Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs

被引:7
|
作者
Shawky, Mahmoud A. [1 ]
Usman, Muhammad [2 ]
Imran, Muhammad Ali [1 ]
Abbasi, Qammer H. [1 ]
Ansari, Shuja [1 ]
Taha, Ahmad [1 ]
机构
[1] Univ Glasgow, James Watt Sch Engn, Glasgow G12 8QQ, Scotland
[2] Glasgow Caledonian Univ, Sch Comp Engn & Built Environm, Glasgow G4 0BA, Scotland
基金
英国工程与自然科学研究理事会;
关键词
Chebyshev chaotic mapping; Cross-layer authentication; Doppler emulation; Physical-layer signatures; Secret key extraction; Vehicular ad-hoc networks; PHYSICAL-LAYER; CHANNEL ESTIMATION; SCHEME; SECURE;
D O I
10.1016/j.vehcom.2022.100547
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Vehicle-to-everything (V2X) communication is expected to offer users available and ultra-reliable transmission, particularly for critical applications related to safety and autonomy. In this context, establishing a secure and resilient authentication process with low latency and high functionality may not be achieved using conventional cryptographic methodologies due to their significant computation costs. Recent research has focused on employing the physical (PHY) characteristics of wireless channels to develop efficient discrimination techniques to overcome the shortcomings of crypto-based authentication. This paper presents a cross-layer authentication scheme for multicarrier communication, leveraging the spatially/temporally correlated wireless channel features to facilitate key verification without exposing its secrecy. By mapping the time-stamped hashed key and masking it with channel phase responses, we create a PHY-layer signature, allowing for verifying the sender's identity while employing the correlated channel responses between subcarriers to verify messages' integrity. Furthermore, we developed a Diffie-Hellman secret key extraction algorithm that employs the computationally intractable problems of the Chebyshev chaotic mapping for channel probing. Thus, terminals can extract high entropy shared keys that can be used to create dynamic PHY-layer signatures, supporting forward and backward secrecy. We evaluated the scheme's security strength against active/passive attacks. Besides theoretical analysis, we designed a 3-Dimensional (3D) scattering Doppler emulator to investigate the scheme's performance at different speeds of a moving vehicle and signal-to-noise ratios (SNRs) for a realistic vehicular channel. Theoretical and hardware implementation analyses proved the capability of the proposed scheme to support high detection probability at SNR >= 0 dB and speed <= 45 m/s.(c) 2022 The Author(s). Published by Elsevier Inc.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
    Zhou, Yousheng
    Zhou, Junfeng
    Wang, Feng
    Guo, Feng
    [J]. APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING, 2016, 2016
  • [2] Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
    Ryu, Jihyeon
    Kang, Dongwoo
    Won, Dongho
    [J]. IEEE ACCESS, 2022, 10 : 15891 - 15910
  • [3] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [4] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder Dharminder
    Nibedita Kundu
    Dheerendra Mishra
    [J]. Journal of Medical Systems, 2021, 45
  • [5] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder, Dharminder
    Kundu, Nibedita
    Mishra, Dheerendra
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2021, 45 (08)
  • [6] Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
    Wang, Guojun
    Liu, Qi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4471 - 4488
  • [7] Blockchain-based secret key extraction for efficient and secure authentication in VANETs
    Shawky, Mahmoud A.
    Usman, Muhammad
    Flynn, David
    Imran, Muhammad Ali
    Abbasi, Qammer H.
    Ansari, Shuja
    Taha, Ahmad
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [8] An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment
    Yu, Yicheng
    Taylor, Oliver
    Li, Rui
    Sunagawa, Baiho
    [J]. MATHEMATICS, 2021, 9 (08)
  • [9] Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Roy, Sandip
    Chatterjee, Santanu
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 527 - 537
  • [10] Attacks and improvements to chaotic map-based RFID authentication protocol
    Akgun, Mete
    Bayrak, Ali Osman
    Caglayan, Mehmet Ufuk
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4028 - 4040