A Novel MAC-Based Authentication Scheme (NoMAS) for Internet of Vehicles (IoV)

被引:11
|
作者
Sikarwar, Himani [1 ]
Das, Debasis [1 ]
机构
[1] Indian Inst Technol IIT, Dept Comp Sci & Engn, Jodhpur 342030, India
关键词
Authentication; Side-channel attacks; Passwords; Internet of Vehicles; Computational modeling; Quality of service; Privacy; Internet of vehicles (IoV); anonymous authentication; privacy preservation; security and privacy in IoV; MAC-based authentication; intelligent transportation system (ITS); KEY AGREEMENT PROTOCOL; LIGHTWEIGHT AUTHENTICATION; DESIGN; EFFICIENT;
D O I
10.1109/TITS.2023.3242291
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The fully dynamic dense environment of the Internet of Vehicles (IoV) and conditions like high traffic jams, collisions, and uneven road conditions increase the communication messages. Consequently, the computation and communication costs of the IoV network are increased. Therefore, IoV needs a lightweight and efficient security solution along with effective communications. Existing state-of-the-art schemes in IoV are generally based on cryptographic methods that use session keys, public keys, elliptic curves, and Message Authentication Codes (MAC). In contrast to the other schemes, MAC-based schemes provide feasible security solutions having high performance with less overhead. The existing MAC-based authentication schemes are vulnerable to the key disclosure issue along with some security attacks such as side-channel attacks, Distributed Denial of Services (DDoS), etc. Due to the side channel attack, a data leakage problem occurs, which is a serious concern in security and privacy facets. We propose a novel MAC-based authentication scheme (NoMAS) that mitigates the above-discussed challenges and provides all the benefits of MAC-based schemes. The NoMAS scheme offers a solution for key disclosure issues by providing Hard Key and Soft Key Updates (HKU and SKU) and data leakage problems using encryption along with high performance. It reduces the computational overhead maximum to 99.60% and the communication overhead maximum to approximately 81% compared to the existing schemes. In the security analysis, We have provided the formal security proof using BAN logic and the ProVerif tool and verified the correctness of the scheme.
引用
收藏
页码:4904 / 4916
页数:13
相关论文
共 50 条
  • [41] ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV
    Xi, Ning
    Li, Weihui
    Jing, Lv
    Ma, Jianfeng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22903 - 22913
  • [42] ReTrust: reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IoV)
    Tripathi, Kuldeep Narayan
    Yadav, Ashish Mohan
    Nagar, Surendra
    Sharma, S. C.
    WIRELESS NETWORKS, 2023, 29 (06) : 2551 - 2575
  • [43] Sec-IoV: A Multi-Stage Anomaly Detection Scheme for Internet of Vehicles
    Garg, Sahil
    Kaur, Kuljeet
    Kaddoum, Georges
    Gagnon, Francois
    Kumar, Neeraj
    Han, Zhu
    PROCEEDINGS OF THE 2019 ACM MOBIHOCWORKSHOP ON PERVASIVE SYSTEMS IN THE IOT ERA (PERSIST-IOT '19), 2019, : 37 - 42
  • [44] ReTrust: reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IoV)
    Kuldeep Narayan Tripathi
    Ashish Mohan Yadav
    Surendra Nagar
    S. C. Sharma
    Wireless Networks, 2023, 29 : 2551 - 2575
  • [45] Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding"
    Li, Chen
    Lu, Rongxing
    Li, Hui
    Chen, Le
    Li, Xiaoqing
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (12) : 2129 - 2132
  • [46] Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO)
    Aadil, Farhan
    Ahsan, Waleed
    Rehman, Zahoor Ur
    Shah, Peer Azmat
    Rho, Seungmin
    Mehmood, Irfan
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4542 - 4567
  • [47] OTP Bidirectional Authentication Scheme Based on MAC Address
    Xu, Jingai
    Qi, Jiang
    Ye, Xi
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1148 - 1152
  • [48] Design of Internet of Vehicles (IoV) based Vehicle to Vehicle Communication System
    Nagaraj, P.
    Muneeswann, V
    Haneesh, G.
    Sripadh, M.
    Chaitanya, S.
    Ganesh, C.
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 964 - 968
  • [49] Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO)
    Farhan Aadil
    Waleed Ahsan
    Zahoor Ur Rehman
    Peer Azmat Shah
    Seungmin Rho
    Irfan Mehmood
    The Journal of Supercomputing, 2018, 74 : 4542 - 4567
  • [50] Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems
    Bojjagani, Sriramulu
    Reddy, Y. C. A. Padmanabha
    Anuradha, Thati
    Rao, P. V. Venkateswara
    Reddy, B. Ramachandra
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (12) : 24698 - 24713