed to prevent multiple types of attacks. To prevent these attacks, we suggest the solutions in Section 4.

3.4. Simulation Analysis Using AVISPA Tool

The security of the proposed cryptographic protocol is formally validated using AVISPA, a widely accepted tool for analyzing security protocols [20,21]. AVISPA specifically verifies protocols against replay and man-in-the-middle attacks. The tool utilizes the High-Level Protocol Specification Language (HLPSL) [22] to define the security features of protocols. The AVISPA employs four back-end models [23]: “constraint logic-based attack searcher (CL-AtSE)”, “on the fly model checker (OFMC)”, “SAT-based model checker (SATMC)”, and “tree automata based on protocol analyzer (TA4SP)”. The process involves translating the HLPSL code into an Intermediate Format (IF) using the “HLPSL2IF” translator, and then it is analyzed by the four back-ends to assess security properties. Figure 3 illustrates this process, and a detailed description of HLPSL can be found in [21,22].

3.4.1. Simulation Environments

The AVISPA simulation is operated on a system running on Ubuntu 10.10, equipped with 2 GB of RAM, and powered by an Intel Core I9-11900K processor with a clock speed of 3.50 GHz and 64 GB of RAM.

3.4.2. HLPLS Specifications

To evaluate the security of protocols through this simulation, all phases of Xu et al.’s scheme are presented using HLPLS code. We have tested it by considering the authentication phases among entities. In Xu et al.’s scheme, there are three basic roles (TA, VH, RSU), and their descriptions are illustrated in Figure 4, Figure 5 and Figure 6. The environment and session are shown in Figure 7.

3.4.3. Simulation Results

To prove that Xu et al.’s scheme is vulnerable to replay and man-in-the-middle attacks, we simulated the OMFC and CL-AtSe utilizing the above-mentioned codes (Figure 4, Figure 5, Figure 6 and Figure 7), as follows:
  • OFMC: The search depth and explored nodes are 1 and 3, respectively. The search time is 0.14 s.
  • CL-AtSe: The time of translation is 0.02 s and 2 states are analyzed. the two states.
Figure 8 displays the results from the OFMC and CL-AtSe, indicating “UNSAFE”. Consequently, Xu et al.’s scheme cannot prevent replay and man-in-the-middle attacks.

4. Security Fixes

In Xu et al.’s scheme [11], the significant security vulnerabilities are that the secret information is stored in vehicles without proper cryptographic methods. Through these security weaknesses, an adversary can easily obtain the secret data stored in the OBU of vehicles, which are utilized to impersonate and make the session key among participated nodes. These significant security issues are presented in Section 3.
Over recent decades, numerous AKE schemes have been developed to protect user and data privacy. These schemes generally store secret information in the device memory for AKE between entities. Xu et al. also tried to resolve issues using the strong assumptions that the RSU and TA are trusted entities. Despite recognizing this vulnerability, Xu et al. failed to adequately resolve these concerns and did not consider all possible weaknesses in the design of their scheme. To alleviate the security issues identified in Xu et al.’s scheme, we suggest the following essential guidelines.
Fix 1.
In the registration phase of Xu et al.’s scheme, the TA should not store the secret data { I D V , T I D V , A V , P K s } as plaintext to prevent physical capture attacks. According to their threat model, an adversary could easily capture the OBU of the vehicle and obtain the stored data. The vehicle should securely store these parameters by encrypting them with XOR operations and a hash function. For instance, rather than storing I D V directly in the OBU, it can be stored by applying an XOR operation with specific parameters ( I D V h ( P a s s w o r d ) ) or by generating parameters based on the hashed value of I D V ( T I D V = h ( I D V , P a s s w o r d , r a n d o m n u m b e r ) ). This method prevents attackers from easily accessing I D V and other secret parameters because these parameters are not stored in the OBU as plaintext.
Fix 2.
To prevent physical capture attacks, we can employ the PUF on vehicles. In Xu et al.’s scheme, the identity and secret parameters are vulnerable to extraction, which facilitates the impersonation attacks. However, the PUF base system offers a robust solution by generating secret parameters that are inherently resistant to extraction [12,24]. For example, it is possible to generate session keys by generating parameters using the unique random values generated by a PUF. In Xu et al.’s method, the session key is generated using the random nonces { n 1 , n 4 } and the hash value of the previous session key P K s . Therefore, if the h ( P U F ) value is used in generating the session key ( K s = h ( P U F ) , n 1 , n 4 , P K s ), an attacker cannot steal the session key without access to the PUF device. This solution not only resolves the current security issues but also mitigates other potential vulnerabilities using the unique physical characteristics of PUF.
Fix 3.
Xu et al.’s scheme adopted a two-factor authentication mechanism utilizing vehicles and secret information. However, the two-factor authentication mechanism used in the proposed scheme does not function properly if secret information is leaked. To address this limitation and enhance overall security, we suggest utilizing a three-factor authentication mechanism, which would incorporate biometric verification using a fuzzy extractor [25] with vehicle and PUF-based secret parameters. A fuzzy extractor, which is used in biometric-based authentication methods, can be utilized to design a three-factor AKE scheme. In a three-factor AKE scheme, secret parameters can be stored by conducting an XOR or hashing them with the biometric value generated by the fuzzy extractor. Therefore, even if an attacker physically captures the device, they cannot access the actual secret parameters used in the AKE without the biometric data. Therefore, we prevent the physical capture attacks.
The suggested solutions aim to mitigate vehicle impersonation attacks and we do not claim that our solutions are complete against all potential security vulnerabilities. Nevertheless, these enhancements significantly improve system security and increase the complexity of potential attacks for an adversary.
Xu et al. made a commendable effort in constructing a secure and efficient key agreement scheme for IoV. However, they would have examined their scheme from multiple perspectives. The advancement of research in this field is characterized by diverse approaches from different researchers. This paper serves to highlight the ongoing need for developing secure and efficient AKE schemes in IoV environments.

5. Conclusions and Future Works

This paper refers to “a secure and computationally efficient AKE scheme for IoV”. We pointed out that Xu et al.’s scheme fails to prevent vehicle impersonation attacks, thereby not achieving secure AKE and not meeting the security requirements of their threat model. Furthermore, we demonstrate through formal mathematical analysis using the ROR model that it does not guarantee session key security. We also perform the simulation proof using the AVISPA which is well known for formal verification tool. These security vulnerabilities make the scheme unsuitable and impractical for deployment in real-world environments. Therefore, we propose solutions to enhance security levels to develop a more secure and efficient AKE for IoV environments. Our future work involves designing a robust and lightweight AKE scheme that can be applied in various environments with resource-limited devices by utilizing the proposed solution.

Author Contributions

Conceptualization, K.P.; methodology, K.P.; validation, K.P.; formal analysis, K.P.; writing—original draft preparation, K.P.; validation, M.K.; formal analysis, M.K.; writing—review and editing, Y.P.; supervision, Y.P.; project administration, Y.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Gachon University research fund of 2023 (GCU-202400440001).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liang, W.; Xie, S.; Long, J.; Li, K.-C.; Zhang, D.; Li, K. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inform. Sci. 2019, 503, 129–147. [Google Scholar] [CrossRef]
  2. Sharma, V. An energy-efficient transaction model for the blockchain-enabled internet of vehicles (IoV). IEEE Commun. Lett. 2019, 23, 246–249. [Google Scholar] [CrossRef]
  3. Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inf. 2018, 14, 3690–7300. [Google Scholar] [CrossRef]
  4. He, D.; Zeadally, S.; Kumar, N.; Wu, W. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf. Forensics. Secur. 2016, 11, 2052–2064. [Google Scholar] [CrossRef]
  5. Ying, B.; Nayak, A. Anonymous and lightweight authentication for secure vehicular networks. IEEE Trans. Veh. Technol. 2017, 66, 10626–10636. [Google Scholar] [CrossRef]
  6. Chen, C.-M.; Xiang, B.; Liu, Y.; Wang, K.-H. A secure authentication protocol for internet of vehicles. IEEE Access 2019, 7, 12047–12057. [Google Scholar] [CrossRef]
  7. Yu, S.; Lee, J.; Park, K.; Das, A.K.; Park, Y. IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access 2020, 8, 167875–167886. [Google Scholar] [CrossRef]
  8. Cui, J.; Xu, W.; Zhong, H.; Zhang, J.; Xu, Y.; Liu, L. Privacy-preserving authentication using a double pseudonym for internet of vehicles. Sensors 2018, 18, 1453. [Google Scholar] [CrossRef] [PubMed]
  9. Dua, A.; Kumar, N.; Das, A.K.; Susilo, W. Secure message communication protocol among vehicles in smart city. IEEE Trans Veh. Technol. 2018, 67, 4359–4373. [Google Scholar] [CrossRef]
  10. Li, X.; Liu, T.; Obaidat, M.S.; Wu, F.; Vijayakumar, P.; Kumar, N. A lightweight privacy-preserving authentication protocol for VANETs. IEEE Syst. J. 2020, 14, 3547–3557. [Google Scholar] [CrossRef]
  11. Xu, A.; Li, X.; Xu, J.; Liang, W.; Choo, K.-K.R. A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles. Comput. Electr. Eng. 2021, 95, 107409. [Google Scholar] [CrossRef]
  12. Yu, S.; Park, K. PUF-based robust and anonymous authentication and key establishment scheme for V2G networks. IEEE Internet Things J. 2024, 11, 15450–15464. [Google Scholar] [CrossRef]
  13. Wang, S.; Fan, Z.; Su, Y.; Zheng, B.; Liu, Z.; Dai, Y. A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks. Electronics 2024, 13, 1418. [Google Scholar] [CrossRef]
  14. Abdalla, M.; Fouque, P.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC’05), Les Diablerets, Switzerland, 23–26 January 2005; Lecture Notes in Computer Science (LNCS). pp. 65–84. [Google Scholar]
  15. Park, K.; Park, Y. MIoT-CDPS: Complete decentralized privacy-preserving scheme for medical internet of things. Internet Things 2024, 27, 101250. [Google Scholar] [CrossRef]
  16. Park, K.; Lee, J.; Das, A.K.; Park, Y. BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1719–1729. [Google Scholar] [CrossRef]
  17. Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198. [Google Scholar] [CrossRef]
  18. Eisenbarth, T.; Kasper, T.; Moradi, A.; Paar, C.; Salmasizadeh, M.; Shalmani, M.T.M. On the power of power analysis in the real world: A complete break of the KEELOQ code hopping scheme. In Advances in Cryptology–CRYPTO; Springer: Berlin/Heidelberg, Germany, 2008; pp. 203–220. [Google Scholar]
  19. Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Advances in Cryptology–CRYPTO, Proceedings of the 19th Annual International Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 1999; Springer: Berlin/Heidelberg, Germany, 1999; pp. 388–397. [Google Scholar]
  20. Kim, M.; Park, K.; Park, Y. A reliable and privacy-preserving vehicular energy trading scheme using decentralized identifiers. Mathematics 2024, 12, 1450. [Google Scholar] [CrossRef]
  21. Yu, S.; Lee, J.; Sutrala, A.K.; Das, A.K.; Park, Y. LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks. Comput. Netw. 2023, 224, 109612. [Google Scholar] [CrossRef]
  22. Von Oheimb, D. The high-level protocol specification language HLPSL developed in the EU project avispa. In Proceedings of the APPSEM 2005 Workshop, Tallinn, Finland, 13–15 September 2005; pp. 1–2. [Google Scholar]
  23. Vigano, L. Automated Security Protocol Analysis with the AVISPA Tool. Electron. Notes Theor. Comput. Sci. 2006, 155, 61. [Google Scholar] [CrossRef]
  24. Yu, S.; Park, Y. Robust and efficient authentication and group—proof scheme using physical unclonable functions for wearable computing. Sensors 2023, 23, 5747. [Google Scholar] [CrossRef]
  25. Dodis, Y.; Ostrovsky, R.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 2008, 38, 97. [Google Scholar] [CrossRef]
Figure 1. Authentication and key agreement phase of Xu et al.’s scheme.
Figure 1. Authentication and key agreement phase of Xu et al.’s scheme.
Electronics 13 03136 g001
Figure 2. Vehicle impersonation attack in Xu et al.’s scheme.
Figure 2. Vehicle impersonation attack in Xu et al.’s scheme.
Electronics 13 03136 g002
Figure 3. The process of AVISPA simulation.
Figure 3. The process of AVISPA simulation.
Electronics 13 03136 g003
Figure 4. Role: TA’s HLPSL description.
Figure 4. Role: TA’s HLPSL description.
Electronics 13 03136 g004
Figure 5. Role: VH’s HLPSL description.
Figure 5. Role: VH’s HLPSL description.
Electronics 13 03136 g005
Figure 6. Role: RSU’s HLPSL description.
Figure 6. Role: RSU’s HLPSL description.
Electronics 13 03136 g006
Figure 7. Session and environment: HLPSL description.
Figure 7. Session and environment: HLPSL description.
Electronics 13 03136 g007
Figure 8. Simulation results.
Figure 8. Simulation results.
Electronics 13 03136 g008
Table 1. Notations used in this paper.
Table 1. Notations used in this paper.
NotationDescription
SAA system administrator
RSUA roadside unit
TAA trusted authority
K T A Master secret key of TA
I D V / R Real identity of vehicle and RSU, respectively
T I D V / R Temporary identity of vehicle and RSU, respectively
A V , B R , X V Authentication parameters
P K s The hash value of the previous session key
r , n i Short-lived secret parameters
K S Session key among the entities
XOR operation
h ( ) The collision resistant hash function, h : { 1 , 0 } * Z p *
| | A concatenation
Table 2. Queries and its descriptions.
Table 2. Queries and its descriptions.
QueriesDescriptions
E x e c u t e ( Π U E i n s t 1 , Π S N i n s t 2 ) This query simulates an eavesdropping attack where adversary A can intercept and monitor messages exchanged over the public network.
C o r r u p t U E ( Π V H i n s t 1 ) This query represents a physical capture attack, allowing adversary A to extract data stored in the vehicle VH.
S e n d ( Π i n s t , M s g ) This query simulates an active attack where adversary A can transmit a message to the oracle P i n s t and receive its response.
T e s t ( Π i n s t ) This query models a challenge to the security of a fresh session key S K , where based on a random coin flip c, the adversary A receives either the real session key ( c = 1 ) or a random value ( c = 0 ), or NULL ( ) if the key is not fresh.
Table 3. Security property of Xu et al.’s scheme with other related schemes.
Table 3. Security property of Xu et al.’s scheme with other related schemes.
Security PropertyYing and Nayak [5]Chen et al. [6]He et al. [4]Wang et al. [13]Xu et al. [11]
S P 1 ××××
S P 2 ××
S P 3
S P 4 ××××
S P 5
S P 6 ×
S P 7 ×××N/A
∘: the security properties are preserved; ×: the security properties are not preserved; N/A: not applicable; S P 1 : vehicle capture attack; S P 2 : replay attack; S P 3 : vehicle anonymity; S P 4 : vehicle impersonation; S P 5 : anonymity of RSU; S P 6 : session fixation attack; S P 7 : RSU-aided authentication function.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Park, K.; Kim, M.; Park, Y. On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles. Electronics 2024, 13, 3136. https://doi.org/10.3390/electronics13163136

AMA Style

Park K, Kim M, Park Y. On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles. Electronics. 2024; 13(16):3136. https://doi.org/10.3390/electronics13163136

Chicago/Turabian Style

Park, Kisung, Myeonghyun Kim, and Youngho Park. 2024. "On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles" Electronics 13, no. 16: 3136. https://doi.org/10.3390/electronics13163136

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop