Rawat, G.S. and Singh, K. and Arshad, N.I. and Hadidi, K. and Ahmadian, A. (2022) A lightweight authentication scheme with privacy preservation for vehicular networks. Computers and Electrical Engineering, 100.
Full text not available from this repository.Abstract
The vehicular ad-hoc network relies on wireless communication, thus exposing security and privacy-related issues. The primary security requirements in a vehicular network are vehicle authentication, message integrity, and privacy preservation. Most of the existing state-of-the-art security schemes heavily relied on infrastructural entities such as roadside units and trusted authorities to achieve authentication. Typically, frequent authentication involving infrastructural entities increases communication overhead. Besides, the existing solutions assume the usage of ideal tamper-proof devices for storing sensitive data, which is prone to physical and cloning attacks. In this context, we present a Physically Unclonable Function based Lightweight Authentication Scheme with privacy preservation for vehicle-to-vehicle communication in the vehicular network. Physically unclonable function adds an extra layer of security from cloning and physical attacks. The proposed method uses a two-tier approach consisting of trusted authority and vehicles for achieving authentication using lightweight bitwise XOR operations and one-way hash functions. The proposed scheme reduces the burden on infrastructural entities by performing authentication through vehicle-to-vehicle communication. Compared with state-of-the-art schemes, the proposed scheme's security and performance analysis demonstrates its effectiveness in meeting various security requirements while ensuring resilience against various known attacks and competitive communication and computation cost. © 2022 Elsevier Ltd
Item Type: | Article |
---|---|
Impact Factor: | cited By 0 |
Uncontrolled Keywords: | Cloning; Hash functions; Network security; Vehicle to vehicle communications; Vehicles; Vehicular ad hoc networks, Authentication scheme; Conditional privacies; Conditional privacy-preserving; Lightweight authentication; Privacy preservation; Privacy preserving; PUF; V2V communications; VANET; Vehicular networks, Authentication |
Depositing User: | Ms Sharifah Fahimah Saiyed Yeop |
Date Deposited: | 06 Jul 2022 07:55 |
Last Modified: | 06 Jul 2022 07:55 |
URI: | http://scholars.utp.edu.my/id/eprint/33109 |