VANET authentication protocols: security analysis and a proposal

被引:0
|
作者
Otto B. Piramuthu
Matthew Caesar
机构
[1] University of Illinois at Urbana-Champaign,Computer Science
来源
关键词
VANET; Authentication; Vulnerabilities;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless communication among vehicular ad hoc network (VANET) entities is secured through cryptography, which is used for authentication as well as to ensure the overall security of messages in this environment. Authentication protocols play a significant role and are therefore required to be free of vulnerabilities that allow entity impersonation, unauthorized entry, and general misuse of the system. A resourceful adversary can inflict serious damage to VANET systems through such vulnerabilities. We consider several VANET authentication protocols in the literature and identify vulnerabilities. In addition to the commonly considered vulnerabilities in VANETs, we observe that the often-overlooked relay attack is possible in almost all VANET authentication protocols. Relay attacks have the potential to cause damage in VANETs through misrepresentation of vehicle identity, telematic data, traffic-related warnings, and information related to overall safety in such networks. We discuss possible countermeasures to address identified vulnerabilities. We then develop an authentication protocol that uses ambient conditions to secure against relay attacks and other considered vulnerabilities. We include security proof for the proposed protocol.
引用
收藏
页码:2153 / 2179
页数:26
相关论文
共 50 条
  • [1] VANET authentication protocols: security analysis and a proposal
    Piramuthu, Otto B.
    Caesar, Matthew
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2153 - 2179
  • [2] A Survey of Authentication Protocols in VANET
    Chen, Chin-Ling
    Chen, Yue-Xun
    Lee, Chin-Feng
    Deng, Yong-Yuan
    [J]. ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 572 - 577
  • [3] Lightweight VANET Authentication Protocols
    Piramuthu, Otto B.
    Caesar, Matthew
    [J]. 37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1975 - 1978
  • [4] VANET Security Analysis on the Basis of Attacks in Authentication
    Siddiqui, Nimra Rehman
    Khaliq, Kishwer Abdul
    Pannek, Juergen
    [J]. DYNAMICS IN LOGISTICS, LDIC 2016, 2017, : 491 - 502
  • [5] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [6] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    [J]. New Generation Computing, 2001, 19 : 283 - 299
  • [7] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [8] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    [J]. SN Computer Science, 4 (5)
  • [9] A secure analysis of vehicular authentication security scheme of RSUs in VANET
    Kim, Yongchan
    Lee, Jongkun
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (03): : 145 - 150
  • [10] Security Analysis of ECC Based Authentication Protocols
    Khatwani, Chanchal
    Roy, Swapnoneel
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1167 - 1172