Journal
COMPUTERS & ELECTRICAL ENGINEERING
Volume 100, Issue -, Pages -Publisher
PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.compeleceng.2022.108016
Keywords
VANET; Conditional privacy-preserving; PUF; Authentication scheme; V2V communication; Lightweight authentication
Categories
Funding
- UGC, India
- UGC [3500]
Ask authors/readers for more resources
Vehicular ad-hoc network faces security and privacy issues, requiring vehicle authentication, message integrity, and privacy preservation. Most existing solutions rely on infrastructural entities, increasing communication overhead and vulnerability to physical and cloning attacks. This paper proposes a lightweight authentication scheme based on Physically Unclonable Function, reducing the burden on infrastructural entities through vehicle-to-vehicle communication. Security and performance analysis demonstrate the effectiveness of the proposed scheme.
The vehicular ad-hoc network relies on wireless communication, thus exposing security and privacy-related issues. The primary security requirements in a vehicular network are vehicle authentication, message integrity, and privacy preservation. Most of the existing state-of-the-art security schemes heavily relied on infrastructural entities such as roadside units and trusted authorities to achieve authentication. Typically, frequent authentication involving infrastructural entities increases communication overhead. Besides, the existing solutions assume the usage of ideal tamper-proof devices for storing sensitive data, which is prone to physical and cloning attacks. In this context, we present a Physically Unclonable Function based Lightweight Authentication Scheme with privacy preservation for vehicle-to-vehicle communication in the vehicular network. Physically unclonable function adds an extra layer of security from cloning and physical attacks. The proposed method uses a two-tier approach consisting of trusted authority and vehicles for achieving authentication using lightweight bitwise XOR operations and one-way hash functions. The proposed scheme reduces the burden on infrastructural entities by performing authentication through vehicle-to-vehicle communication. Compared with state-of-the-art schemes, the proposed scheme's security and performance analysis demonstrates its effectiveness in meeting various security requirements while ensuring resilience against various known attacks and competitive communication and computation cost.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available