A Novel MAC-Based Authentication Scheme (NoMAS) for Internet of Vehicles (IoV)

被引:17
|
作者
Sikarwar, Himani [1 ]
Das, Debasis [1 ]
机构
[1] Indian Inst Technol IIT, Dept Comp Sci & Engn, Jodhpur 342030, India
关键词
Authentication; Side-channel attacks; Passwords; Internet of Vehicles; Computational modeling; Quality of service; Privacy; Internet of vehicles (IoV); anonymous authentication; privacy preservation; security and privacy in IoV; MAC-based authentication; intelligent transportation system (ITS); KEY AGREEMENT PROTOCOL; LIGHTWEIGHT AUTHENTICATION; DESIGN; EFFICIENT;
D O I
10.1109/TITS.2023.3242291
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The fully dynamic dense environment of the Internet of Vehicles (IoV) and conditions like high traffic jams, collisions, and uneven road conditions increase the communication messages. Consequently, the computation and communication costs of the IoV network are increased. Therefore, IoV needs a lightweight and efficient security solution along with effective communications. Existing state-of-the-art schemes in IoV are generally based on cryptographic methods that use session keys, public keys, elliptic curves, and Message Authentication Codes (MAC). In contrast to the other schemes, MAC-based schemes provide feasible security solutions having high performance with less overhead. The existing MAC-based authentication schemes are vulnerable to the key disclosure issue along with some security attacks such as side-channel attacks, Distributed Denial of Services (DDoS), etc. Due to the side channel attack, a data leakage problem occurs, which is a serious concern in security and privacy facets. We propose a novel MAC-based authentication scheme (NoMAS) that mitigates the above-discussed challenges and provides all the benefits of MAC-based schemes. The NoMAS scheme offers a solution for key disclosure issues by providing Hard Key and Soft Key Updates (HKU and SKU) and data leakage problems using encryption along with high performance. It reduces the computational overhead maximum to 99.60% and the communication overhead maximum to approximately 81% compared to the existing schemes. In the security analysis, We have provided the formal security proof using BAN logic and the ProVerif tool and verified the correctness of the scheme.
引用
收藏
页码:4904 / 4916
页数:13
相关论文
共 50 条
  • [21] IPS: Incentive and Punishment Scheme for Omitting Selfishness in the Internet of Vehicles (Iov)
    Ghani-Ur-Rehman
    Ghani, Anwar
    Zubair, Muhammad
    Naqvi, Syed Husnain A.
    Singh, Dhananjay
    Muhammad, Shad
    IEEE ACCESS, 2019, 7 : 109026 - 109037
  • [22] Homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding
    ZHANG Yujie
    CAI Ying
    LI Zhuo
    FAN Yanfang
    Wuhan University Journal of Natural Sciences, 2013, 18 (05) : 435 - 442
  • [23] A MAC-based Scheme for Multi-Generation Content Distribution with Network Coding
    Zhang, Yu
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 1256 - 1260
  • [24] A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles
    Zheng, Jing
    Wang, Xiaoliang
    Yang, Qing
    Xiao, Wenhui
    Sun, Yapeng
    Liang, Wei
    CONNECTION SCIENCE, 2022, 34 (01) : 1430 - 1453
  • [25] Ultra Reliable and Low Latency Authentication Scheme for Internet of Vehicles Based on Blockchain
    Yang, Xiangyue
    Luo, Haoxiang
    Duan, Jingshan
    Yu, Hongfang
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [26] Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles
    Adil, Muhammad
    Ali, Jehad
    Attique, Muhammad
    Jadoon, Muhammad Mohsin
    Abbas, Safia
    Alotaibi, Sattam Rabia
    Menon, Varun G.
    Farouk, Ahmed
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 9358 - 9369
  • [27] Blockchain-Based Method for Pre-Authentication and Handover Authentication of IoV Vehicles
    Li, Qiang
    Su, Wenlong
    Zhang, Peng
    Cheng, Xinzhou
    Li, Mingxin
    Liu, Yuanni
    ELECTRONICS, 2023, 12 (01)
  • [28] A novel broadcast authentication protocol for internet of vehicles
    Ruan, Na
    Li, Mengyuan
    Li, Jie
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (06) : 1331 - 1343
  • [29] A novel broadcast authentication protocol for internet of vehicles
    Na Ruan
    Mengyuan Li
    Jie Li
    Peer-to-Peer Networking and Applications, 2017, 10 : 1331 - 1343
  • [30] A Novel Homomorphic MAC Scheme for Authentication in Network Coding
    Cheng, Chi
    Jiang, Tao
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (11) : 1228 - 1230