Survey on existing authentication issues for cellular-assisted V2X communication

Abstract The integration of Internet of Things (IoT) into cellular network infrastructure is gaining much attention from the research community and standardisation groups, where new cellular-based enabling communication technologies are proposed to provide data links over existing cellular networks for IoT deployment. The Long Term Evolution (LTE) network and the emerging 5G system (New Radio) are widely acknowledged as the main driving forces for the connected-vehicle in the mobile network domain. On the other hand, vehicular networks are characterised by high mobility, high node density, dynamic network topology, time sensitivity and high transmission reliability. These unique characteristics of vehicular networks introduce new security implications and therefore, necessitate enhancement of existing LTE security or provision of new security techniques, in order to ensure fast, secure and reliable vehicular communications under mobile network. In this paper, an introduction to Vehicle to Everything (V2X) communications and services alongside the corresponding service requirement is presented. Then, the potential benefits of using cellular infrastructure for V2X services and the reference architectures for cellular-based V2X systems are described. We then focus on the security requirements of V2X in cellular network, specifically; on the authentication of V2X entities, as any violation or breach of authentication process can expose the entire network to serious consequences. The paper discusses common V2X threats and surveys existing V2X authentication solutions proposed in the literature. Finally, paper presents security issues related to V2X communication in cellular network leading towards possible research challenges.

[1]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[2]  Antonio Iera,et al.  LTE for vehicular networking: a survey , 2013, IEEE Communications Magazine.

[3]  Vuk Marojevic,et al.  Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing , 2015, 2015 IEEE Conference on Standards for Communications and Networking (CSCN).

[4]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[5]  Ciprian Racuciu,et al.  Improving LTE EPS-AKA using the security request vector , 2015, 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[6]  B. R. Chandavarkar,et al.  Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).

[7]  Hyoung-Kee Choi,et al.  A group-based security protocol for machine-type communications in LTE-advanced , 2013, Wireless Networks.

[8]  Xiaojiang Du,et al.  Secure Machine-Type Communications toward LTE Heterogeneous Networks , 2017, IEEE Wireless Communications.

[9]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[10]  Dawu Gu,et al.  PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications , 2016, IEEE Transactions on Dependable and Secure Computing.

[11]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Hossam Afifi,et al.  Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[13]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[14]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[15]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[16]  Lejla Batina,et al.  New directions in IoT privacy using attribute-based authentication , 2016, Conf. Computing Frontiers.

[17]  Geir M. Køien Mutual entity authentication for LTE , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[18]  Rittwik Jana,et al.  An IoT control plane model and its impact analysis on a virtualized MME for connected cars , 2016, 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN).

[19]  Liang Hu,et al.  Unified Device-to-Device Communications for Low-Latency and High Reliable Vehicle-to-X Services , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[20]  Hyoung-Kee Choi,et al.  Improvement of security protocol for Machine Type Communications in LTE-advanced , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[21]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[22]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[23]  Bassam S. Farroha,et al.  Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions , 2016, SPIE Defense + Security.

[24]  Maode Ma,et al.  An efficient authentication framework over heterogeneous vehicular networks , 2016, 2016 IEEE International Conference on Communication Systems (ICCS).

[25]  Gicheol Wang,et al.  Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication Network , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[26]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[27]  D. Manivannan,et al.  An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks , 2016, Veh. Commun..

[28]  Mohammed Aly Abdrabou,et al.  LTE Authentication Protocol (EPS-AKA) weaknesses solution , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).

[29]  Adil Mudasir Malla,et al.  Security Attacks with an Effective Solution for DOS Attacks in VANET , 2013 .

[30]  Fredrik Gunnarsson,et al.  LTE release 14 outlook , 2016, IEEE Communications Magazine.

[31]  Jaiyong Lee,et al.  State transition latency reduction scheme in the LTE/LTE-A radio access network , 2017, 2017 International Conference on Information Networking (ICOIN).

[32]  Weihua Zhuang,et al.  Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey , 2016, IEEE Transactions on Vehicular Technology.

[33]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[34]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[35]  Jin Cao,et al.  A group-based authentication and key agreement for MTC in LTE networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[36]  Thomas Kürner,et al.  LTE link level performance evaluation using stochastic channel models for V2X communication , 2015, 2015 IEEE Vehicular Networking Conference (VNC).

[37]  Gary Steri,et al.  Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).

[38]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[39]  Michael Segal,et al.  Optical PUF for Non Forwardable Vehicle Authentication , 2015, 2015 IEEE 14th International Symposium on Network Computing and Applications.

[40]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[41]  Ciprian Dobre,et al.  Analysis of Security Approaches for Vehicular Ad-Hoc Networks , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[42]  Elyes Ben Hamida,et al.  Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .

[43]  Neetesh Saxena,et al.  Authentication Protocol for an IoT-Enabled LTE Network , 2016, ACM Trans. Internet Techn..

[44]  Eun-Kyu Lee,et al.  LTE Network Enhancement for Vehicular Safety Communication , 2017, Mob. Inf. Syst..

[45]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[46]  Andreas Kunz,et al.  Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[47]  Erik G. Ström,et al.  Cluster-Based Radio Resource Management for D2D-Supported Safety-Critical V2X Communications , 2016, IEEE Transactions on Wireless Communications.

[48]  Li Zhao,et al.  Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.

[49]  Jun Zhang,et al.  A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.

[50]  Junqi Guo,et al.  Adaptive power and access control for physical security of heterogeneous cellular network , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[51]  Xin-She Yang,et al.  On the Handover Security Key Update and Residence Management in LTE Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[52]  Sunilkumar S. Manvi,et al.  A survey on authentication schemes in VANETs for secured communication , 2017, Veh. Commun..

[53]  Jacques Bou Abdo,et al.  Ensured confidentiality authentication and key agreement protocol for EPS , 2012, 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA).

[54]  Li He,et al.  Mitigating DoS attacks against signature-based authentication in VANETs , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[55]  Yongjun Wang,et al.  Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[56]  Jeffrey H. Reed,et al.  Enhancing the Robustness of LTE Systems: Analysis and Evolution of the Cell Selection Process , 2017, IEEE Communications Magazine.

[57]  Mandeep Singh Saini,et al.  A robust 4G/LTE network authentication for realization of flexible and robust security scheme , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[58]  Mi Wen,et al.  Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks , 2016, IEEE Internet of Things Journal.

[59]  Markus Rupp,et al.  Society in motion: challenges for LTE and beyond mobile communications , 2016, IEEE Communications Magazine.

[60]  Hong Liu,et al.  Message authentication in driverless cars , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).

[61]  Mate Boban,et al.  Design aspects for 5G V2X physical layer , 2016, 2016 IEEE Conference on Standards for Communications and Networking (CSCN).

[62]  Arvinder Kaur,et al.  Dyanimc key based authentication scheme for Vehicular Cloud Computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[63]  Li Zhao,et al.  Support for vehicle-to-everything services based on LTE , 2016, IEEE Wireless Communications.

[64]  Yu Cheng,et al.  Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.