Light Weight VANET Authentication
Light Weight VANET Authentication
Authentication Protocol
Abdullah Al Mamun(SH-25)
Introduction
❖ (PLVA) protocol
❖ BGN(Boneh, Goh, and Nissim) homomorphic encryption
❖ Vehicle obtains RSU’s information on its path before starting a trip.
❖ fast authentication is achieved when entering RSU’s coverage,
❖ Protect the route privacy.
Preliminaries: System Model
● CA: Semi-trusted. CA maybe tries to deduce the valuable information with the
legally received messages. In addition, as the manager of VANETs, CA stores
RSU information, and helps RSU to authenticate the vehicle.
● RSU: RSU receives and relays the message from a vehicle within its
coverage.
● Vehicles: Vehicle equipped with OBU and TPD modules exchanges the
message to RSU and CA, and TPD stores the private information and
executes secure computing.
System Model Diagram
Preliminaries: Design Goals
● Message integrity:
● Message confidentiality:
● Identity anonymity:
● Route plan privacy:
PLVA Proposed Scheme
● Initial Phase
● Registration Phase
● Query Phase
● Authentication Phase
Proposed Scheme: Initial Phase
Proposed Scheme: Initial Phase
1. CA generates public and secret key pair and issues RSU number to RSU.
2. RSUi selects its symmetric encryption key as the authentication key, then
sends it to CA. The key is updated periodically every day.
3. CA uses Moore curve to process the actual map so that there are n cells in
the actual map, and each cell owns its label and a RSUi and sets road info
and authentication key of each RSU in each cell.
4. CA publishes the actual map using Moore curve and other info like public
key to other entities, and privately keeps secret key and encryption key
info.
Proposed Scheme: Registration Phase
Proposed Scheme: Registration Phase
1. Vehicleʼs TPD generates some parameters and publishes public key(PID) but keeps
secret key.
2. TPD selects a random number.
3. Sends the random number and IDv (real vehicular identity) to CA.
4. CA verifies the vehicleʼs identity, and generates pseudonym PIDv for vehicleʼs IDv.
5. CA generates a hash chain from initial random number to given random number.
6. CA writes PIDv, the hash chain and Password(PWD) to each vehicle, meantime
stores them, where PWD is randomly selected by CA.
Proposed Scheme: Query Phase
Proposed Scheme: Query Phase
1. Each vehicle’s TPD uses Dijkstra algorithm to predict its path on the actual map.
If a cell is passed, it is set to 1, otherwise, it is 0. Then TPD uses Moore curves to
transform the map into a sequence L. TPD uses BGN(a homomorphic
encryption scheme) to encrypt the sequence L.
2. If Encrypted sequence is directly sent to CA, vehicle’s trajectory can be easily
inferred by CA with it’s previous queries. TPD selects a random value and
rotates encrypted sequence by that value and creates Ep.
3. TPD computes temporary pseudonym from RSU number, PID and random
number.
4. TPD encrypted it’s query message using temporary pseudonym , password,
sequence ,IDv public key, timestamp. Then sends it to CA.
Proposed Scheme: Query Phase
5. CA checks if the message is correct then decrypts to obtain PWD and IDV .
6. CA sends encrypted reply message with the info of RSU and new timestamp
to vehicle.
7. Vehicle checks if the message is correct, then accepts it. Vehicle then
decrypts the message to find info of RSU it will pass.
Proposed Scheme: Authentication Phase
Proposed Scheme: Authentication Phase
Once the authentication key of RSU is obtained by vehicles, fast authentication is
achieved between RSU and vehicle’s OBU.
1. TPD computes temporary pseudonym SPIDv from PIDv , RSU number and
random number.
2. TPD computes Message using SPIDv ,PID , RSU number ,random number
and symmetric encryption key then sends to RSU.
3. RSU checks the symmetric encryption of encryption key and decrypts the
message to recieve RSU number, SPIDv and random number. If RSU
number is correct it authenticates vehicle and sends a message to it.
4. Vehicle checks if message is correct or not. If correct then authentication
succeeds, else it fails.
Security Analysis
● Message Integrity:
● Message confidentiality:
● Identity anonymity:
● Route Privacy:
Route plan privacy
Route plan privacy