{"title":"LbPV: Lattice-based Privacy-preserving mutual authentication scheme for VANET","authors":"Himun Jyoti Nath, Hiten Choudhury","doi":"10.1016/j.compeleceng.2024.109765","DOIUrl":null,"url":null,"abstract":"<div><div>This study addresses the critical challenge of achieving reliable message exchange among vehicles in Vehicular Ad-hoc Networks (VANETs). It is crucial to quickly share safety messages, traffic updates, available services, and road conditions among vehicles in VANETs. For security reasons, messages must originate exclusively from authenticated vehicles, ensuring secure message exchange and data privacy. Numerous schemes for privacy-preserving authentication have been proposed, yet they suffer from constant service provider involvement and the requirement for vehicles to generate parameters on the fly. To address these challenges, this paper introduces LbPV, a secure lattice-based privacy-preserving mutual authentication scheme emphasizing the reliability of messages, preventing spoofing and unauthorized access. LbPV eliminates service provider monitoring and allows vehicles to authenticate messages without generating parameters while on the move. This is achieved by exchanging a confidential token using lattice-based encryption and message signing. By verifying the signed message and using the shared token, receiving vehicles can confirm the authenticity of the messages. By using lattice-based cryptography, the proposed protocol is also designed with the potential to resist future attacks, including quantum attacks, enhancing its long-term security viability. The security analysis of LbPV includes formal and informal evaluations that demonstrate its robustness. Performance evaluations using the NTL library show that LbPV, with service provider parameters, outperforms existing approaches in the literature. Results of performance analysis indicate that when compared to the most efficient traditional non-lattice-based scheme discussed in this paper, the proposed protocol has increased computation cost, communication cost, and power consumption by 77.71%, 98.58%, and 77.71%, respectively. Conversely, when compared to the most efficient lattice-based scheme discussed in this paper, the proposed scheme demonstrates reductions in computation cost, communication cost, and power consumption by 71.95%, 2.16%, and 71.95%, respectively.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109765"},"PeriodicalIF":4.0000,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S004579062400692X","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
This study addresses the critical challenge of achieving reliable message exchange among vehicles in Vehicular Ad-hoc Networks (VANETs). It is crucial to quickly share safety messages, traffic updates, available services, and road conditions among vehicles in VANETs. For security reasons, messages must originate exclusively from authenticated vehicles, ensuring secure message exchange and data privacy. Numerous schemes for privacy-preserving authentication have been proposed, yet they suffer from constant service provider involvement and the requirement for vehicles to generate parameters on the fly. To address these challenges, this paper introduces LbPV, a secure lattice-based privacy-preserving mutual authentication scheme emphasizing the reliability of messages, preventing spoofing and unauthorized access. LbPV eliminates service provider monitoring and allows vehicles to authenticate messages without generating parameters while on the move. This is achieved by exchanging a confidential token using lattice-based encryption and message signing. By verifying the signed message and using the shared token, receiving vehicles can confirm the authenticity of the messages. By using lattice-based cryptography, the proposed protocol is also designed with the potential to resist future attacks, including quantum attacks, enhancing its long-term security viability. The security analysis of LbPV includes formal and informal evaluations that demonstrate its robustness. Performance evaluations using the NTL library show that LbPV, with service provider parameters, outperforms existing approaches in the literature. Results of performance analysis indicate that when compared to the most efficient traditional non-lattice-based scheme discussed in this paper, the proposed protocol has increased computation cost, communication cost, and power consumption by 77.71%, 98.58%, and 77.71%, respectively. Conversely, when compared to the most efficient lattice-based scheme discussed in this paper, the proposed scheme demonstrates reductions in computation cost, communication cost, and power consumption by 71.95%, 2.16%, and 71.95%, respectively.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.