Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges

Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial Intelligence (AI) awareness of other vehicles and their actions. IoV is connected in an adhoc networking environment which utilizes each vehicle in the network as a node, called Vehicular Ad Hoc Network (VANET), where the vehicles may be also connected to the public Internet. It is specifically important for the autonomous vehicles because they can instantaneously communicate with other vehicles surrounding them. In addition, safely avoiding accident prone zones is crucial in order to continue secure and smart transportation. Since the communication among various entities involved in the IoV environment is via open channel, it gives an opportunity to a passive/active adversary to intercept, modify, delete or even insert fake information during communication. It is then a serious concern for the vehicles users to determine whether the received information is genuine. In this survey paper, various security aspects, threats and attacks, network and threat models related to the IoV environment are discussed. Next, a taxonomy of security protocols is given that is essential to provide IoV data security. In particular, focus on various authentication protocols is given that is needed for mutual authentication among the involved entities in the IoV environment for secure communication. A detailed comparative analysis among various state-of-art authentication protocols proposed in the related IoV environment is provided to show their effectiveness as well as security and functionality features. Moreover, some testbeds are described that were designed and implemented for the IoV environment. In addition, some future challenges for IoV security protocols are also highlighted that are necessary to address in the future.

[1]  Tony Q. S. Quek,et al.  Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions , 2018, IEEE Transactions on Information Forensics and Security.

[2]  Athanasios V. Vasilakos,et al.  Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing , 2018, IEEE Journal of Biomedical and Health Informatics.

[3]  Zhili Sun,et al.  A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters , 2017, ICT Express.

[4]  Zhou Zhou,et al.  A practical intrusion detection system for Internet of vehicles , 2016, China Communications.

[5]  Tao Zhang,et al.  Security and Privacy in the Internet of Vehicles , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).

[6]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[7]  Baowen Xu,et al.  An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Shangguang Wang,et al.  An overview of Internet of Vehicles , 2014, China Communications.

[9]  Yanbing Liu,et al.  Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm , 2017, IEEE Transactions on Intelligent Transportation Systems.

[10]  Anil Kumar Sagar,et al.  Secure and Reliable Routing Protocols for VANETs , 2018, 2018 4th International Conference on Computing Communication and Automation (ICCCA).

[11]  Ryma Abassi,et al.  VANET security and forensics: Challenges and opportunities , 2019, WIREs Forensic Science.

[12]  K. Jayanthi,et al.  Secured Routing in VANETs Using Lightweight Authentication and Key Agreement Protocol , 2018, 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[13]  Arunita Jaekel,et al.  Review of potential security attacks in VANET , 2018, 2018 Majan International Conference (MIC).

[14]  Debasis Das,et al.  A Lightweight Authentication Protocol for V2V Communication in VANETs , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[15]  Chin-Teng Lin,et al.  Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects , 2016, IEEE Access.

[16]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[17]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[18]  P. Vasudeva Reddy,et al.  Efficient Pairing-Free Certificateless Authentication Scheme With Batch Verification for Vehicular Ad-Hoc Networks , 2018, IEEE Access.

[19]  Susana Sargento,et al.  Vehicular testbed management , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[20]  Albert Y. Zomaya,et al.  Blockchain for smart communities: Applications, challenges and opportunities , 2019, J. Netw. Comput. Appl..

[21]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[22]  Yining Liu,et al.  A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.

[23]  Mario Gerla,et al.  Internet of Vehicles: Enabling safe, secure, and private vehicular crowdsourcing , 2018, Internet Technol. Lett..

[24]  R. Sasikumar,et al.  An ID-Based Privacy Preservation for VANET , 2015, 2015 International Conference on Computing and Communications Technologies (ICCCT).

[25]  Min Xiao,et al.  An Efficient V2I Authentication Scheme for VANETs , 2018, Mob. Inf. Syst..

[26]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[27]  Mohammad Reza Aref,et al.  A secure authentication scheme for VANETs with batch verification , 2014, Wireless Networks.

[28]  Lilian Bossuet,et al.  Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[29]  Mohammad S. Obaidat,et al.  A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..

[30]  Kim-Kwang Raymond Choo,et al.  Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.

[31]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[32]  Hong Zhong,et al.  Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network , 2018, IEEE Internet of Things Journal.

[33]  Chin-Ling Chen,et al.  A Secure Official Vehicle Communication Protocol for VANET , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[34]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[35]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[36]  Ashok Kumar Das ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks , 2008, Int. J. Netw. Secur..

[37]  Athanasios V. Vasilakos,et al.  Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems , 2018, IEEE Transactions on Smart Grid.

[38]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[39]  Manu Bansal,et al.  A review on VANET security attacks and their countermeasure , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).

[40]  Kim-Kwang Raymond Choo,et al.  Parking Management: A Blockchain-Based Privacy-Preserving System , 2019, IEEE Consumer Electronics Magazine.

[41]  N. Edna Elizabeth,et al.  Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication , 2018, 2018 International Conference on Communication and Signal Processing (ICCSP).

[42]  Joel J. P. C. Rodrigues,et al.  SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.

[43]  K. Logeshwari,et al.  Authenticated anonymous secure on demand routing protocol in VANET (Vehicular adhoc network) , 2017, 2017 International Conference on Information Communication and Embedded Systems (ICICES).

[44]  Mohammed Erritali,et al.  A review and classification of various VANET Intrusion Detection Systems , 2013, 2013 National Security Days (JNS3).

[45]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[46]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[47]  Qassim Nasir,et al.  Systematic literature review on Internet-of-Vehicles communication security , 2018, Int. J. Distributed Sens. Networks.

[48]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[49]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[50]  Giovanni Pau,et al.  Creative testbeds for VANET research: A new methodology , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[51]  Alejandro Quintero,et al.  A flexible testbed architecture for VANET , 2017, Veh. Commun..

[52]  Sherali Zeadally,et al.  Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.

[53]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[54]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[55]  Xiwei Wang,et al.  A scalable and secure key distribution scheme for group signature based authentication in VANET , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).

[56]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[57]  Debatosh Debnath,et al.  Classification Approach for Intrusion Detection in Vehicle Systems , 2018 .

[58]  Willy Susilo,et al.  Secure Message Communication Protocol Among Vehicles in Smart City , 2018, IEEE Transactions on Vehicular Technology.

[59]  Sherali Zeadally,et al.  Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..

[60]  Heekuck Oh,et al.  A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET , 2016, IEEE Access.

[61]  Ashok Kumar Das,et al.  Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment , 2020, IEEE Transactions on Industrial Informatics.

[62]  Luminita Scripcariu,et al.  Security Issues in the Internet of Vehicles , 2018, 2018 International Conference on Communications (COMM).

[63]  Pabitra Mohan Khilar,et al.  A secure routing protocol for Vehicular Ad Hoc Network to provide ITS services , 2013, 2013 International Conference on Communication and Signal Processing.

[64]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[65]  Cheng-Chi Lee,et al.  Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..

[66]  Zibin Zheng,et al.  Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.

[67]  S. M. Muyeen,et al.  Blockchain Applications in Smart Grid–Review and Frameworks , 2019, IEEE Access.

[68]  Elaine B. Barker,et al.  Recommendation for key management: , 2019 .

[69]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[70]  Narottam Chand,et al.  Security challenges in Internet of Vehicles (IoV) environment , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).

[71]  Carsten Maple,et al.  Intrusion Detection Systems for Intra-Vehicle Networks: A Review , 2019, IEEE Access.

[72]  Xiumei Fan,et al.  Study of a Routing Algorithm of Internet of Vehicles Based on Selfishness , 2018, 2018 IEEE International Conference on Smart Internet of Things (SmartIoT).

[73]  Aziz Mohaisen,et al.  Grid-Based Key Pre-Distribution in Wireless Sensor Networks , 2009, KSII Trans. Internet Inf. Syst..

[74]  Xi Zhang,et al.  An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds , 2018, Sensors.

[75]  M. Lalli,et al.  Prediction based dual authentication model for VANET , 2017, 2017 International Conference on Computing Methodologies and Communication (ICCMC).

[76]  Donggang Liu,et al.  Using Auxiliary Sensors for Pairwise Key Establishment in WSN , 2012, TECS.

[77]  Vanga Odelu,et al.  Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks , 2017, IEEE Access.

[78]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[79]  Kim-Kwang Raymond Choo,et al.  BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system , 2019, Comput. Secur..

[80]  Joel J. P. C. Rodrigues,et al.  AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment , 2019, IEEE Internet of Things Journal.

[81]  Mario Gerla,et al.  Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[82]  Rajendra Gupta,et al.  Routing protocols in VANET — A survey , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[83]  Yaser Jararweh,et al.  Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions , 2019, IEEE Access.

[84]  Kim-Kwang Raymond Choo,et al.  Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..

[85]  Abdelfettah Belghith,et al.  TCSR: an AIMD Trust-based Protocol for Secure Routing in VANET , 2018, 2018 International Conference on Smart Communications and Networking (SmartNets).

[86]  Yang Ping,et al.  A message authentication scheme for VANETs based on trapdoor hash function , 2018, 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA).

[87]  G. Usha Devi,et al.  A survey on internet of vehicles: applications, technologies, challenges and opportunities , 2019, International Journal of Advanced Intelligence Paradigms.

[88]  Mohamed Azab,et al.  Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .

[89]  Ingrid Moerman,et al.  Suitability of the wireless testbed w-iLab.t for VANET research , 2011, 2011 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT).

[90]  Victor I. Chang,et al.  Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.

[91]  Donghyun Kim,et al.  Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds , 2018, IEEE Internet of Things Journal.

[92]  Suresh Kumar,et al.  The design of a secure key management system in vehicular ad hoc networks , 2017, 2017 Conference on Information and Communication Technology (CICT).

[93]  Mohsen Guizani,et al.  PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[94]  Yen-Fu Liu,et al.  Secure Communication Scheme of VANET with Privacy Preserving , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[95]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[96]  Basit Shafiq,et al.  A Random Decision Tree Framework for Privacy-Preserving Data Mining , 2014, IEEE Transactions on Dependable and Secure Computing.

[97]  Chin-Chen Chang,et al.  Blockchain based searchable encryption for electronic health record sharing , 2019, Future Gener. Comput. Syst..

[98]  Qing Yang,et al.  On the Security of Information Dissemination in the Internet-of-Vehicles , 2017 .

[99]  Jingbang Wu,et al.  A Hard Real-Time Testbed for Distributed TDMA-Based MAC Protocols in VANETs , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[100]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[101]  Donghyun Kim,et al.  PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability , 2015, Wirel. Commun. Mob. Comput..

[102]  Yuemin Ding,et al.  Blockchain-based decentralized and secure keyless signature scheme for smart grid , 2019, Energy.

[103]  Hugo Krawczyk,et al.  Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.

[104]  Giovanni Pau,et al.  Vehicular testbeds — Validating models and protocols before large scale deployment , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[105]  Saraswati Nagtilak,et al.  Internet of Vehicles:Motivation, Layered Architecture and Research Challenges , 2018, 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN).

[106]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[107]  Dharma P. Agrawal,et al.  Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[108]  Ashok Kumar Das A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks , 2012, International Journal of Information Security.