0% found this document useful (0 votes)
46 views20 pages

Light Weight VANET Authentication

This document proposes a new authentication protocol called PLVA for vehicle-to-infrastructure communication in VANETs. PLVA uses homomorphic encryption to allow vehicles to query a certificate authority about upcoming roadside units on their predicted route while preserving route privacy. It consists of an initial phase where keys are generated, a registration phase, a query phase where vehicles encrypt and send predicted routes to the CA, and an authentication phase where vehicles authenticate with roadside units using keys from the CA. The goal of PLVA is to provide efficient authentication for vehicles while maintaining message integrity, confidentiality, anonymity of identities, and privacy of route plans.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views20 pages

Light Weight VANET Authentication

This document proposes a new authentication protocol called PLVA for vehicle-to-infrastructure communication in VANETs. PLVA uses homomorphic encryption to allow vehicles to query a certificate authority about upcoming roadside units on their predicted route while preserving route privacy. It consists of an initial phase where keys are generated, a registration phase, a query phase where vehicles encrypt and send predicted routes to the CA, and an authentication phase where vehicles authenticate with roadside units using keys from the CA. The goal of PLVA is to provide efficient authentication for vehicles while maintaining message integrity, confidentiality, anonymity of identities, and privacy of route plans.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

PLVA: Privacy-Preserving and Lightweight V2I

Authentication Protocol

By Songzhan Lv and Yining Liu

Abdullah Al Mamun(SH-25)
Introduction

❖ (VANETs) significantly improves the efficiency and safety


❖ The necessary security guaranteed using cryptographic method
❖ The computation overhead of authentication affects the system
❖ Need computation efficiency in VANETs protocol
❖ This paper proposed efficient authentication protocol
Introduction

❖ (PLVA) protocol
❖ BGN(Boneh, Goh, and Nissim) homomorphic encryption
❖ Vehicle obtains RSU’s information on its path before starting a trip.
❖ fast authentication is achieved when entering RSU’s coverage,
❖ Protect the route privacy.
Preliminaries: System Model
● CA: Semi-trusted. CA maybe tries to deduce the valuable information with the
legally received messages. In addition, as the manager of VANETs, CA stores
RSU information, and helps RSU to authenticate the vehicle.
● RSU: RSU receives and relays the message from a vehicle within its
coverage.
● Vehicles: Vehicle equipped with OBU and TPD modules exchanges the
message to RSU and CA, and TPD stores the private information and
executes secure computing.
System Model Diagram
Preliminaries: Design Goals

● Message integrity:
● Message confidentiality:
● Identity anonymity:
● Route plan privacy:
PLVA Proposed Scheme

● Initial Phase
● Registration Phase
● Query Phase
● Authentication Phase
Proposed Scheme: Initial Phase
Proposed Scheme: Initial Phase
1. CA generates public and secret key pair and issues RSU number to RSU.
2. RSUi selects its symmetric encryption key as the authentication key, then
sends it to CA. The key is updated periodically every day.
3. CA uses Moore curve to process the actual map so that there are n cells in
the actual map, and each cell owns its label and a RSUi and sets road info
and authentication key of each RSU in each cell.
4. CA publishes the actual map using Moore curve and other info like public
key to other entities, and privately keeps secret key and encryption key
info.
Proposed Scheme: Registration Phase
Proposed Scheme: Registration Phase
1. Vehicleʼs TPD generates some parameters and publishes public key(PID) but keeps
secret key.
2. TPD selects a random number.
3. Sends the random number and IDv (real vehicular identity) to CA.
4. CA verifies the vehicleʼs identity, and generates pseudonym PIDv for vehicleʼs IDv.
5. CA generates a hash chain from initial random number to given random number.
6. CA writes PIDv, the hash chain and Password(PWD) to each vehicle, meantime
stores them, where PWD is randomly selected by CA.
Proposed Scheme: Query Phase
Proposed Scheme: Query Phase
1. Each vehicle’s TPD uses Dijkstra algorithm to predict its path on the actual map.
If a cell is passed, it is set to 1, otherwise, it is 0. Then TPD uses Moore curves to
transform the map into a sequence L. TPD uses BGN(a homomorphic
encryption scheme) to encrypt the sequence L.
2. If Encrypted sequence is directly sent to CA, vehicle’s trajectory can be easily
inferred by CA with it’s previous queries. TPD selects a random value and
rotates encrypted sequence by that value and creates Ep.
3. TPD computes temporary pseudonym from RSU number, PID and random
number.
4. TPD encrypted it’s query message using temporary pseudonym , password,
sequence ,IDv public key, timestamp. Then sends it to CA.
Proposed Scheme: Query Phase
5. CA checks if the message is correct then decrypts to obtain PWD and IDV .
6. CA sends encrypted reply message with the info of RSU and new timestamp
to vehicle.
7. Vehicle checks if the message is correct, then accepts it. Vehicle then
decrypts the message to find info of RSU it will pass.
Proposed Scheme: Authentication Phase
Proposed Scheme: Authentication Phase
Once the authentication key of RSU is obtained by vehicles, fast authentication is
achieved between RSU and vehicle’s OBU.
1. TPD computes temporary pseudonym SPIDv from PIDv , RSU number and
random number.
2. TPD computes Message using SPIDv ,PID , RSU number ,random number
and symmetric encryption key then sends to RSU.
3. RSU checks the symmetric encryption of encryption key and decrypts the
message to recieve RSU number, SPIDv and random number. If RSU
number is correct it authenticates vehicle and sends a message to it.
4. Vehicle checks if message is correct or not. If correct then authentication
succeeds, else it fails.
Security Analysis

● Message Integrity:
● Message confidentiality:
● Identity anonymity:
● Route Privacy:
Route plan privacy
Route plan privacy

❖ CA helps a vehicle to obtain RSUsʼ information on its path


❖ Knows nothing about which RSUʼs information has been deduced.
❖ CA knows vehicles real information
❖ RSU knows the current state of the vehicle
❖ If RSU and CA collude real information and present state will be revealed
and vehicle trajectory can be easily inferred.
THANK YOU

You might also like