Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Efficient Privacy-Preserving Dual Authenticationand Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

ABSTRACT:

The Internet of Vehicles (IoV) aims to provide a new convenient, comfortable, and safe driving way, and in turn enables intelligent transportation through wireless communications among road-side units, on-board units (OBUs), phones, and other devices inside a vehicle. However, significantly increasing reliance on wireless communication, control, and computing technology makes IoV more vulnerable to potential attacks, such as remote intrusion, control, and trajectory tracking. Therefore, efficient authentication solutions preventing unauthorized visitors need to be addressed to cope with these issues. Hence, in this paper we focus on the security and privacy-preserving by developing a dual authentication scheme for IoV according to its different scenarios. First, the OBU self-generates an anonymous identity and temporary encryption key to open an authentication session. Second, the legitimacy of the vehicle’s real and anonymous identity can be verified by trust authority (TA). After that, the vehicle’s reputation is evaluated according to its history interactive behavior and the session key for V2V can be finally established. There are three major advantages,including privacy-preserving and security enhancement withouta burden of key management in the condition of acceptable time delay range, introducing trust evaluation into authentication protocol, as well as considering the vehicle behavior attributes in the new reputation evaluation method. In addition, we also prove the correctness of this scheme using theBurrows–Abadi–Needham (BAN) logic, and the performancecomparison against the existing schemes is given as well.

EXISTING SYSTEM:

  • In order to improve the authentication efficiency, some existing work proposed to embed the dependable hardware (e.g., TPM, TPD), as a security chip into vehicles. Therefore, the encryption and decryption operation can be hardware-aided carried out and some sensitive information can be kept secretly.
  • Later, TPM and TPD were comparatively analyzed demonstrating that they both have message encryption ability, and TPD is of high price and intolerable to the high temperature. And a scheme was presented in which uses TPM to check whether every component in a vehicle works accordingly in perfect order without tempering to secure IoV.

DISADVANTAGES OF EXISTING SYSTEM:

  • Vulnerable to various kinds of Attack
  • High computational cost.
  • High End-to-End delay.

PROPOSED SYSTEM:

  • A novel authentication scheme (PPDAS) is proposed to enhance security and privacy for V2V communications in intelligent transportation systems. PPDAS exploits the advantage of bilinear pairing to compute encryption key without needing additional key management.
  • Meanwhile, vehicles can establish session key without knowing the real identity of each other to effectively protect privacy. Furthermore, the dual verification lever-ages identity and behavior authentication to improve decision-making accuracy

ADVANTAGES OF PROPOSED SYSTEM:

  • Resistance to various kinds of Attack
  • Low computational cost.
  • Average End-to-End delay.

SYSTEM ARCHITECTURE:

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

  • System : Pentium Dual Core.
  • Hard Disk : 120 GB.
  • Monitor : 15’’LED
  • Input Devices : Keyboard, Mouse
  • Ram :1GB

SOFTWARE REQUIREMENTS:

  • Operating system : Windows XP/UBUNTU.
  • Implementation : NS2
  • NS2 Version : 2.28
  • Front End : OTCL (Object Oriented Tool Command  Language)
  • Tool : Cygwin (To simulate in Windows OS)

REFERENCE:

Lei Zhang,Member, IEEE, Qianhong Wu, Member, IEEE, Josep Domingo-Ferrer,Fellow, IEEE,Bo Qin, and Chuanyan Hu “Distributed Aggregate Privacy-Preserving Authentication in VANETs”.IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017.

 

About the Author