4.5 Article

An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy

Journal

JOURNAL OF SUPERCOMPUTING
Volume 79, Issue 7, Pages 8070-8096

Publisher

SPRINGER
DOI: 10.1007/s11227-022-04978-3

Keywords

Authentication; Revocation; Re-registration; Anonymity; Security; V2I communication

Ask authors/readers for more resources

This paper proposes an anonymous and authenticated V2I communication protocol with a simplified strategy for user revocation and re-registration. The protocol ensures security using hash-based security and Elliptic Curve Discrete Logarithmic Problem (ECDLP). The paper provides formal and informal security analysis, as well as employs AVISPA tool-based automated simulation to ensure security. The performance analysis shows that the proposed protocol has higher security and privacy factors compared to similar protocols.
Vehicle-to-Infrastructure (V2I) communication is the key requirement in various applications of Vehicular Ad-hoc Network (VANET). However, due to the use of unguided media, V2I communication may suffer from threat to security, privacy, and application data confidentiality. Besides, user revocation and re-registration also play important roles to manage the subscriber's service validity. Recently, many protocols have been discussed to secure V2I communication. Unfortunately, none could fulfill the desired goals. Additionally, most of the existing protocols does not address user revocation and re-registration. In this paper, we propose an anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy. The security of the protocol under attacks (passive/active) is ensured using hash-based security and Elliptic Curve Discrete Logarithmic Problem (ECDLP). We discuss a simplified approach for user revocation and re-registration which relaxes the use of a separate revocation list. Additionally, our protocol concentrates on the anonymity of roadside units. We present both formal and informal security analysis to prove the robustness of the protocol under security attacks. The formal security analysis is done based on eavesdropping, forward/backward secrecy, and many other active attacks (e.g., ESL attack, password guessing attack, etc.), whereas the informal security analysis is done based on various security and privacy parameters such as privacy of VU and RSU, forward/backward secrecy, conditional privacy, and many other active/passive attacks. Besides, we employ AVISPA tool-based automated simulation to ensure the security under replay, man-in-the-middle, and impersonation attacks. The performance analysis section illustrates that our protocol preserves increased security and privacy factors than other similar protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available