4.5 Article

A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network

Journal

JOURNAL OF SUPERCOMPUTING
Volume 78, Issue 16, Pages 17657-17688

Publisher

SPRINGER
DOI: 10.1007/s11227-022-04562-9

Keywords

Privacy; Authentication; Session key agreement; Desynchronization attack; Security; VANET

Ask authors/readers for more resources

Vehicular ad hoc network (VANET) is crucial in smart cities, but security and privacy issues during communication pose threats. Existing protocols fail to meet requirements, hence this paper proposes a new authentication protocol for VANET, addressing forward/backward secrecy and desynchronization attacks effectively.
Vehicular ad hoc network (VANET) has become an indispensable requirement in smart cities. The major applications are acquiring traffic information, vehicular surveillance, infotainment, etc. However, due to the use of unguided media, several security and privacy issues may arise during an ongoing communication. Attackers may conduct numerous passive/active attacks and cause threat to privacy, confidentiality, integrity and availability of the communication system, hence requiring a secure and efficient authentication system to address such vulnerabilities. Recently, various protocols have been proposed to address these challenges. Unfortunately, none could fulfill such requirements. In addition, the existing protocols are mostly based on public key cryptography. Thus, they may not be suitable for energy efficiency requirements of the evolving technologies such as LTE, LTE-Advanced, 5G and next-generation mobile networks. On the other hand, the security of the symmetric key-based protocols depends on a long-term shared secret key. This may introduce threat to forward/backward secrecy. In this paper, we propose a conditional privacy-preserving and desynchronization-resistant authentication protocol for VANET. The proposed protocol is appropriate with present and future generation mobile networks as it is based on symmetric key cryptography. The protocol employs an efficient approach to address forward/backward secrecy. In addition, our protocol does not require any re-synchronization between the communicating parties under desynchronization attack. We have verified the security properties using formal and informal analysis. Finally, a comparative performance analysis has been presented to show its efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available