Next Article in Journal
Adaptive Iterative Learning Tracking Control for Nonlinear Teleoperators with Input Saturation
Previous Article in Journal
Customized Bus Stop Location Model Based on Dual Population Adaptive Immune Algorithm
Previous Article in Special Issue
Covert Communication for Dual Images with Two-Tier Bits Flipping
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET

1
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
2
Department of Computer Engineering (Smart Security), Gachon University, Seongnam 13120, Republic of Korea
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(15), 2383; https://doi.org/10.3390/math12152383
Submission received: 11 July 2024 / Revised: 30 July 2024 / Accepted: 30 July 2024 / Published: 31 July 2024

Abstract

:
Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still exist, because sensitive data of the vehicle user is necessary for generating a high-accuracy AI model. In this paper, we propose an authentication scheme to preserve the privacy of user data in edge intelligence-enabled VANETs. The proposed scheme can establish a secure communication channel using fuzzy extractor, elliptic curve cryptography (ECC), and physical unclonable function (PUF) technology. The proposed data upload process can provide privacy of the data using local differential privacy and symmetric key encryption. We validate the security robustness of the proposed scheme using informal analysis, the Real-Or-Random (ROR) model, and the Scyther tool. Moreover, we evaluate the computation and communication efficiency of the proposed and related schemes using Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) software development kit (SDK). We simulate the practical deployment of the proposed scheme using network simulator 3 (NS-3). Our results show that the proposed scheme has a performance improvement of 10∼48% compared to the state-of-the-art research. Thus, we can demonstrate that the proposed scheme provides comprehensive and secure communication for data management in edge intelligence-enabled VANET environments.

1. Introduction

Edge intelligence is a convergence technology of edge computing and artificial intelligence (AI) [1,2]. AI technology requires a large volume of user data to generate learning models. In edge computing networks, service providers can collect the real-time information from the network edge. Therefore, the combination of edge computing technology and AI can amplify the synergy through the real-time data collection and reflection of regional characteristics in AI models. Through these advantages, researchers have applied edge intelligence into vehicle services, such as vehicular ad hoc networks (VANETs) [3,4]. In edge intelligence-enabled VANET environments, users can receive improved vehicular services using AI, such as localized autonomous driving, accident prediction, and personalized entertainment experiences. To provide these services, a large volume of vehicle users’ personal data is necessary for training AI models [5]. If an adversary obtains these data (e.g., driving habits and history, call and messaging history in infotainment systems), it can cause serious security problems. Although the data are securely encrypted using various cryptography methods, the central server can still access user data. This can cause user privacy, anonymity and traceability problems. Therefore, it is important to strengthen the de-identification of user data in edge intelligence-enabled VANET environments, while preserving the confidentiality and availability of the data.
Differential privacy [6] is a de-identification technology that can provide privacy by adding noise or shuffling the data. The main advantage of differential privacy is that it simultaneously satisfies privacy protection and information analysis. This is possible because the statistical properties of the information can be maintained even when differential privacy is applied. However, these characteristics can still present security vulnerabilities to attackers. For example, if an adversary obtains the differential privacy-based data due to a low security level, it can generate a similar AI model. This can threaten the edge intelligence-enabled VANET network, because the adversary can infer the behavior patterns of vehicle users. This can compromise the anonymity and untraceability of vehicle users. Such vulnerabilities highlight the need for a robust authentication scheme to protect the differential privacy-based data.
In this paper, we propose a secure authentication scheme designed to preserve user data and ensure the privacy of generated data in edge intelligence-enabled VANET environments. The proposed scheme supports mutual authentication between edge servers and vehicles in VANET environments, as well as differential privacy-based data uploads. The proposed scheme provides a secure and efficient key agreement using fuzzy extractors [7], biometric information, and elliptic curve cryptography (ECC) [8]. Moreover, the proposed scheme can prevent potential security attacks, such as machine learning attacks, by utilizing physically unclonable function (PUF). Thus, the proposed mutual authentication process provides a high level of security to prevent adversaries from accessing user data. In the data upload process, users can achieve data privacy and anonymity using symmetric key encryption and differential privacy. By integrating these technologies, the proposed scheme can ensure not only data integrity and confidentiality during message transmission, but also user privacy from unauthorized access. The key contributions of our proposed scheme are as follows:
  • We propose a secure authentication scheme for edge intelligence-enabled VANET environments. The proposed scheme can provide a secure communication between edge nodes and vehicles using fuzzy extractors, biometric information, and ECC. To ensure the robust security for edge nodes, the proposed scheme utilizes PUF technology when generating the secret keys.
  • We provide a secure data upload process using the session key and local differential privacy technology [6]. Thus, the proposed scheme can ensure secure message transmission and data collection through the encryption of de-identification data. This approach can provide secure and efficient data management for edge intelligence-enabled VANET environments.
  • We perform various analyses to prove the security robustness of the proposed scheme, such as informal analysis, as well as using the “Real-Or-Random (ROR) model [9]”, and the Scyther tool [10,11]. Moreover, we conduct a simulation study using “Network Simulator (NS)-3 [12]”.
  • We compare the computation and communication overheads of the proposed scheme with the other related schemes using “Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) software development kit (SDK) [13]”.
The rest of our paper is structured as follows. In “Related Works” (Section 2), various research is introduced for edge intelligence-based VANETs. In “Preliminaries” (Section 3), the system model, threat model, and various security technologies are introduced. In “Proposed Scheme” (Section 4), the detailed scheme is introduced. In “Security Analysis” (Section 5), an informal analysis is conducted, and the ROR model and Scyther tool are used to prove the security robustness of the proposed scheme. In “Performance Analysis” (Section 6), the comparison and NS-3 simulation studies are performed to verify the practical deployment of the proposed scheme. In “Conclusions” (Section 7), we conclude and summarize our paper.

2. Related Works

Edge intelligence is an emerging topic, aiming to expand advanced services using edge computing technology [14,15,16,17,18,19,20,21]. In 2019, Zhou et al. [14] proposed the basic concept of edge intelligence. They argued that it is important to perform computation tasks on edge nodes to solve centralization, a major challenge in cloud computing. Moreover, they demonstrated that edge intelligence has advantages over cloud intelligence because real-time information is generated at the edge of the network system. Zhou et al. also introduced three types of distributed training architecture: centralized, decentralized, and hybrid methods. Deng et al. [15] discussed edge intelligence in terms of utilizing a large amount of data generated from the edge. Thus, they distinguished the usage of edge intelligence into “AI for edge (AFE)” and “AI on edge (AOE)”. In their paper, AFE utilizes AI to identify and improve challenges with edge computing devices in the network system. Therefore, AFE is an assist concept for optimized edge computing. On the other hand, AOE is a concept defined to maximize edge computing services. Therefore, the edge node collects information on the network, creates a learning model based on it, and uses it to improve services in AOE. In 2021, Qi et al. [16] proposed a resource management architecture to achieve a sufficient edge intelligent service for future vehicular networks. The network architecture is composed of data perception, machine learning, edge access, intelligent control, and application layers. Thus, various sensors in the data perception layer collect surrounding data and send them to machine learning layer. To conduct efficient machine learning, cloud computing is utilized for reducing the load in edge nodes. In Qi et al.’s architecture, base stations and RSUs are in the edge access layer to provide a wide range of edge resources. In the application layer, vehicles provide various network services, including autonomous driving, smart parking, and traffic notifications using edge intelligence technology. In 2023, Gong et al. [17] introduced the integration of edge intelligence and an intelligent transportation system (ITS). They argued that edge intelligence technology can maintain low latency and energy efficiency, and reduce the load on the backbone network. From that, Gong et al. described the basic structure of edge intelligence-enabled ITS. Moreover, they discussed the security issues in edge intelligence-enabled ITSs, such as data leakage, the preservation of privacy, and the sensitivity of vehicle data. Thus, they emphasized the necessity of a privacy policy (e.g., General Data Protection Regulation (GDPR)), differential privacy, and various encryption methods. In addition, various other papers have proposed and highlighted the importance of edge intelligence [18,19,20,21]. They also emphasized the necessity of security protocols and data anonymization to provide convenient edge services. These contributions collectively underline the critical role of edge intelligence in enhancing computational efficiency and service quality at the network’s edge, while also addressing essential concerns related to data security and privacy.
In VANET environments where traffic data are distributed on a large scale, edge intelligence must consider security in terms of wireless communication, distributed computing, and data management. Therefore, research on mutual authentication in edge computing environments is necessary. In 2019, Jia et al. [22] proposed a mutual authentication protocol for mobile edge computing (MEC) environments. They argued that MEC environments can suffer from security problems because MEC devices are deployed by various service providers. Thus, Jia et al. proposed an authentication scheme using ECC and bilinear pairings. Bagga et al. [23] suggested an authentication protocol for Internet of vehicle (IoV) environments. In their protocol, anonymity and untraceability are achieved using a pseudo identity-based authentication method. Ke et al. [24] proposed an authentication scheme for smart healthcare systems. In their system model, software defined networking (SDN) technology is utilized to monitor data flow such as the authentication requirements of users. They also used bilinear pairings to achieve a high level of security for the authentication protocol. In 2023, Seifelnasr et al. [25] proposed a privacy-preserving authentication protocol using the computation capability of edge nodes for IoT environments. They utilized zero knowledge proof technology and elliptic curve Diffie–Hellman (ECDH) to ensure the anonymity of IoT devices and the robust establishment of a session key. In 2024, Yadav et al. [26] proposed an authentication protocol for efficient and secure communication between vehicle and infrastructure. Kumar and Om [27] proposed an authentication protocol for fog-enabled VANET environments. In their protocol, vehicle users access the network through a third-party authentication process that leads to vehicle–fog–TA. While these schemes [22,23,24,25,26] provide various convenient services to users, they suffer from high computational overheads due to the use of bilinear pairings and elliptic curve-based signatures. Furthermore, these edge computing-based security schemes [22,23,24,25,26] do not adequately address the privacy of user data, which is crucial in edge intelligence-enabled VANET environments. Here, the server and edge nodes require large amounts of user data, including sensitive information. Thus, the proposed scheme aims to establish a secure communication channel between vehicles and edge nodes while integrating local differential privacy and user authentication to ensure robust user privacy. The summary of related works [22,23,24,25,26,27] are shown in Table 1.

3. Preliminaries

3.1. System Model

The proposed system model for edge intelligence-enabled VANET environments consists of trusted authority (TA), a cloud server, an edge node, and a vehicle. Figure 1 shows the proposed system model and the details are as follows:

3.1.1. Trusted Authority

TA manages the proposed network system by initializing and publishing public information such as ECC, hash function, and global public key. Moreover, TA performs the registration process and stores the sensitive data of the cloud server, edge node, and vehicle. TA has a large amount of computation and storage resources.

3.1.2. Cloud Server

The cloud server controls the entire VANET service and data based on enormous computing and storage resources. Additionally, the cloud server creates a large AI model using vehicle data sent by edge nodes.

3.1.3. Edge Node

An edge node is a infrastructure controlled by TA, which manages services and collects information for vehicles in a specific area through RSUs. Additionally, the edge node collects and learns local information sent by vehicles based on sufficient computing and storage resources to create a local AI model. Edge nodes can use this edge intelligence to provide improved VANET services to vehicles. Moreover, edge nodes help to create a global AI model for the overall VANET service by uploading some information about the vehicle to the cloud server.

3.1.4. Vehicle

Vehicles can receive various VANET services such as AI-based route guidance, entertainment, and accident prediction through mutual authentication with edge nodes. Additionally, vehicles upload some of their driving data to continuously improve VANET services and enhance the accuracy of accident prediction. Because the uploaded data are safely masked using local differential privacy, edge nodes cannot identify the exact information of individual vehicles. In the proposed scheme, the vehicle has limited computational and storage resources.

3.2. Threat Model

In the proposed scheme, we utilize “Dolev-Yao (DY) [28]” and “Canetti-Krawczyk (CK) [29]” network models. In the DY model, the adversary has access to messages on public channels. Therefore, the adversary can eavesdrop on, insert, capture, and delete messages transmitted via public channels. In the CK network model, the adversary can access secret credentials. Thus, the adversary can obtain a revealed master key of the TA and ephemeral secret value in the proposed scheme. Using the DY and CK network models, the adversary can process the following security attacks:
  • The adversary can reveal the verification table and try to compute sensitive parameters [30].
  • The adversary can obtain secret parameters and try to disguise itself as a legitimate vehicle [31].
  • The adversary can be a privileged insider to compute identity and password of vehicle.
  • The adversary can perform various security attacks such as man-in-the-middle, ephemeral secret leakage, replay, and insider attacks.

3.3. Elliptic Curve Cryptography

Elliptic curve cryptography (ECC) [8] is a cryptosystem that implements cryptographic characteristics using elliptic curves. To utilize ECC in a security system, we must select a large finite field F p , large prime integer p, q, and ECC parameter w, v. Then, we can generate an elliptic curve E ( w , v ) : y 2 = x 3 + w x + v ( 4 w 3 + 27 v 2 0 ). Since the point on the elliptic curve satisfies the addition group, we specify a base point P. Therefore, ECC satisfies the following equation for an integer n Z q . Moreover, we introduce the mathematical security of ECC as follows:
n · P = P + P + P + + P     ( n times )
  • Elliptic curve discrete logarithm (ECDL) problem: A mathematical problem to compute n Z q when n · P is given.
  • Elliptic curve decisional Diffie–Hellman (ECDDH) problem: A mathematical problem to grant the equality of n · s · P and t · P when n, s, and t is allowed.
  • Elliptic curve computational Diffie–Hellman (ECCDH) problem: A mathematical problem to compute n · s · P when n · P and s · P are allowed.

3.4. Physically Unclonable Function

Physical unclonable function (PUF) is a technology that implements a one-way function in hardware. PUF is performed as R e s = P U F ( C h a ) , where C h a is a input value “Challenge” and R e s is an output value “Response”. We introduce the properties of an ideal PUF as follows:
  • PUF is a hardware circuit, which cannot replicate or interpret the detailed structure.
  • Since PUF is implemented uniquely in each hardware, different outputs are produced even if the same input is input.
  • The output value of PUF cannot be predicted.
  • PUF is easy to implement and estimate.

3.5. Fuzzy Extractor

Fuzzy extractor [7] is a method to utilize biometric information of users as a security parameter. Unlike identity and password, biometrics, e.g., fingerprint and iris information, are detected by a sensor. Thus, the input data can change slightly depending on the surrounding environments. Nevertheless, this information must be constant to be used as the security parameters [32]. Fuzzy extractor can correct this noise-based information to original data using the helper string. Fuzzy extractor is composed of two algorithms, i.e., “generation ( G e n ( . ) )” and “reproduce ( R e p ( . ) )”.
  • G e n ( B i o V E i ) = ( e b V E i , h s V E i ) : After executing the probability algorithm G e n ( . ) , we can obtain a string e b V E i and helper string h s V E i . We utilize e b V E i as a secret parameter for the proposed scheme.
  • R e p ( B i o V E i , h s V E i ) = ( e b V E i ) : After conducting the deterministic algorithm R e p ( . ) with helper string h s V E i , we can obtain the secret parameter e b V E i .

3.6. Local Differential Privacy

Differential privacy is a technique that preserves the privacy of individual users while maintaining the statistical trends of the overall user dataset. This technique can be implemented by introducing randomness to individual responses through mechanisms like randomized response, or by adding various types of noise such as Laplace, Gaussian, or exponential noise to the original data. In 2006, Dwork et al. [6] proposed epsilon-differential privacy to quantify the level of privacy preservation provided by different differential privacy techniques. Definition 1 illustrates ϵ -differential privacy, and Definition 2 illustrates differential privacy using the Laplace Probability Density Function (PDF).
Definition 1.
ϵ-differential privacy: For a randomized algorithm A , it is differentially private (ϵ) when two datasets D and D have a difference in one element. S is subset of output using A .
P r [ A ( D ) S ] e ϵ · P r [ A ( D ) S ]
Definition 2.
To achieve ϵ-differential privacy, the Laplace mechanism adds noise drawn from the Laplace distribution to the output of a function f. The Laplace distribution with scale parameter λ = Δ f ϵ has the following probability density function:
L a p ( x | λ ) = 1 2 λ e | x | λ
Differential privacy applies privacy protection at the central server level, which still leaves a possibility for personal data leakage. Local differential privacy, on the other hand, ensures privacy by adding noise to the data on the user’s end device before sending them to the server, thereby achieving better privacy protection. Figure 2 illustrates the difference between general differential privacy and local differential privacy.

4. Proposed Scheme

In this section, we propose a mutual authentication and data collection scheme for edge intelligence-enabled VANET environments. The proposed scheme consists of initialization, registration, login and authentication, and differential privacy-based data collection phases. Notations and descriptions in the proposed scheme are shown in Table 2. Figure 3 indicates the flowchart of the proposed scheme, and the details are as follows:

4.1. Initialization Phase

In this phase, TA performs an initial setup to organize the proposed network. TA selects large prime number p, q and picks w, v F p . Then, TA generates an elliptic curve E ( w , v ) : y 2 = x 3 + w x + v m o d q. Furthermore, TA selects a generator P from E ( w , v ) and picks a master key m k T A to compute the public key P u b T A = m k T A · P . TA selects a hash function h ( . ) and publishes { E ( w , v ) , P , h ( . ) , P u b T A , p , q } .

4.2. Registration Phase

To participate in the proposed network environments, edge nodes and vehicles must process the registration phase by sending their information to TA. After registering these entities, TA returns a secret credential using a secure channel. The details are as follows:

4.2.1. Edge Node Registration

RE1: 
To register in the proposed network system, the edge node E k selects its own identity I D E D k and picks a random number n s E D k . Then, E k computes h ( I D E D k n s E D k ) and sends { I D E D k , h ( I D E D k n s E D k ) } to the TA via a secure channel.
RE2: 
TA first checks the validity of I D E D k and generates n s T A E k . Then, TA computes h ( h ( I D E D k n s E D k ) n s T A E k m k T A ) and stores { I D E D k , h ( I D E D k n s E D k ) } in its secure database. TA returns { h ( h ( I D E D k n s E D k ) n s T A E D m k T A ) } to E k through a secure channel.
RE3: 
E k computes p s k E D k = h ( h ( I D E D k n s E D k ) n s T A E D m k T A ) , P U F ( p s k E D k ) = u s k E D k using PUF function, G e n ( u s k E D k ) = ( e u s k E D k , h s E D k ) using fuzzy extractor, and s k E D k = h ( e u s k E D k I D E D k ) . E k keeps s k E D k as a secret key and computes public key P u b E D k = s k E D k · P . E k stores { p s k E D k , P u b E D k , h s E D k } in its database.

4.2.2. Vehicle Registration

RV1: 
The user of a vehicle V E i selects their own identity I D V E i , password P W V E i , and biometrics B i o V E i . Then, V E i picks a random number n s V E i and computes G e n ( B i o V E i ) = ( e b V E i , h s V E i ) using fuzzy extractor, M I D V E i = h ( n s V E i I D V E i e b V E i ) . V E i sends a registration request message { I D V E i , M I D V E i , n s V E i } to the TA via a secure channel.
RV2: 
TA checks the validity of I D V E i and generates n s T A V i to compute C M K T A V i = h ( M I D V E i n s T A V i m k T A ) , P I D V E i = h ( I D V E i m k T A ) , and S I D V E i = I D V E i h ( m k T A P I D V E i n s T A V i ) . TA stores { P I D V E i , S I D V E i , n s T A V i } and sends a return message { P I D V E i , C M K T A V i } to V E i through a secure channel.
RV3: 
V E i computes its secret key s k V E i = h ( C M K T A V i e b V E i ) and public key P u b V E i = s k V E i · P . Then, V E i computes z n s V E i = n s V E i h ( I D V E i e b V E i ) , z P I D V E i = P I D V E i h ( n s V E i e b V E i P W V E i ) , z C M K T A V i = C M K T A V i h ( M I D V E i P I D V E i I D V E i ) , z P u b V E i = P u b V E i h ( s k V E i e b V E i n s V E i ) , and V V E i = h ( s k V E i P u b V E i n s V E i P I D V E i M I D V E i ) . V E i stores { z n s V E i ,   z P I D V E i ,   z C M K T A V i , z P u b V E i ,   V V E i ,   h s V E i } in its memory.

4.3. Login and Authentication Phase

To receive edge intelligence services, a registered vehicle submits its information to complete the login process. Subsequently, the vehicle selects a fresh value, encrypts the information using a public key, and attempts to establish a session key agreement with the edge node. The edge node uses the public key and PUF technologies for mutual authentication, ensuring high security. Algorithms 1 and 2, and Figure 4 present the proposed login and authentication phase. The detailed process is as follows:    
Algorithm 1: Login and authentication: Vehicle
Mathematics 12 02383 i001
Algorithm 2: Login and authentication: Edge node
Mathematics 12 02383 i002
LA1: 
V E i inputs I D V E i , P W V E i , and biometrics B i o V E i . Then, V E i computes R e p ( B i o V E i , h s V E i ) = e b V E i using fuzzy extractor, n s V E i = z n s V E i h ( I D V E i e b V E i ) , P I D V E i = z P I D V E i h ( n s V E i e b V E i P W V E i ) , M I D V E i = h ( n s V E i I D V E i e b V E i ) , C M K T A V i = z C M K T A V i h ( M I D V E i P I D V E i I D V E i ) , s k V E i = h ( C M K T A V i e b V E i ) P u b V E i = z P u b V E i h ( s k V E i e b V E i n s V E i ) and V V E i = h ( s k V E i P u b V E i n s V E i P I D V E i M I D V E i ) . If V V E i is equal to V V E i , V E i picks a random nonce r s i and timestamp t s i . Then, V E i computes T P m v i = r s i · P , T K m v i = r s i · P u b E D k , V S m v a = P I D V E i h ( t s i T K m v i ) , V S m v b = h ( P u b V E i T K m v i P I D V E i t s i ) , and sends { T P m v i , V S m v a , V S m v b , t s i } to the edge node E k through a public channel.
LA2: 
E k checks the freshness of t s i through the inequality | t s i t s c |   <   Δ t . Then, E k computes P U F ( p s k E D k ) = u s k E D k , R e p ( u s k E D k , h s E D k ) = e u s k E D k , s k E D k = h ( e u s k E D k I D E D k ) , T K m v i = T P m v i · s k E D k , P I D V E i = V S m v a h ( t s i T K m v i ) , and retrieves P u b V E i . From that, E k checks the equality of V S m v b and h ( P u b V E i T K m v i P I D V E i t s i ) . If it is valid, E k generates r s k and t s k , and computes T P m e k = r s k · P , T K m e k = r s k · P u b V E i , S K V i E k = h ( T K m e k t s i t s k P I D V E i P u b V E i ) , and E S m e a = h ( S K V i E k T K m e k P I D V E i P u b V E i ) . E k sends { T P m e k , E S m e a , t s k } to V E i through a public channel.
LA3: 
V E i first check | t s k t s c |   <   Δ t and computes T K m e k = s k V E i · T P m e k , S K E k V i = h ( T K m e k t s i t s k P I D V E i P u b V E i ) , and E S m e a = h ( S K E k V i T K m e k P I D V E i P u b V E i ) . If E S m e a is equal to E S m e a , the session key S K E K V i is completely established between V E i and E k .

4.4. Differential Privacy-Based Data Collection Phase

After establishing the session key, the vehicle receives various edge intelligence services. To continuously improve and update the AI model of the edge node, the vehicle transmits some of the surrounding and personal information to the edge node. To achieve privacy protection and data anonymization, the proposed scheme securely utilizes user information based on local differential privacy. The detailed process is as follows.
DC1: 
With the collected data c s V E i , V E i executes Laplace mechanism M ( D ) = f ( D ) + L a p ( Δ f / ϵ ) ( L a p ( s i k | λ ) = 1 2 λ e | s i k | λ , s i = [ s i 1 , , s i k , , s i n ] ) and obtains DP-based data d p V E i . After that, V E i generates a timestamp t s V i d p and computes V E d c a = h ( d p V E i t s V i d p S K E k V i ) , V E d c b = d p V E i h ( S K E k V i t s V i d p ) . V E i sends { V E d c a , V E d c b , t s V i d p } to E k via an wireless open channel.
DC2: 
E k checks the validity of t s V i d p and computes d p V E i = V E d c b h ( S K E k V i t s V i d p ) , V E d c a = h ( d p V E i t s V i d p S K E k V i ) . If V E d c a is equal to V E d c a , E k utilizes the DP-based data d p V E i for various service improvement tasks.

5. Security Analysis

In this section, we verify the security robustness of the proposed protocol using various methods of analysis, such as the ROR model, the Scyther tool, and informal security analysis.

5.1. ROR Model

In various authentication protocols, each entity checks the legitimacy of the network partner and computes a session key. To verify the security of the session key, we use the ROR model [9]. We validate the security of the session key through various passive and active attacks of an adversary. Thus, the adversary conducts several games under the instantiated networks and attempts to distinguish random nonces and session keys using the test query. Thus, we define participants, adversaries, and queries to analyze the session key security of the proposed scheme using the ROR model. In the proposed scheme, four participants organize the system model: TA ( P M T A a 1 ), cloud server ( P M C S a 2 ), edge node ( P M E N a 3 ), vehicle ( P M V a 4 ). Note that a 1 , a 2 , a 3 and a 4 are the instance for the participants. The adversary has the ability to intercept, delete, and eavesdrop on messages through public channels. With this ability, the adversary can conduct various queries as follows:
  • E ( P M T A a 1 , P M C S a 2 , P M E N a 3 ) , P M V a 4 : The adversary can collect messages transmitted through public channels using E ( . ) query.
  • C ( P M V a 4 ) : The adversary can capture the vehicle and extract secret parameters using C ( . ) query.
  • S ( P M a ) : This query represents a send event. Thus, the adversary can send messages to participant P M a .
  • T ( P M a ) : This is a test query to distinguish the session key and random number. If the query T ( . ) is executed, an unbiased coin is flipped. When the adversary obtains 0, the session key security can be achieved. However, the session key is not secure if the adversary obtains 1. Otherwise, the N U L L value is output.

Security Proof

Theorem 1.
We denote C D S B R ( M ) as the likelihood that an adversary cracks the security of the proposed scheme in polynomial time. We also define the total number of hash, send, and PUF queries as t n h and t n s , and t n P U F . The range space of the hash and the PUF function are denoted as h ( . ) and P U F ( . ) . The Zipf’s parameters [33] are C and s . The probability of breaking the elliptic curve decisional Diffie–Hellman (ECDDH) problem and the number of bits in biometric parameters are defined as C D S B R E C C ( M ) and i B . Therefore, the proposed protocol can be secure when C D S B R ( M ) is less than the sum of that previously mentioned:
C D S B R ( M ) t n h 2 | h | + t n P U F 2 | P U F | + 2 C D S B R E C C ( M ) + 2 { C t n s s , t n s 2 i B }
Proof. 
According to [34,35,36], we conduct six games ( G k , k = 0 , 1 , 2 , 3 , 4 , 5 ). The advantage and winning probability of the adversary in each game as A [ W I N G k ] and W I N G k .
G 0 : In this game, the adversary does not have any information for the session key. Thus, the adversary selects a random bit O. By the definition in [9], we can obtain the following Equation (1):
C D S B R ( M ) = | 2 A [ W I N G 0 ] 1 |
G 1 : The adversary executes the E x e c ( . ) query and obtains { T P m v i , V S m v a , V S m v b , t s i } and { T P m e k , E S m e a , t s k } . Then, the adversary conducts the T ( . ) query to verify whether the session key is secure or not. However, the adversary cannot decrypt messages because each parameter utilized various forms of security technology, such as ECC, PUF, and biometrics, in the proposed scheme. This means that the adversary has the same probability of winning the game as G 0 . Thus, the winning possibility is same as A [ W I N G 0 ] . We can obtain the following Equation (2):
A [ W I N G 0 ] = A [ W I N G 1 ]
G 2 : Using the send and hash queries, the adversary tries to reveal the session key security in this game. However, the proposed protocol can resist hash-collision problems through the use of the “cryptographic one-way hash function”. Thus, we can obtain the following inequality (3) using the birthday paradox [37]:
A [ W I N G 2 ] A [ W I N G 1 ] t n h 2 | h |
G 3 : The adversary utilizes send and P U F queries to break the security of the session key. According to Section 3.4, it is practically impossible to guess the secret parameter derived from PUF circuit, which means that the adversary cannot reveal the secret key of edge nodes. Thus, we can obtain the inequality (4), which is similar to (3):
| A [ W I N G 3 ] A [ W I N G 2 ] |     t n P U F 2 | P U F |
G 4 : The adversary tries to compute the session key using { T P m v i , V S m v a , V S m v b , t s i } and { T P m e k , E S m e a , t s k } . However, T K m v i = r s i · s k E D k · P and T K m e k = r s k · s k V E i · P have security based on the ECDDH problem. Thus, the winning probability of G 4 is solving this problem in polynomial time. The inequality (9) can be obtained:
| A [ W I N G 4 ] A [ W I N G 3 ] |     C D S B R E C C ( M )
G 5 : This game is the final game in which the adversary collects the secret parameter of the vehicle using C ( . ) query. After that, the adversary tries to compute the secret parameters using { z n s V E i ,   z P I D V E i ,   z C M K T A V i ,   z P u b V E i ,   V V E i ,   h s V E i } . However, the proposed scheme utilizes the identity, password, and biometrics to perform local login process. Thus, it is a computationally infeasible task to guess them simultaneously. Therefore, we can obtain the inequality (6) using Zipf’s parameters:
| A [ W I N G 5 ] A [ W I N G 4 ] |     { C t n s s , t n s 2 i B }
After G 5 , the adversary guesses a bit t. Because the winning probability in G 5 is 0.5, we can obtain the Equation (7):
A [ W I N G 5 ] = 1 2
We can obtain the following after uniting Equations (1) and (2):
1 2 C D S B R ( M ) = | A [ W I N G 0 ] 1 2 | = | A [ W I N G 1 ] 1 2 |
We also obtain the following after uniting Equations (7) and (8):
1 2 C D S B R ( M ) = | A [ W I N G 1 ] A [ W I N G 5 ] |
We obtain the following after using (9) and triangular inequality:
1 2 C D S B R ( M ) = | A [ W I N G 1 ] A [ W I N G 5 ] | | A [ W I N G 1 ] A [ W I N G 4 ] | + | A [ W I N G 4 ] A [ W I N G 5 ] | | A [ W I N G 1 ] A [ W I N G 2 ] | + | A [ W I N G 2 ] A [ W I N G 3 ] | +   | A [ W I N G 3 ] A [ W I N G 4 ] | + | A [ W I N G 4 ] A [ W I N G 5 ] | .
t n h 2 2 | h | + t n P U F 2 2 | P U F | + C D S B R E C C ( M ) + { C t n s s , t n s 2 i B }
After multiplying (10) by 2, we can obtain the following result, which is same as Theorem 1:
C D S B R ( M ) t n h 2 | h | + t n P U F 2 | P U F | + 2 C D S B R E C C ( M ) + 2 { C t n s s , t n s 2 i B }

5.2. Informal Analysis

5.2.1. Replay and Man-in-the-Middle Attacks

The adversary can capture messages from the public channel and send them to other network participants. In the proposed login and authentication phase, each entity generates and sends timestamp t s to prove the freshness of message. If the timestamp is out of time, the communication partner regards the message as failed information. Thus, the adversary cannot have an advantage when using replay and man-in-the-middle attacks.

5.2.2. Impersonation Attacks

In this attack, the adversary attempts to disguise itself as a legitimate user using messages transmitted via an open channel. Thus, the adversary must generate T P m v i , V S m v a , V S m v b , and t s i , which are the elements of authentication request message. However, the adversary cannot generate V S m v a because P I D V E i is a secret parameter of the legitimate vehicle V E i . Thus, the adversary cannot compute the message. For the reason above, the proposed scheme can prevent impersonation attacks.

5.2.3. Insider Attacks

In this attack, an adversary registers with the TA as a vehicle and performs the login and authentication phase. Then, the adversary collects public messages to reveal secret credentials. With the leaked credentials, the adversary invades the other vehicle’s session and tries to compute the session key. However, the adversary cannot decrypt any sensitive information because of the use of ECC and PUF. To compute P I D V E i and S K E k V i , the adversary must obtain T K m v i and T K m e k , which are based on the ECC and PUF technology. Therefore, the proposed scheme has robustness against insider attacks.

5.2.4. Privileged Insider Attacks

In the real environment, users utilize same identity and password in various network systems. Thus, a privileged insider attempts to compute the identity and password of legitimate users in this attack. In the registration phase, the adversary can obtain the identity I D V E i . However, the adversary cannot guess the password of V E i because { z n s V E i ,   z P I D V E i ,   z C M K T A V i ,   z P u b V E i ,   V V E i ,   h s V E i } are masked in biometrics B i o V E i . Thus, the proposed protocol can prevent privileged insider attacks.

5.2.5. Verification Table Leakage Attacks

In this attack, the adversary obtains the verification table { I D E D k , h ( I D E D K n s E D k ) } and { P I D V E i , S I D V E i , n s T A V i } . From this information, the adversary can try to compute the session key S K E k V i = h ( T K m e k t s i t s k P I D V E i P u b V E i ) . However, the adversary cannot compute the session key because T K m e k is composed of s k V E i , which is the secret key of V E i . Thus, the proposed scheme is secure against verification table leakage attacks.

5.2.6. Ephemeral Secret Leakage (ESL) Attacks

In this attack, an adversary tries to compute the session key if the ephemeral secret parameters r s i and r s k are leaked. To compute the session key, the adversary must obtain T K m e k , P I D V E i , and P u b V E i . However, the adversary still does not have the secret key s k V E i which means the adversary cannot compute T K m e k . Thus, the proposed scheme can prevent ESL attacks.

5.2.7. Perfect Forward Secrecy

If an adversary obtains the master key m k T A of TA, it can try to leak the secret parameters. However, the adversary has no advantage from that because all messages are masked in ECC and the secret parameter s k V E i . Thus, the proposed protocol can achieve perfect forward secrecy.

5.2.8. User Anonymity and Untraceability

In edge intelligence-enabled VANET environments, the history of a vehicle can be critical information. Thus, the anonymity and untraceability must be protected in the proposed scheme. In the proposed protocol, V E i sends a temporal parameter V S m v a to guarantee freshness and the confusion of identity. Thus, the adversary cannot specify the actual vehicle from the message. Thus, the proposed protocol can achieve anonymity and untraceability.

5.2.9. Mutual Authentication

When the vehicle V E i tries to authenticate with the edge node, V E i generates a request message using secret parameters and a random number and timestamp. The edge node checks the freshness of the timestamp using Δ t and verifies the legitimacy of V E i using ECC and PUF. If the process is a success, the edge node can demonstrate that V E i is a legitimate participant. Thus, the proposed protocol can guarantee mutual authentication.

5.3. Scyther Tool

We evaluate the security of the proposed protocol using an automatic verification and simulation tool, named Scyther [10,11]. The Scyther tool analyzes possible behavior patterns in security protocols and evaluates various security properties, such as the robustness of the authentication and the confidentiality of variables. The Scyther tool can represent the behaviors of the security protocol by characterizing protocols. Thus, we convert the proposed scheme into SPDL (Security Protocol Description Language), which is the programming language used in the Scyther tool. Then, the Scyther tool conducts a security simulation. After that, the Scyther tool conducts the security verification using various claim events, which are described in Table 3. When the protocol is secure and well-authenticated, the Scyther tool outputs “OK” and “No attacks” in the results window. Figure 5 shows that the proposed scheme is secure against various security attacks and has robust mutual authentication.

6. Performance Analysis

In this section, we measure the computational, communicational overhead of the proposed protocol. Based on the results, we conduct comparative studies with the related schemes. Moreover, we simulate the practical deployment of the proposed scheme using NS-3.

6.1. MIRACL Testbed

MIRACL [13] is a C/C++ language-based open-source SDK that can implement various security schemes using built-in cryptographic primitives. MIRACL can be effectively applied to small equipment such as embedded and mobile devices through the optimization of cryptographic primitives. In our paper, we measure ECC multiplication ( C E m u l ), ECC addition ( C E a d d ), AES encryption ( C A e n c ), AES decryption ( C A d e c ), bilinear pairings ( C B P ), exponentiation ( C e x p ), and hash function ( C H a s h ) using MIRACL. The testbed environments in our study are as follows:
  • Desktop environments: “Linux Ubuntu 20.04 LTS, Intel Core i3-8100 CPU @ 3.60 GHz, 16 GB RAM”
  • Raspberry Pi environments: Raspberry Pi 4B (Quad-core ARM Cortex-A72 @ 1.5 GHz, 8 GB RAM)
We conduct the experimental study using these environments to measure the execution time for each of the cryptographic primitives. We execute the cryptographic primitives for 100 times and deduce the results. Table 4 and Table 5 represent the maximum, minimum, and average execution times for each cryptographic primitive.

6.2. Computational Overheads

In this section, we conduct a comparative study of our proposed scheme with other related research [22,23,24,25,26,27] in terms of computational overhead. In the proposed login and authentication phase, the vehicle uses 3 ECC multiplications ( C E m u l ) and 11 hash functions ( C H a s h ). Additionally, the edge node performs 3 ECC multiplications and 5 hash functions. Based on Table 4 and Table 5, we measure the computational overhead of the vehicle and the edge node. The overall overhead is shown in Table 6. The proposed scheme has from 10% to 48% better performance compared with the state-of-the-art research [26,27]. Therefore, the results demonstrate that the proposed scheme uses lower computational overheads compared to other related schemes [22,23,24,25,26,27].
We also analyze computation complexity through the primitives used in the proposed scheme. In the initialization phase, TA picks various random numbers and selects an elliptic curve. Thus, the computation complexity is O ( n 2 ) . In the registration phase, edge nodes and vehicles register with the network using the hash function, PUF, and fuzzy extractor, which can be indicated as O ( k ) and O ( 1 ) . In the login and authentication phase, vehicle and edge nodes utilize various ECC multiplication, hash function and exclusive-OR computations. Thus, computation complexity is O ( n 2 ) , O ( k ) , and O ( n ) in this phase. Through the analysis conducted across the proposed scheme, the computation complexity is O ( n 2 ) .

6.3. Communication Overheads

We analyze the communication overhead of the proposed scheme to verify the efficiency. To measure the message load on the public channel during the authentication phase, we define the communication cost as follows: the ECC point, hash, random number, identity, and timestamp are 320, 160, 160, 160, and 32, respectively. Thus, the messages in the proposed method are { T P m v i , V S m v a , V S m v b , t s i } and { T P m e k , E S m e a , t s k } , amounting to ( 320 + 160 + 160 + 32 ) + ( 320 + 160 + 32 ) = 1184 bits. Table 7 presents the results of measuring the overall communication overhead and the number of messages for the proposed scheme and other related schemes [22,23,24,25,26]. The results show that the proposed scheme has lower communication overhead than [22,23,25,26,27], and slightly higher than [24]. However, the proposed scheme has lower computational overhead compared to the comparison schemes [22,23,24,25,26,27].

6.4. NS-3 Simulation

In this section, we conducted a simulation study to estimate the practical deployment of the proposed scheme using NS-3 [12]. In NS-3, each network node is executed according to the coded application layer. Then, the node generates a network packet to “NetDevice” and sends it to the other node through a “Channel”. The proposed scheme is composed of several edge nodes and various vehicles in the mutual authentication phase. In our system model, edge nodes are fixed infrastructures to communicate with vehicles that have dynamic movement properties. Moreover, message bytes are 84 and 64 bytes in our login and authentication phase. We conducted NS-3 simulation under desktop platform (Intel(R) Core(TM) i5-11400 @ 2.60 GHz with 24.0 GB RAM, Ubuntu 16.04 LTS). Table 8 represents the parameters used in our NS-3 simulation study. With these parameters, we simulate the proposed scheme using NS-3 through four scenarios as follows:
  • Scenario 1: 10 vehicles are placed in a single edge node’s service range.
  • Scenario 2: 30 vehicles are placed in a single edge node’s service range.
  • Scenario 3: 60 vehicles are placed in three edge nodes’ service range.
  • Scenario 4: 90 vehicles are placed in three edge nodes’ service range.

Throughput and End-to-End Delay Analysis

We perform throughput analysis to determine whether the proposed scheme can provide VANET services. Since throughput is the minimum transmission capability including protocol efficiency in the end-to-end data path, we can measure the performance of the proposed scheme. We define P a r e c v , S i p a c k e t , T i t o t as the number of received packets, the packet size, and the total time, respectively. Thus, the formula of throughput is as follows:
P a r e c v × | S i p a c k e t | T i t o t
Also, we measure the end-to-end delay recording the time it takes data to move from one point to another. We define total packets, and one data packet; the times for receiving and sending messages are P a t o t , k, T i r e c v , and T i s e n d , respectively. Thus, the formula of the end-to-end delay is as follows:
Σ k = 1 P a t o t ( T i r e c v T i s e n d ) P a t o t
Through the throughput and end-to-end delay formulas, we conduct the NS-3 simulation study according to the four scenarios. The results are shown in Figure 6.

6.5. Security Features

We show the security and functionality features of the proposed scheme and the related schemes [22,23,24,25,26,27] in Table 9. According to Table 9, the proposed scheme can prevent various security attacks, including replay, impersonation, verification table leakage, ESL, and insider attacks. Moreover, the proposed scheme can ensure anonymity and perfect forward secrecy. Thus, we can demonstrate that the proposed scheme has high security and functionality features compared with the related schemes [22,23,24,25,26,27].

7. Conclusions

In this paper, we proposed a secure authentication scheme for edge intelligence-enabled VANET environments. The proposed scheme can provide secure and efficient mutual authentication between edge nodes and vehicles using PUF, biometrics, and ECC. With the established session key, vehicles can receive various edge intelligence services. Moreover, the proposed scheme can support a privacy-preserving data collection scheme using local differential privacy. We conducted various security analyses, including the use of the ROR model, the Scyther tool, and carrying out an informal security analysis, to prove the security robustness of the proposed protocol. Furthermore, we measured the performance of cryptographic primitives using MIRACL SDK under Raspberry Pi 4B and a desktop platform. Based on the performance result, we compare the computational and communication overheads of the proposed scheme with the related schemes. We simulated the proposed protocol to check the practical deployment in VANET environments using NS-3. In future work, we will extend the proposed scheme considering edge intelligence-enabled VANET environments. In addition, we will perform various analyses, such as the scalability test, and a machine learning analysis using differential privacy-based actual VANET data.

Author Contributions

Conceptualization, D.K.; methodology, D.K. and K.P.; software, D.K. and S.S.; validation, S.S. and K.P.; formal analysis, D.K.; writing—original draft preparation, D.K.; writing—review and editing, S.S. and K.P.; supervision, Y.P.; project administration, Y.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea (NRF) funded by the Ministry of Education under grant 2020R1I1A3058605.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liu, Y.; Peng, M.; Shou, G.; Chen, Y.; Chen, S. Toward edge intelligence: Multiaccess edge computing for 5G and Internet of Things. IEEE Internet Things J. 2020, 7, 6722–6747. [Google Scholar] [CrossRef]
  2. Plastiras, G.; Terzi, M.; Kyrkou, C.; Theocharides, T. Edge intelligence: Challenges and opportunities of near-sensor machine learning applications. In Proceedings of the 2018 IEEE 29th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), Milan, Italy, 10–12 July 2018; pp. 1–7. [Google Scholar]
  3. Zhang, J.; Letaief, K.B. Mobile edge intelligence and computing for the internet of vehicles. Proc. IEEE 2019, 108, 246–261. [Google Scholar] [CrossRef]
  4. Balasubramanian, V.; Otoum, S.; Reisslein, M. VeNet: Hybrid stacked autoencoder learning for cooperative edge intelligence in IoV. IEEE Trans. Intell. Transp. Syst. 2022, 23, 16643–16653. [Google Scholar] [CrossRef]
  5. Haris, M.; Shah, M.A.; Maple, C. Internet of intelligent vehicles (IoIV): An intelligent VANET based computing via predictive modeling. IEEE Access 2023, 11, 49665–49674. [Google Scholar] [CrossRef]
  6. Dwork, C. Differential privacy. In Proceedings of the International Colloquium on Automata, Languages, and Programming, Venice, Italy, 10–14 July 2006; pp. 1–12. [Google Scholar]
  7. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
  8. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  9. Abdalla, M.; Fouque, P.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Public Key Cryptography—PKC 2005, Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, 23–26 January 2005; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2005; pp. 65–84. [Google Scholar]
  10. Cremers, C.J. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols: Tool Paper. In Proceedings of the International Conference on Computer Aided Verification, Princeton, NJ, USA, 7–14 July 2008; pp. 414–418. [Google Scholar]
  11. Scyther Tool. Available online: https://people.cispa.io/cas.cremers/scyther/ (accessed on 5 July 2024).
  12. NS-3.29. Available online: https://www.nsnam.org (accessed on 5 July 2024).
  13. MIRACL Cryptographic SDK. Available online: https://github.com/miracl/MIRACL (accessed on 5 July 2024).
  14. Zhou, Z.; Chen, X.; Li, E.; Zeng, L.; Luo, K.; Zhang, J. Edge intelligence: Paving the last mile of artificial intelligence with edge computing. Proc. IEEE 2019, 107, 1738–1762. [Google Scholar] [CrossRef]
  15. Deng, S.; Zhao, H.; Fang, W.; Yin, J.; Dustdar, S.; Zomaya, A.Y. Edge intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet Things J. 2020, 7, 7457–7469. [Google Scholar] [CrossRef]
  16. Qi, W.; Li, Q.; Song, Q.; Guo, L.; Jamalipour, A. Extensive edge intelligence for future vehicular networks in 6G. IEEE Wirel. Commun. 2021, 28, 128–135. [Google Scholar] [CrossRef]
  17. Gong, T.; Zhu, L.; Yu, F.R.; Tang, T. Edge intelligence in intelligent transportation systems: A survey. IEEE Trans. Intell. Transp. Syst. 2023, 24, 8919–8944. [Google Scholar] [CrossRef]
  18. Zhang, Y.; Huang, H.; Yang, L.X.; Xiang, Y.; Li, M. Serious challenges and potential solutions for the industrial internet of things with edge intelligence. IEEE Netw. 2019, 33, 41–45. [Google Scholar] [CrossRef]
  19. Li, Y.; Yu, Y.; Susilo, W.; Hong, Z.; Guizani, M. Security and privacy for edge intelligence in 5G and beyond networks: Challenges and solutions. IEEE Wirel. Commun. 2021, 28, 63–69. [Google Scholar] [CrossRef]
  20. Xu, D.; Li, T.; Li, Y.; Su, X.; Tarkoma, S.; Jiang, T.; Crowcroft, J.; Hui, P. Edge intelligence: Empowering intelligence to the edge of network. Proc. IEEE 2021, 109, 1778–1837. [Google Scholar] [CrossRef]
  21. Villar-Rodriguez, E.; Pérez, M.A.; Torre-Bastida, A.I.; Senderos, C.R.; López-de-Armentia, J. Edge intelligence secure frameworks: Current state and future challenges. Comput. Secur. 2023, 130, 103278. [Google Scholar] [CrossRef]
  22. Jia, X.; He, D.; Kumar, N.; Choo, K.K.R. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 2019, 14, 560–571. [Google Scholar] [CrossRef]
  23. Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.; Choo, K.K.R.; Park, Y. On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system. IEEE Trans. Veh. Technol. 2021, 70, 1736–1751. [Google Scholar] [CrossRef]
  24. Ke, C.; Zhu, Z.; Xiao, F.; Huang, Z.; Meng, Y. SDN-based privacy and functional authentication scheme for fog nodes of smart healthcare. IEEE Internet Things J. 2022, 9, 17989–18001. [Google Scholar] [CrossRef]
  25. Seifelnasr, M.; AlTawy, R.; Youssef, A.; Ghadafi, E. Privacy-preserving mutual authentication protocol with forward secrecy for IoT-edge-cloud. IEEE Internet Things J. 2023, 11, 8105–8117. [Google Scholar] [CrossRef]
  26. Yadav, A.K.; Shojofar, M.; Braeken, A. iVFAS: An improved vehicle-to-fog authentication system for secure and efficient fog-based road condition monitoring. IEEE Trans. Veh. Technol. 2024, 1–16. [Google Scholar] [CrossRef]
  27. Kumar, P.; Om, H. Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET. Veh. Commun. 2024, 47, 100785. [Google Scholar] [CrossRef]
  28. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  29. Canetti, R.; Krawczyk, H. Universally composable notions of key exchange and secure channels. In Advances in Cryptology—EUROCRYPT 2002, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, 28 April–2 May 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 337–351. [Google Scholar]
  30. Oh, J.; Son, S.; Kwon, D.; Kim, M.; Park, Y.; Park, Y. Design of secure and privacy-preserving data sharing scheme based on key aggregation and private set intersection in medical information system. Mathematics 2024, 12, 1717. [Google Scholar] [CrossRef]
  31. Son, S.; Oh, J.; Kwon, D.; Kim, M.; Park, K.; Park, Y. A Privacy-preserving authentication scheme for a blockchain-based energy trading system. Mathematics 2023, 11, 4653. [Google Scholar] [CrossRef]
  32. Hou, W.; Sun, Y.; Li, D.; Guan, Z.; Liu, J. Lightweight and privacy-preserving charging reservation authentication protocol for 5G-V2G. IEEE Trans. Veh. Technol. 2023, 72, 7871–7883. [Google Scholar] [CrossRef]
  33. Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
  34. Park, K.; Lee, J.; Das, A.K.; Park, Y. BPPS: Blockchain-enabled privacy-preserving scheme for demand-response management in smart grid environments. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1719–1729. [Google Scholar] [CrossRef]
  35. Park, K.; Park, Y. MIoT-CDPS: Complete decentralized privacy-preserving scheme for medical internet of things. Internet Things 2024, 27, 101250. [Google Scholar] [CrossRef]
  36. Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
  37. Boyko, V.; MacKenzie, P.; Patel, S. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; pp. 156–171. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Mathematics 12 02383 g001
Figure 2. General differential privacy and local differential privacy.
Figure 2. General differential privacy and local differential privacy.
Mathematics 12 02383 g002
Figure 3. Flowchart of the proposed scheme.
Figure 3. Flowchart of the proposed scheme.
Mathematics 12 02383 g003
Figure 4. Login and authentication phase of the proposed scheme.
Figure 4. Login and authentication phase of the proposed scheme.
Mathematics 12 02383 g004
Figure 5. Results window of the proposed scheme using the Scyther tool.
Figure 5. Results window of the proposed scheme using the Scyther tool.
Mathematics 12 02383 g005
Figure 6. Results of the end-to-end delay and throughput analyses using NS-3.
Figure 6. Results of the end-to-end delay and throughput analyses using NS-3.
Mathematics 12 02383 g006
Table 1. Summary of the proposed scheme and related schemes.
Table 1. Summary of the proposed scheme and related schemes.
YearSchemeContributionsLimitations
2019[22]
  • Proposed a network model for communicating MEC devices and users
  • Proposed an identity-based mutual authentication protocol for MEC environments
  • Using bilinear pairings and ECC
  • Cannot prevent impersonation and ESL attacks
  • Does not ensure perfect forward secrecy
  • Large computation costs: bilinear pairings
2021[23]
  • Proposed an authentication and key agreement scheme for ITS environments
  • Using ECC and hash functions
  • Cannot prevent impersonation and physical attacks
2022[24]
  • Proposed a system model for medical environments using SDN technology
  • Proposed an authentication scheme between fog nodes and IoT devices
  • Using bilinear pairings and ECC
  • Large computation costs: bilinear pairings
2023[25]
  • Proposed an authentication scheme considering the computation capacity of edge and IoT devices
  • Introduced IoT, edge, and cloud layers-based network architecture
  • Using ECC and ECC-based signature
  • Cannot ensure untraceability
  • Requires high computation costs using ECC-based signature
2024[26]
  • Introduced a fog-based network model in VANET environments
  • Proposed an authentication and key agreement scheme using message broadcast methods.
  • Utilized ECC and hash functions
  • Requires a high communication costs using message broadcast method to authenticate vehicle.
2024[27]
  • Proposed a system model that a fog node manages regional RSUs.
  • Proposed an authentication scheme to establish session key between vehicle and fog node.
  • Utilized ECC, symmetric key encryption and hash functions
  • Central server must be involved in authentication process between fog nodes and vehicles
  • Requries high communication overhead due to third-party authentication
-Proposed
  • Proposes an authentication and key agreement scheme between the edge node and vehicle using ECC, PUF, and hash functions
  • Provides a secure login process using biometrics and fuzzy extractors
  • Proposes a data collection phase using local differential privacy and symmetric key encryption to achieve privacy of user data
Table 2. Notations and descriptions.
Table 2. Notations and descriptions.
NotationExplanation
I D V E i , I D E D k , Real identity of vehicle and edge node
P W V E i Password of vehicle
B i o V E i Biometric information of vehicle
P I D V E i Pseudo identity of vehicle
h s V E i Helper string
r s m Random nonce
t s m Timestamp
P u b m Public key of an entity m
s k m Secret key of an entity m
G e n ( . ) Generation algorithm of fuzzy extractor
R e p ( . ) Reproduce algorithm of fuzzy extractor
P U F ( . ) PUF operator
S K Session key
·Multiplication operator
XOR operator
h ( . ) Hash function
| | Concatenation operator
Table 3. Claim events in Scyther tool.
Table 3. Claim events in Scyther tool.
Claim EventDescription
AlivenessThe entity is certain whether or not it is communicating with the other party.
Weak agreementThe entity is certain whether or not it is communicating with the other legitimate party.
Non-injective agreementThe entity is certain whether or not it is communicating with the other legitimate party, which exchanges the legal data.
Non-injective synchronizationThe entity is certain whether or not it is communicating with the other legitimate party, which exchanges the legal data. Moreover, the messages are transmitted, following the rules of the protocol.
Table 4. MIRACL testbed result of Raspberry Pi platform.
Table 4. MIRACL testbed result of Raspberry Pi platform.
NotationsMaxMinAverage
ECC multiplication ( C E m u l )3.018 ms2.003 ms2.265 ms
ECC addition ( C E a d d )0.035 ms0.018 ms0.024 ms
AES encryption ( C A e n c )0.007 ms0.003 ms0.004 ms
AES decryption ( C A d e c )0.006 ms0.003 ms0.004 ms
Bilinear pairings ( C B P )13.837 ms10.533 ms11.937 ms
Exponentiation ( C e x p )0.189 ms0.093 ms0.115 ms
Hash function ( C H a s h )0.007 ms0.005 ms0.006 ms
Table 5. MIRACL testbed result of desktop platform.
Table 5. MIRACL testbed result of desktop platform.
NotationsMaxMinAverage
ECC multiplication ( C E m u l )0.421 ms0.388 ms0.409 ms
ECC addition ( C E a d d )0.006 ms0.002 ms0.006 ms
AES encryption ( C A e n c )0.001 ms0.001 ms0.001 ms
AES decryption ( C A d e c )0.001 ms0.001 ms0.001 ms
Bilinear pairings ( C B P )2.735 ms2.015 ms2.253 ms
Exponentiation ( C e x p )0.052 ms0.033 ms0.041 ms
Hash function ( C H a s h )0.002 ms0.001 ms0.002 ms
Table 6. Comparative study of computational overheads.
Table 6. Comparative study of computational overheads.
SchemesDeviceInfrastructureTotal Costs
Jia et al. [22] 5 C E m u l + C E a d d + 4 C H a s h 5 C E m u l + 2 C E a d d + 5 C H a s h + C B P 15.693 ms
Bagga et al. [23] 5 C E m u l + C E a d d + 8 C H a s h 4 E E m u l + C E a d d + 7 C H a s h 13.053 ms
Ke et al. [24] 4 C e x p + 2 C B P 4 C B P 33.346 ms
Seifelnasr et al. [25] 10 C E m u l + 2 C E a d d + 3 C H a s h 9 C E m u l + 5 C E a d d + 2 C H a s h 26.431 ms
Yadav et al. [26] 3 C E m u l + 2 C E a d d + 5 C H a s h 5 C E m u l + 2 C E a d d + 4 C H a s h 8.938 ms
Kumar and Om [27] 4 C E m u l + 7 C H a s h + C A e n c 7 C E m u l + 11 C H a s h + 2 C A e n c + 3 C A d e c 11.367 ms
Proposed 3 C E m u l + 11 C H a s h 3 C E m u l + 5 C H a s h 8.098 ms
Table 7. Comparative study of communicational overheads.
Table 7. Comparative study of communicational overheads.
SchemesTotal Communication CostsMessages
Jia et al. [22]1504 bits2
Bagga et al. [23]1856 bits3
Ke et al. [24]992 bits2
Seifelnasr et al. [25]3840 bits3
Yadav et al. [26]1472 bits3
Kumar and Om [27]2880 bits5
Proposed1184 bits2
Table 8. NS-3 parameters in our simulation.
Table 8. NS-3 parameters in our simulation.
Simulation ParametersDetails
Version of NS-33.29
Version of OSUbuntu 16.04 LTS
Number of vehicles10, 30, 60, 90
Number of edge nodes1, 3
Propagation loss modelTwoRayGroundPropagationLossModel
Mobility modelRandomDirection2dMobilityModel
ConstantPositionMobilityModel
Simulation area500 m × 500 m
Wireless channel bandwidth6 Mbps
NetworkIEEE 802.11p
Routing protocolAd hoc On-demand Distance Vector
Simulation time300 s
Table 9. Comparison of security and functionality features.
Table 9. Comparison of security and functionality features.
Security
Features
[22][23][24][25][26][27]Proposed
F1
F2
F3×
F4
F5
F6
F7×
F8×
F9×
F10×××
F11×××××
F12
∘: “Provides the security and functionality features”; ×: “Does not provide the security and functionality features”; −: “Does not consider features”. Note: (F(Feature)1: Replay attacks), (F2: Man-in-the-middle attacks), (F3: Impersonation attacks), (F4: Insider attacks), (F5: Privileged insider attacks), (F6: Verification table leakage attacks), (F7: ESL attacks), (F8: Perfect forward secrecy), (F9: Anonymity and untraceability), (F10: High computation overhead), (F11: High communication overhead), (F12: Formal analysis).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kwon, D.; Son, S.; Park, K.; Park, Y. A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET. Mathematics 2024, 12, 2383. https://doi.org/10.3390/math12152383

AMA Style

Kwon D, Son S, Park K, Park Y. A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET. Mathematics. 2024; 12(15):2383. https://doi.org/10.3390/math12152383

Chicago/Turabian Style

Kwon, Deokkyu, Seunghwan Son, Kisung Park, and Youngho Park. 2024. "A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET" Mathematics 12, no. 15: 2383. https://doi.org/10.3390/math12152383

APA Style

Kwon, D., Son, S., Park, K., & Park, Y. (2024). A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET. Mathematics, 12(15), 2383. https://doi.org/10.3390/math12152383

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop