Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 May 7;18(5):1453. doi: 10.3390/s18051453

Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles

Jie Cui 1,2, Wenyu Xu 1,2, Hong Zhong 1,2,*, Jing Zhang 1,2, Yan Xu 1,2, Lu Liu 3
PMCID: PMC5981257  PMID: 29735941

Abstract

The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.

Keywords: batch verification, IoV, TPD, privacy-preserving authentication

1. Introduction

In recent years, the Internet of Vehicles (IoV) [1,2,3,4] has aimed to enhance driving safety through inter-vehicle communications and communications between vehicles and roadside infrastructure [5,6,7]. Both academia and industry show great interests in developing a secure and efficient IoV. A typical IoV consists of a trusted third party (TA), a set of Roadside Units (RSUs) distributed along the roads, and many vehicles driving on the road. In IoV, the RSUs communicate with the TA via wired connections, and communicate with the vehicles via wireless channels. A vehicle periodically broadcasts traffic safety related messages such as the speed of the vehicle, the road condition, etc., to nearby vehicles and RSUs using the Dedicated Short Range Communications (DSRC) [8] protocol. These messages can be helpful to deal with emergency road conditions and reduce the risk of accidents.

After receiving messages sent by a vehicle, the RSU or vehicle needs to verify the integrity of the message to ensure that it is not modified by the attacker during the transmission. Meanwhile, the real identity of the vehicle should not be known by a malicious attacker during the transmission to preserve the identity privacy of the sender. However, false messages from attackers may cause significant damages; therefore, for security concerns, a trusted third party is needed to retrieve the real identify and locate the attackers who send the false messages. Many efforts have been made to tackle the above challenge, and many authentication schemes including Chim [9] have been proposed. Most of them are heavy in computation and communication.

To reduce the computation and communication overhead of the existing authentication scheme, in this paper, we propose the novel privacy-preserving authentication using a double pseudonym for the Internet of Vehicles. Our scheme makes use of the double pseudonym method and dynamic update technology. The computation and communication overhead are reduced because no bilinear paring is needed in the signature generation and verification. In addition, we show that the proposed scheme is secure via comprehensive security analysis. Finally, we periodically update the informations (e.g., member secret, authentication key, IPID) stored in the tamper-proof device; therefore, our scheme can resist the side-channel attack.

The remainder of this paper is organized as follows. Section 2 shows the related work about the identity-based scheme for IoV. The system model and security requirements are presented in Section 3. We describe the design of our scheme in Section 4 and the security analysis of the proposed scheme is indicated in Section 5. Section 6 analyzes the computational overhead and the communication overhead of the proposed scheme. Finally, conclusions and future work are presented in Section 7.

2. Related Work

Security and Privacy issues have attracted wide attention in IoV. Based on our knowledge, there are three types of authentication methods, namely, an anonymous certificate authentication scheme based on Public Key Infrastructure (PKI) [10], a group authentication scheme based on group signature, and a signature verification scheme based on identity. In 2006, Gamage et al. [11] used an identity-based ring signature scheme to protect the true identity of the signer. However, it was not possible to retrieve the true identity of the sender when the message was disputed. Later, Raya and Hubaux [12] proposed a PKI-based authentication scheme to achieve privacy preserving. Firstly, in order to protect the real identity of the vehicle, every vehicle needs to pre-load a large number of public and private key pairs and the corresponding certificate, which caused a serious storage management burden for a vehicle. Secondly, the trusted third party (TA) also suffers from a heavy certificate management burden to maintain all the anonymous certificates of all the vehicles. Furthermore, when the RSU or vehicle checks the validity of the signature, it is necessary to check the validity of the corresponding certificate, which also causes additional overhead to the system.

Some group-based signature schemes [13,14,15] were also proposed in the same year, where the group manager holds the private key of the group and can restore the true identity of the message signed by any vehicle in the group. In Lin’s scheme [14], many vehicles form a group in which each vehicle has its own private key and shares a group of public keys. They use a group signature to implement anonymous authentication of messages sent from a vehicle, and to use identity-based signatures to ensure the integrity of the messages sent from the RSU. A vehicle generates a signature of the corresponding message with its own private key, and the adversary could not link two anonymous identities or two signatures generated by the same vehicle. Hence, the proposed scheme provides unlinkability. Although a traditional certificate management problem is avoided in the group signature-based authentication scheme, the size of the CRL (Certificate Revocation List) grows as the number of recovered signers increases. Each CRL checking operation involves two pairing operations, which results in serious computational overhead for signature verification.

In order to neutralize the above two schemes, in 2008, Zhang et al. [16] first proposed an identity-based batch authentication scheme using a bilinear mapping. Firstly, in Zhang’s scheme [16], a large number of public and private key pairs and the corresponding certificate do not need to pre-load into a vehicle, which greatly reduces the overhead of transmitting and verifying the public key certificate. Secondly, the scheme uses the batch authentication method to verify the many messages at the same time, which can reduce the computation overhead. Thirdly, since a vehicle uses a pseudonym identity attached to the message during the transmission process, some untrustworthy parties and malicious attackers could not know the real identity of the vehicle. Finally, when a false message is found, a trusted third party has the ability to reveal the true identity of a vehicle. Therefore, the conditional privacy protection could be achieved.

However, in 2013, Lee and Lai [17] pointed out that Zhang’s scheme [16] had some flaws. First of all, Zhang’s scheme [16] cannot resist replay attack. In the absence of the corresponding inspection device, the receiver maybe receive a valid signature that has been verified before. Secondly, Zhang’s scheme [16] could not achieve non-repudiation. Although a trusted third party (TA) could recover the real identity of a false message that is sent by an adversary, the attacker could also deny sending the corresponding message. Hence, Lee and Lai [17] proposed an improved scheme to achieve better privacy preserving.

Recently, Zhang et al. [18] and Bayat et al. [19] found that Lee and Lai’s scheme [17] was not able to resist impersonation attacks, that is, malicious attackers could simulate a legal vehicle to send false messages. Therefore, Zhang et al. [18] and Bayat et al. [19] proposed two improved schemes to address the problem in Lee and Lai’s scheme [17]. However, as pointed out in He et al.’s scheme [20], the two schemes above have flaws in that they cannot prevent the modification attack in which the signature of message could be modified by the malicious attacker. Therefore, He et al. [20] proposed a conditional privacy protection scheme that does not use bilinear paring.

In He et al.’s scheme [20], since the system’s master private key is stored in a tamper-proof device (TPD), which is a device from which that no attacker can extract any stored data, the attacker could not acquire the system’s master private key to control the whole system. However, in a side-channel attack, the adversary collects a side channel information leak from some cryptographic operations. Once the TPD is compromised, the attacker could acquire the system’s master private key so that the whole system will be compromised. In order to prevent side-channel attacks, Zhang et al. [21] proposed a novel privacy-preserving authentication scheme. Instead of storing the master private key in the TPD that cannot be updated, their scheme stores security-related information in the TPD, which can be periodically updated. This approach can get rid of the ideal TPD, so it is more practical. However, this scheme uses bilinear mapping and multiple Map-to-Point operations, and thus leads to a heavy computational overhead.

3. System Model and Design Goals

In this chapter, we briefly introduce the network model and security requirements. Some notations are defined as shown in Table 1.

Table 1.

List of notations and definitions.

Notation Definitions
TA A trusted authority
Rj The j-th RSU
Vi The i-th vehicle
s,Ppub the private key and public key of TA
certRj A certificate of Rj issued by TA
IDRj,Vi The real identity of Rj or Vi
VPi The validity period of IPID
IPIDVi An internal pseudonym identity of Vi, generated by the TA based on IDVi
PPIDi,t The public pseudonym identity of Vi, generated from IPIDVi of Vi
hRj,TA A hash-based message authentication code generated by Rj or the TA
Eπ./Dπ. A symmetric encryption scheme, where π is the key

3.1. Network Model

As shown in Figure 1, an IoV consists of a third-party trusted authority (TA), some RSUs distributed on the roadside and multiple vehicles.

  • TA: TA is a trusted third party in IoV, with sufficient storage and computing power, and is considered impossible to compromise by an adversary. When an attacker simulates that a vehicle sends a false message, the TA can resume the true identity of the sent message.

  • RSUs: The RSU is an infrastructure that is distributed on the roadside and communicates with the TA via a wired connection, and communicates with vehicles over a wireless connection to verify the validity of the received message.

  • Vehicles: Each vehicle is equipped with TPD, and communicates with other vehicles and RSUs through wireless connections. The vehicle periodically broadcasts security-related messages to nearby vehicles and RSUs through the Dedicated Short Range Communications (DSRC) protocol.

Figure 1.

Figure 1

System model.

3.2. Security Requirements

A security scheme for IoV should meet some of the following features:

  1. Message integrity: In IoV, we need to ensure that the recipient received the message from the sender, and the message during the sending process has not been modified by the attacker to maintain integrity.

  2. Non-forgery: The attacker should not generate a valid signature on behalf of any vehicle under the randomly selected message attack in the random oracle model.

  3. Traceability: When an attacker presents as being a legal vehicle and sends a false message that may cause damage, the TA can reveal the real identity of the false message.

  4. Non-repudiation: When the trusted third party (TA) retrieves the real identity of the false message, the sender of the message could not deny the attack.

  5. Resistance against side-channel attack: The attacker should not be able to obtain any information stored in the tamper-proof device through the side-channel attack.

4. The Proposed Scheme

Recently, some safety-related authentication schemes for IoV have been proposed. However, most of them are heavy in computation and communication, and could not resist some attack existing in IoV. In order to deal with the security problem existing in IoV, we proposed the privacy-preserving authentication using a double pseudonym that does not use bilinear paring, which can be used in the inter-vehicle communications and vehicle to RSU communications. Figure 2 graphically describes the details of our scheme. TA generates the private key and system parameters in our scheme. Each RSU has its own public-private key pairs and the corresponding certification from the TA. When a vehicle enters the range of RSU, then it will request the shares (member secret) of RSU, after authenticating the identity of vehicle via the TA, the shares and the corresponding authenticated period will be sent to the vehicle. This authenticated period is valid for a short time. Once it expires, it should be executed once again. Upon the vehicle receiving the shares and authenticated period, it generates a one-time use private key and signature. This signature could be verified by other vehicles and RSUs. If a vehicle sends a false message, the TA could trace the real identity of the vehicle.

Figure 2.

Figure 2

Graphical representation of our scheme.

This scheme can be divided into the following modules:

  • System Setup: In this phase, the TA generates the private key and system parameters.

  • RSU Setup: In this phase, the RSU can generate its own public-private key and the corresponding certification certRj from the TA.

  • Vehicle Setup: In this phase, when the vehicle joins into the IoV, the TA generates the inter-pseudonym identity (IPID). The vehicle chooses the authentication key λi, and puts the IPID and the λi into the tamper-proof device.

  • Member key generation: In this phase, when the vehicle enters the range of the RSU, the vehicle will request to acquire the member secret of the RSU. After the RSU authenticates the identity of the vehicle, it sends the member secret (βj,γj) and the corresponding valid period (VPi) to the vehicle.

  • Vehicle Sign: In this phase, if the vehicle wants to send a message, it will first generate its own external pseudonym identity and one-time signing key, and then generate the signature of the corresponding message.

  • Message Verification: In this phase, we will use batch authentication to verify the validity of signatures without bilinear pairing, which greatly reduced the computation overhead.

  • IPID and authentication key updated: In this phase, vehicles can use the online mode to update their own inter-pseudonym identity and authentication key and to prevent the attacker from tracking the true identity of the vehicle.

4.1. System Setup Phase

In this phase, there are some initialization parameters that preload into the vehicles and RSUs generated by the TA using the following steps. This can be done once, unless the private key of the system is compromised by an attacker, or the system wants to periodically update the system parameters and private key to enhance the system security level:

  1. TA selects two large prime p and q as well as a non-singular elliptic curve E defined by the equation y2=x3+ax+b mod n, where a,bFp.

  2. TA selects the cyclic addition group G, where the P is the generator and q is the order of group.

  3. TA selects a random number sZq* as the secret key of the TA, and calculates Ppub=s·P as the public key of the TA.

  4. TA selects Eπ(·)/Dπ(·) and some hash functions: h1: GZq, h2: 0,1* Zq, H1key·: 0,1*0,1l, H2·: 0,1*Γ, H3·: 0,1*0,1l, where H1key· as a keyed hash.

  5. The system parameters are ψ=(p,q,a,b,P,Ppub,h1, h2,H1key·,H2·, H3·,Eπ./Dπ.), putting the system parameters ψ into the vehicles and RSUs in advance.

4.2. RSU Setup Phase

In this phase, the RSU generates its own public-private key pairs and the corresponding certification from the TA. This certification can be used only in a short time. Once the period is over, the RSU should execute the step once again. To generate its own public-private key pairs, the RSU randomly chooses two numbers kj,ηjZq* and computes PKRj1=kjP,PKRj2=ηjP. The private key is kj,ηj and the public key is PKRj1,PKRj2, where kj is used to generate the shares of vehicle, and ηj is used to generate the secure channel between the RSU and vehicle. After generating its public key, the RSU sends the public key PKRj1,PKRj2 and its own identity information to the TA through the secure channel. When the TA receives the messages, it generates the certification of RSU, and then the RSU broadcasts the certRj within its own range.

4.3. Vehicle Setup Phase

In this phase, when the vehicle joins the range of the IoV, the information stored in the TPD should be initialized. Assuming the real identity of vehicle is RID, the TA can compute the inter-pseudonym identity IPIDVi=H1Λ(RID||VPi), where the VPi is the valid period of the inter-pseudonym identity like 2 March 2017–3 April 2017. The vehicle chooses the authentication key λi, putting the ψ,IPIDVi,λi into the TPD. RID,VPi,IPIDVi,λi is stored into the member list ML in the TA.

4.4. Member Key Generation Phase

In this phase, a vehicle can obtain the member secrets and the corresponding valid period from the nearest RSU. This process among the vehicle, the RSU and the TA should be confidential. When a vehicle enters the communication range of RSU, the vehicle will receive the certification from RSU, and send the request of acquiring the member secrets and the corresponding valid period of RSU. After the RSU authenticates the identity of the vehicle, it sends the member secret and the valid period to the vehicle. The details are as the following steps:

  1. When the vehicle enters the communication range of RSU, the vehicle will receive the certification from RSU and first check the validity of the certRj that has the format (IDRj,(PKRj1,PKRj2,sigj)), where sigj is a signature on (IDRj,(PKRj1,PKRj2)) issued by the TA. If the certification is valid under the public key of the system, extract the public key and identity of RSU from the certification certRj.

  2. The vehicle chooses a random number rZq*, and computes f=rP, πi1=H2(f,PKRj2,rPKRj2, IDRj,Ti), πi2=H2f,Ppub,rPpub,IDRj,Ti, where Ti is a timestamp, and πi1,πi2 are used as the keys of the symmetric encryption scheme Eπ./Dπ.. Finally, the vehicle computes pj=Eπi2λi,Ti and sends s=f,IDRj,pj,Ti to RSU.

  3. The RSU receives s from vehicle, if Ti is invalid, then it aborts; otherwise, it sends s to the TA through the secure channel. When the TA receives s and first computes πi2=H2f,Ppub,sf,IDRj,Ti, Dπi2pj to get (λi,Ti). If the equation λiλi does not appear in a tuple of the member list RID,VPi,IPIDVi,λi of the TA or TiTi or VPi is invalid, it aborts; otherwise, the TA authenticates the vehicle and sends the authenticated message to RSU.

  4. When the RSU receives the authenticated message from the TA, it means the vehicle is legal. RSU first computes πi1=H2f,PKRj2,fηj,IDRj,Ti; and chooses an authenticated period τp and member secret (βj,γj), where βj and γj satisfy kj=βj·γj; it computes hRj=H1πi1βj,γj,τp, and pj=Eπi1βj,γj,τp,hRj; and sends t=(H3f,pj) to the vehicle.

  5. When the vehicle receives the t and Dπi1pj to get βj,γj,τp,hRj, it verifies whether the equation hRj=H1πi1βj,γj,τp holds. If so, it lets the member secret and authenticated period in the TPD; otherwise, it aborts. This member key can only be used under the authenticated period, and, once it expires, the member key stored in the TPD is deleted.

4.5. Vehicle Signature Phase

In this phase, when a vehicle obtains the member secret (βj,γj) from the RSU and the validity period of member secret is within the authorized period, the vehicle will generate the external pseudonym identity of the vehicle and the digital signature of the message. Finally, a vehicle broadcasts the external pseudonym identity, the message as well as the digital signature to other vehicles and the RSU. The details are as the following steps:

  1. Vehicle computes the external pseudonym identity PPIDi=H3IPIDVi,Ti and the one time signature key ski=βj·γj·h1PPIDimodn.

  2. The vehicle chooses a random number riZq*, and computes Ri=ri·P, βi=h2PPIDiRiMi, Si=ski+βi·ri. Then the vehicle sends Mi,PPIDi,Ri,Si to nearby vehicles and RSUs.

  3. The member secret (βj,γj) stored in the TPD needs to be periodically updated. Choose a random number rZq*, and set βj=r·βj, γj=r·γj as the new member secret.

4.6. Message Verification Phase

This phase allows the verifier to check the validity of the received message without bilinear pairing, which greatly reduces the computation overhead. Moreover, our scheme can support the batch verification function, which can verify many messages at the same time to improve performance. Then, we will show the details of verifying a single message and many messages.

  • Single message verification: When the verifier receives the safety-related message Mi,PPIDi,Ri,Si broadcasted from the vehicle, it could use the system parameters ψ to verify the validity of the message. The details are as following:
    1. The verifier first checks the validity of timestamp Ti. If Ti is invalid, it aborts; otherwise, it executes the next step.
    2. The verifier checks whether the equation Si·P=h1PPIDi·PKRj1+βi·Ri holds. If it holds, the verifier receives the message; otherwise, it rejects the message.
    Due to ski=(βj·γj)·h1PPIDimodn, βj·γj=kj, PKRj1=kj·P, Ri=ri·P, βi=h2PPIDiRiMi and Si=ski+βi·ri, we can check the equation through the following steps:
    Si·P=ski+βiri·P=βj·γj·h1PPIDi+βi·ri·P=βj·γj·h1PPIDi·P+βi·ri·P=h1PPIDi·PKRj1+βi·Ri. (1)

    Hence, the correctness of the single message verification is verified.

  • Multiple messages batch verification: We used a small index test technique during the batch verification procedure to ensure the non-repudiation of the signature. A vector, including the small random integer, is used to detect the modification of the batch signature in the small index test technique. After receiving multiple messages M1,PPID1,R1,S1, M2,PPID2,R2,S2, ...,Mn,PPIDn,Rn,Sn, a verifier uses the system parameter to verify the validity of the many messages at the same time. The details are as the following steps:
    1. Verifier first checks the validity of Ti, where i=1,2,,n. If Ti is invalid, the verifier rejects the messages; otherwise, it executes the next step.
    2. Verifier chooses a random vector v={v1,v2,,vn}, where vi is a small random integer in 1,2t and t is a small integer with low overhead. Then, the verifier checks the correctness of the equation (i=1nvi·Si)·P=i=1n(Vi·h1PPIDi)·PKRj1+i=1n(vi·βi·Ri). If it does not hold, the verifier rejects the messages; otherwise, the verifier receives the messages.
    Due to ski=αj·βj·h1PPIDimodn, βj·γj=kj, PKRj1=kj·P, Ri=ri·P, βi=h2PPIDiRiMi and Si=ski+βi·ri, we can check the equation through the following steps:
    i=1nvi·Si·P=(i=1nviski+βi·ri)·P=i=1nviβj·γj·h1PPIDi+βi·ri·P=i=1n(vi·(βj·γj·h1PPIDi·P+βi·ri·P))=i=1n(vi·h1PPIDi·PKRj1+vi·βi·Ri)=i=1n(vi·h1PPIDi)·PKRj1+i=1n(vi·βi·Ri)=i=1nvi·h1PPIDi·PKRj1+i=1nvi·βi·Ri. (2)

Hence, the correctness of the multiple messages verification is verified.

4.7. IPID and Authentication Key Update Phase

At this phase, the vehicle can use the online model to update the internal pseudo-identity and authentication key stored in the TPD. The details are as following:

  1. When a vehicle wants to update the internal pseudo-identity and authentication key, it first chooses a random number tZq*, and computes g=t·P, πi=H2g,Ppub,tPpub,Ti, pi=Eπiλi,Ti. Then, it sends z=g,Ti,pi to the TA through the nearby RSU.

  2. The TA receives z and checks the validity of Ti. If Ti is invalid, it aborts; otherwise, it executes the following steps:

    • TA computes πi=H2(g,Ppub,s·g,Ti) and Dπipi to get (λi,Ti).

    • TA checks the validity of Ti, if Ti is invalid, it aborts; otherwise, it executes the next step.

    • TA searches the member list for a tuple (RID,VPi, IPIDVi,λi) such as λi=λi. If such a tuple does not exist, it aborts; otherwise, it executes the next step.

    • TA checks the validity of VPi. If it is invalid, choose a new valid period VPi. TA computes IPIDVi= H1Λ(RID||VPi) and chooses a new authentication key λi^; otherwise, it aborts.

    • TA computes pi=Eπi(IPIDVi,λi^,Ti,hTA). If hTA=H1λi(IPIDVi,λi^,Ti) is an HAMC, sends (H3(g),pi) to the vehicle and put (RID,VPi,IPIDVi,λi^) into ML.

  3. After a vehicle receives (H3(g),pi), it first computes Dπi(pi) to get (IPIDVi,λi,Ti,hTA). Then, the vehicle checks the validity of Ti and hTA. If it is invalid, set the IPIDVi,λi as the new internal pseudo-identity and authentication key.

5. Security Proof and Analysis

In this section, because it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, we prove that the proposed identity-based scheme has the feature of non-forgery. In addition, we also show that our scheme can satisfy the security requirement and illustrate the differences between our scheme and others.

5.1. Security Analysis

In this sub-section, we will show that an attacker could not generate a valid signature on behalf of any vehicle through the game that is made up of a challenger C and an adversary A.

Definition 1.

Since it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, the proposed scheme is security existential forgery under the randomly selected message attack in the random oracle model. The proof is as follows.

Theorem 1.

Our scheme for IoV is secure in the random oracle.

Assuming there is an adversary that could forge message Mi,PPIDi,Ri,Si, then we construct a challenger C, which could solve the ECDL problem through running A as a subroutine. The details are as the following steps:

Setup stage: Challenger C first sets Q=PKRj1, then it sends the system parameters ψ=(p,q,a,b,P,Ppub, h1, h2,H1key·,H2·,H3·,Eπ./Dπ.) to an adversary A.

h1-oracle: Challenger C first initializes the list Lh1 with the form of PPIDi,τh1. When receiving the query of the message with the form of <PPIDi> from the adversary A, the challenger C checks a tuple of the <PPIDi> to find out whether it appears in the list Lh1. If the tuple exists in the list Lh1, then send τh1=h1PPIDi to the adversary A; otherwise, C chooses a random number τh1Zq* and sets the tuple PPIDi,τh1 into the Lh1, finally sending the τh1= h1PPIDi to A.

h2-oracle: Challenger C first initializes the list Lh2 with the form of Lh2PPIDi,Ri,Mi,τh2. When receiving the query of the message with the form of PPIDi,Ri,Mi from the adversary A, the challenger C checks a tuple of the PPIDi,Ri,Mi for whether it appears in the list Lh2. If the tuple exists in in the list Lh2, then sends τh2=h2PPIDiRiMi to the adversary A; otherwise, C chooses a random number τh2Zq* and sets the tuple PPIDi,Ri,Mi,τh2 into the Lh2, and finally sends the τh2=h2PPIDiRiMi to A.

sign-oracle: Upon receiving the message Mi from an adversary A, challenger C generates random numbers Si, hi,1,βiZq* and PPIDi. Challenger C puts PPIDi,hi,1 and Mi,PPIDi,Ri,Si to the adversary A, and it is easy to verify that the equation Si·P=h1PPIDi·PKRj1+βi·Ri holds. Therefore, the message and signature Mi,PPIDi,Ri,Si, which A acquired from the inquiry from C, are valid.

Output: Finally, A outputs the message (Mi,PPIDi,Ri, Si). C checks whether the equation holds:

Si·P=h1PPIDi·PKRj1+βi·Ri. (3)

If it does not hold, C aborts the process; otherwise, because of the forged lemma, if A executes h1-oracle once again, a valid message (Mi,PPIDi,Ri,Si) will be generated. It can also conclude the similar equation:

Si·P=h1PPIDi·PKRj1+βi·Ri. (4)

According to Equations (3) and (4), we could get

Si-Si·P=Si·P-Si·P=h1PPIDi·PKRj1+βi·Ri-h1PPIDi·PKRj1+βi·Ri=h1PPIDi-h1PPIDi·PKRj1=h1PPIDi-h1PPIDi·kj·P (5)

and

Si-Si=h1PPIDi-h1PPIDi·kj. (6)

Therefore, C outputs the h1PPIDi-h1PPIDi-1·Si-Si. However, it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, and the security of the proposed scheme is secure against forgery under the randomly selected message attack in the random oracle model.

  1. Message integrity: According to Theorem 1, because it is difficult to solve the ECDL problem, the signature used in our scheme is not forged under the random oracle model. Therefore, no adversary can simulate a legal vehicle to generate a valid signature or modify a legal signature. We can verify the equation that Si·P=h1PPIDi·PKRj1+βi·Ri holds to check the validity and integrity of the message Mi,PPIDi,Ri,Si . Thus, the proposed scheme can achieve message integrity.

  2. Non-forgery: Since it is difficult to address the computational Elliptic Curve Discrete Logarithm (ECDL) problem, the attacker could not generate a valid signature on behalf of any vehicle under the randomly selected message attack in the random oracle model. Thus, the proposed scheme can achieve non-forgery.

  3. Traceability: During this stage, when the adversary sends false messages which cause damage, the TA can trace the real identity of the corresponding message. Assuming the public pseudonym identity of the vehicle is PPIDi, the TA can extract the timestamp from the message Mi, which can find the valid period VPi of the internal pseudo-identity of vehicle. Then, the TA can verify whether the equation H3IPIDVi,Ti = PPIDi holds, where the IPIDVi is in the tuple of member list RID,VPi,IPIDVi,λi. If it holds, the TA outputs the real identity of vehicle.

  4. Non-repudiation: Once the TA traces the real identity of false message, the message sender could not deny that he has sent this false message. To achieve this goal, in our scheme, we use a random vector v=v1,v2,,vn to ensure an attacker cannot deny its signature in a message sent by exchanging signatures among several different messages.

  5. Resistance side channel attack: In this paper, we use the more realistic TPD to resist side channel attack. There are three types of related information (IPID, authentication key, and member secret) stored in the TPD of our scheme. Due to the first type of secret often being used, if the vehicle does not periodically update this information, it will give the attacker a chance to recover the real identity of vehicle. In our scheme, before the attacker can probe the related information to recover the IPID through the side channel attack, the IPIP has already been updated. Secondly, the authenticated key can only be used during the authentication of vehicle. It is much harder for the attacker to resume the authenticated key than recover the IPID. In addition, as for the member secret, even if the adversary could recover the member secret, only the vehicle in the nearby RSU can be influenced. Furthermore, because the RSU can periodically update its public-private key pairs, the attacker could not acquire enough information through the side channel to resume the member key stored in the TPD.

5.2. Security Comparison

In this sub-section, we compare the proposed scheme with other existing schemes in terms of satisfactory security requirements. The comparison results are summarized in Table 2, where sr1, sr2, sr3, sr4, sr5 denote the message integrity, non-forgery, traceability, non-repudiation and resistance side channel attack, respectively.

Table 2.

The security comparisons of each scheme.

sr1 sr2 sr3 sr4 sr5
Zhang et al. [18] × ×
Bayat et al. [19] × ×
Zhang et al. [21]
He et al. [20] ×
Our Scheme

As shown in Table 2, we can conclude that the schemes of Zhang et al. [18], Bayat et al. [19], and He et al. [20] could not satisfy all five of the security requirements. However, our scheme could satisfy all security requirements.

6. Performance Analysis and Comparison

In this section, we will analyze the proposed identity-based scheme compared with other related schemes in terms of the computation overhead and communication overhead.

6.1. Computation Overhead Analysis

In the scheme-based bilinear pairing proposed by Zhang et al. [18] and Bayat et al. [19], the order q of group G in the bilinear pairing e: G×GGT, generated by the Elliptic Curve y2=x3+x mod n to achieve the security level of 80 bits, where n is the 512-bit prime number and the order q of the group G is a 160-bit prime number. However, among the schemes based on the Elliptic Curve, such as the scheme proposed by He et al. [20], the order q of group G is generated by the Elliptic Curve y2=x3+ax+b mod n to achieve the same security level compared with the scheme based on the bilinear pairing, where n and q are the 160-bit prime numbers. For convenience, some time-consuming cryptographic operations [22] are defined as follows: Tp denotes the execution time of the bilinear pairing operation; Tmp-p denotes the execution time of the small scale multiplication operation; Tmtp denotes the execution time of a Map-to-Point operation; and Tmp-ECC denotes the execution time of the small scale multiplication operation based on the Elliptic Curve. Table 3 lists the execution time required for these operations [20].

Table 3.

Different execution time of each cryptographic operations.

Cryptographic Operation Execution Time
Tp 4.211 ms
Tmp-p 1.709 ms
Tmtp 4.406 ms
Tmp-ECC 0.442 ms

The computation overhead of our scheme can be compared with other schemes in three aspects, letting PSGH and SMVH and MMVH denote the pseudonym and signature generation phase, signal message verification phase and multiple messages verification phase, respectively. Details are only shown in Zhang et al.’s scheme [21] and our scheme. The other schemes can be analyzed by the same method. Table 4 lists the computation overhead of our scheme compared with the schemes of Zhang et al. [18], Bayat et al. [19], Zhang et al. [21] and He et al. [20].

Table 4.

The computation overhead of each scheme.

Scheme PSGH SMVH MMVH
Zhang et al. [18] 6Tmp-tp
+Tmtp
14.66 ms
3Tbp+
2Tmp-bp
≈16.051 ms
n+1Tmp-bp+
3Tbp12.633+
1.709 (n + 1) ms
Bayat et al. [19] 5Tmp-bp
+Tmtp
12.951 ms
3Tbp+Tmtp
+Tmp-bp
18.748 ms
3Tbp+nTmp-bp
+nTmtp6.115n
+12.633 ms
Zhang et al. [21] 2Tmtp
8.812 ms
2Tbp+2Tmtp
≈17.234 ms
2Tbp+2nTmtp
8.812n+8.422 ms
He et al. [20] 3Tmp-ECC
1.326 ms
3Tmp-ECC
1.326 ms
n+2Tmp-ECC
0.442n+2 ms
Our Scheme Tmp-ECC
0.442 ms
3Tmp-ECC
1.326 ms
n+2Tmp-ECC
0.442n+2 ms

In the pseudonym and signature generation phase of Zhang et al’s scheme [21], which needs to execute the two Map-to-Point operations, the whole computation time of this phase is 2Tmtp=8.812 ms. During the signal message verification phase, there are two bilinear pairing operations and two Map-to-Point operations that need to be executed. Thus, the whole computation time of this phase is 2Tp+2Tmtp=17.234 ms. In the multiple messages verification phase, there are two bilinear pairing operations and 2n Map-to-Point operations that need to be executed. Thus, the whole computation time of this phase is 2Tp+2Tmtp=8.812n+8.422 ms.

In the pseudonym and signature generation phase of our scheme, which needs to execute a small scale multiplication operation based on the Elliptic Curve, the whole computation time of this phase is Tmp-ECC=0.442 ms. During the signal message verification phase, there are three small scale multiplication operations based on the Elliptic Curve that need to be executed. Thus, the whole computation time of this phase is 3Tmp-ECC=1.326 ms. In the multiple message verification phase, there are (n+2) small scale multiplication operation based on the Elliptic Curve that need to be executed. Thus, the whole computation time of this phase is n+2Tmp-ECC=0.442n+2 ms. Figure 3 shows the computation overhead to sign and verify the single message in each scheme. Compared with the schemes of Bayat et al. [19] and Zhang et al. [21] using the bilinear pairing, our scheme’s computation is lower. At the same time, our scheme is also lower than the scheme of He et al. [20] in terms of computation. Figure 4 shows the total execution time of the batch verification as the amount of the vehicle increasing in each scheme. When the authenticated vehicle is increased to 100, in our scheme, the total execution time is less than 50 ms. Hence, our scheme is more suitable for the scene of multiple vehicles in IoV.

Figure 3.

Figure 3

Computation overhead comparison of signing and verifying a single message.

Figure 4.

Figure 4

Computation overhead comparison of verifying multiple message.

6.2. Communication Overhead Analysis

In this section, the communication overheads of our scheme compared with other schemes will be analyzed. In the group G1 based on bilinear mapping, the size of the elements in G1 is 64 × 2 = 128 byte [23]. However, in the group G based on the Elliptic Curve, the size of the elements in G1 is 20 × 2 = 40 byte. Furthermore, we assume that the size of result of the general hash function is 20 bytes and the size of the timestamp is 4 bytes [24]. In addition, we do not consider the size of the message that is transmitted by the vehicle in this phase [25]. Table 5 lists the computation overheads of our scheme compared with other schemes.

Table 5.

The communication overhead of each scheme.

Scheme Sending a Single Message Sending n Messages
Zhang et al. [18] 388 bytes 388 n bytes
Bayat et al. [19] 388 bytes 388 n bytes
Zhang et al. [21] 148 bytes 148 n bytes
He et al. [20] 144 bytes 144 n bytes
Our Scheme 80 bytes 80 n bytes

In Table 5, the communication message is {AIDi,Mi,Si,Ti} in Zhang et al.’s scheme [18], where AIDi=AID1,AID2,AID1,AID2,SiG1, hence the communication overhead of sending single message is 128 × 3 + 4 = 388 bytes. When multiple messages are broadcasted, which needs n pseudonym, signature and timestamp, the total communication overhead of sending multiple messages is 388n bytes. In addition, in He et al.’s scheme [20], due to the AID1,AID2,RiG,σiZq*, Ti is a timestamp, and the communication overhead of sending a single message and multiple messages are 40 × 3 + 20 + 4 = 144 byte and 144 n bytes, respectively. The other scheme’s communication overhead can be concluded by the same method. In our scheme, the communication messages include PPIDiZq*, RiG,SiZq*, whose overhead is 20 × 2 + 40 = 80 byte. The communication overhead of sending multiple messages is 80n bytes.

7. Conclusions

In this paper, we propose a privacy-preserving authentication scheme using a double pseudonym that supports both Vehicle to Vehicle (V2V) communication and Vehicle to Infrastructure (V2I) communication in IoV. Firstly, unlike other schemes, which store the system master secret (that cannot be updated) in the TPD, in our scheme, the information stored in the TPD is regularly updated. Therefore, the proposed scheme can resist side-channel attacks and hence is more practical. Secondly, the security analysis shows that our scheme can satisfy the security requirements for IoV. Furthermore, performance analysis and comparison show that our scheme is better than other schemes in terms of computation overhead and communication overhead. This shows that our scheme is more suitable used in the IoV.

As for future work, we will pay more attention to addressing the extreme environment in which the system suffers Denial of Service (DoS) attack during the messages broadcast. Since the Dos attack is hard to defend and causes huge damage in the batch verification, addressing the DoS attack has become an urgent task in future research.

Acknowledgments

The authors thank the Associate Editor and the anonymous reviewers for their useful comments and suggestions which helped us improve the quality and presentation of this paper.

Author Contributions

This paper is completed by all authors. W.X. is responsible for proposing the idea of the paper and J.C. checks whether the idea is feasible and give some suggestions to improve this idea. J.Z. is responsible for writing this paper and the security analysis is completed by H.Z. Y.X. is responsible for the performance analysis and comparison. Finally, the language of the paper is improved by L.L.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61572001, Grant 61502008, and Grant 61702005, in part by the Key Program of National Natural Science Foundation of China under Grant U1405255, in part by the Natural Science Foundation of Anhui Province under Grant 1708085QF136, and in part by the Excellent Talent Project of Anhui University.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Sha K., Xi Y., Shi W., Schwiebert L., Zhang T. Adaptive privacypreserving authentication in vehicular networks; Proceedings of the 1st International Conference on Communications and Networking in China; Beijing, China. 25–27 October 2006; pp. 1–8. [Google Scholar]
  • 2.Xi Y., Sha K., Shi W., Schwiebert L., Zhang T. Enforcing privacy using symmetric random key-set in vehicularnetworks; Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems; Sedona, AZ, USA. 21–23 March 2007; pp. 344–351. [Google Scholar]
  • 3.Qu F., Wu Z., Wang F.-Y., Cho W. A security and privacy review of vanets. IEEE Trans. Intell. Transp. Syst. 2015;16:2985–2996. doi: 10.1109/TITS.2015.2439292. [DOI] [Google Scholar]
  • 4.Cheng J.J., Cheng J.L., Zhou M.C., Liu F.Q., Gao S.C., Liu C. Routing in internet of vehicles: A review. IEEE Trans. Intell. Transp. Syst. 2015;16:2339–2352. doi: 10.1109/TITS.2015.2423667. [DOI] [Google Scholar]
  • 5.Zeadally S., Hunt R., Chen Y.-S., Irwin A., Hassan A. Vehicular ad hoc networks (vanets): Status, results, challenges. Telecommun. Syst. 2012;50:217–241. doi: 10.1007/s11235-010-9400-5. [DOI] [Google Scholar]
  • 6.Toor Y., Muhlethaler P., Laouiti A. Vehicle ad hoc networks: Applications and related technical issues. IEEE Commun. Surv. Tutor. 2008;10:3. doi: 10.1109/COMST.2008.4625806. [DOI] [Google Scholar]
  • 7.Wang F.-Y., Zeng D., Yang L. Smart cars on smart roads: An ieee intelligent transportation systems society update. IEEE Pervasive Comput. 2006;5:68–69. doi: 10.1109/MPRV.2006.84. [DOI] [Google Scholar]
  • 8.Oh H., Yae C., Ahn D., Cho H. 5.8 ghz dsrc packet communication system for its services; Proceedings of the Vehicular Technology Conference; Amsterdam, The Netherlands. 19–22 Septemper 1999; pp. 2223–2227. [Google Scholar]
  • 9.Chim T.W., Yiu S.-M., Hui L.C., Li V.O. Specs: Secure and privacy enhancing communications schemes for vanets. Ad Hoc Netw. 2011;9:189–203. doi: 10.1016/j.adhoc.2010.05.005. [DOI] [Google Scholar]
  • 10.Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates. [(accessed on 14 March 2018)]; Available online: https://tools.ietf.org/html/rfc3709.
  • 11.Gamage C., Gras B., Crispo B., Tanenbaum A.S. An identitybased ring signature scheme with enhanced privacy; Proceedings of the Securecomm and Workshops; Baltimore, MD, USA. 28 August–1 September 2006; pp. 1–5. [Google Scholar]
  • 12.Raya M., Hubaux J.-P. Securing vehicular ad hoc networks. J. Comput. Secur. 2007;15:39–68. doi: 10.3233/JCS-2007-15103. [DOI] [Google Scholar]
  • 13.Lin X., Lu R., Zhang C., Zhu H., Ho P.-H., Shen X. Security in vehicular ad hoc networks. IEEE Commun. Mag. 2008;46:4. [Google Scholar]
  • 14.Lin X., Sun X., Ho P.-H., Shen X. Gsis: A secure and privacypreserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 2007;56:3442–3456. [Google Scholar]
  • 15.Studer A., Shi E., Bai F., Perrig A. Tacking together efficient authentication, revocation, privacy in vanets; Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Rome; Italy. 22–26 June 2009; pp. 1–9. [Google Scholar]
  • 16.Zhang C., Lu R., Lin X., Ho P.-H., Shen X. An efficient identitybased batch verification scheme for vehicular sensor networks; Proceedings of the 27th Conference on Computer Communications; Phoenix, AZ, USA. 13–18 April 2008; pp. 246–250. [Google Scholar]
  • 17.Lee C.-C., Lai Y.-M. Toward a secure batch verification with group testing for vanet. Wirel. Netw. 2013;19:1441. doi: 10.1007/s11276-013-0543-7. [DOI] [Google Scholar]
  • 18.Jianhong Z., Min X., Liying L. On the security of a secure batch verification with group testing for vanet. Int. J. Netw. Secur. 2014;16:351–358. [Google Scholar]
  • 19.Bayat M., Barmshoory M., Rahimi M., Aref M.R. A secure authentication scheme for vanets with batch verification. Wirel. Netw. 2015;21:1733. doi: 10.1007/s11276-014-0881-0. [DOI] [Google Scholar]
  • 20.He D., Zeadally S., Xu B., Huang X. An efficient identitybased conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015;10:2681–2691. doi: 10.1109/TIFS.2015.2473820. [DOI] [Google Scholar]
  • 21.Zhang L., Wu Q., Domingo-Ferrer J., Qin B., Hu C. Distributed aggregate privacy-preserving authentication in vanets. IEEE Trans. Intell. Transp. Syst. 2017;18:516–526. doi: 10.1109/TITS.2016.2579162. [DOI] [Google Scholar]
  • 22.He D., Kumar N., Shen H., Lee J.-H. One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 2016;5:1–14. doi: 10.1007/s11432-015-5469-5. [DOI] [Google Scholar]
  • 23.Identity-Based Cryptography Standard (Ibcs)#1: Supersingular Curve Implementations of the bf and bb1 Cryptosystems. [(accessed on 14 March 2018)];2007 Technical Report. Available online: https://www.rfc-editor.org/rfc/rfc5091.txt.
  • 24.509 Public Key Infrastructure Time Stamp Protocol (TSP)[J] [(accessed on 14 March 2018)];2001 Available online: https://tools.ietf.org/html/rfc3161.
  • 25.Lo N.-W., Tsai J.-L. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans. Intell. Transp. Syst. 2016;17:1319–1328. doi: 10.1109/TITS.2015.2502322. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES