Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System
Pages 7674 - 7689
Abstract
Recently, the concept of intelligent cyber-physical transportation systems (ICTS) has entered the vehicle network, providing more efficient, safe, and sustainable services by applying intelligent technology to the transportation system. Because the communication channel between the vehicle and the cloud service provider (CSP) is open and insecure. Therefore, we must construct a secure Vehicle-to-CSP (V2C) communication scheme to ensure the security of vehicle privacy data. Current communication schemes mainly have two limitations. One is that the user’s role in communication is not considered, and the other is that the computational and communication overhead are not sufficiently low to satisfy the low latency requirements. To address the deficiencies, we propose a user-centric V2C communication scheme. The primary key in the signature is concealed, which ensures the confidentiality of the user’s legal real identity. Its main steps, based on the extended Chebyshev chaotic map and hash function, reduce the computational and communication overhead in the process. The security proof and analysis show that our proposed scheme satisfies the security and privacy requirements. The performance analysis shows that our proposed scheme outperforms other related schemes.
References
[1]
Y. Yu et al., “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 4, pp. 767–778, Apr. 2017.
[2]
A. S. Rajawat, S. B. Goyal, P. Bedi, C. Verma, E. I. Ionete, and M. S. Raboaca, “5G-enabled cyber-physical systems for smart transportation using blockchain technology,” Mathematics, vol. 11, no. 3, p. 679, Jan. 2023.
[3]
R. Chandra Shit, “Crowd intelligence for sustainable futuristic intelligent transportation system: A review,” IET Intell. Transp. Syst., vol. 14, no. 6, pp. 480–494, 2020.
[4]
X. Huang and X. Wang, “Detection and isolation of false data injection attack in intelligent transportation system via robust state observer,” Processes, vol. 10, no. 7, p. 1299, Jun. 2022.
[5]
Y. Zhang, C. Wu, C. Qiao, A. Sadek, and K. F. Hulme, “Addressing the safety of transportation cyber-physical systems: Development and validation of a verbal warning utility scale for intelligent transportation systems,” Math. Problems Eng., vol. 2015, no. 1, 2015, Art. no.
[6]
T. Zhang, Y. Zou, X. Zhang, N. Guo, and W. Wang, “Data-driven based cruise control of connected and automated vehicles under cyber-physical system framework,” IEEE Trans. Intell. Transp. Syst., vol. 22, no. 10, pp. 6307–6319, Oct. 2021.
[7]
G. Xiong et al., “Cyber-physical-social system in intelligent transportation,” IEEE/CAA J. Autom. Sinica, vol. 2, no. 3, pp. 320–333, Jul. 2015.
[8]
Y. Yu, W. Yang, W. Ding, and J. Zhou, “Reinforcement learning solution for cyber-physical systems security against replay attacks,” IEEE Trans. Inf. Forensics Security, vol. 18, pp. 2583–2595, 2023.
[9]
Q. Mei, H. Xiong, Y.-C. Chen, and C.-M. Chen, “Blockchain-enabled privacy-preserving authentication mechanism for transportation CPS with cloud-edge computing,” IEEE Trans. Eng. Manag., vol. 71, pp. 12463–12474, 2022.
[10]
W. M. Danquah and D. T. Altilar, “Vehicular cloud resource management, issues and challenges: A survey,” IEEE Access, vol. 8, pp. 180587–180607, 2020.
[11]
A. S. Alluhaidan, M. Z. Khan, N. B. Halima, and S. Tyagi, “A diversified context-based privacy-preserving scheme (DCP2S) for Internet of Vehicles,” Alexandria Eng. J., vol. 77, pp. 227–237, Aug. 2023.
[12]
J. Zhang, H. Zhong, J. Cui, Y. Xu, and L. Liu, “An extensible and effective anonymous batch authentication scheme for smart vehicular networks,” IEEE Internet Things J., vol. 7, no. 4, pp. 3462–3473, Apr. 2020.
[13]
T.-Y. Wu, Z. Lee, L. Yang, and C.-M. Chen, “A provably secure authentication and key exchange protocol in vehicular ad hoc networks,” Secur. Commun. Netw., vol. 2021, no. 1, 2021, Art. no.
[14]
S. Bojjagani, Y. C. A. P. Reddy, T. Anuradha, P. V. V. Rao, B. R. Reddy, and M. K. Khan, “Secure authentication and key management protocol for deployment of Internet of Vehicles (IoV) concerning intelligent transport systems,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 12, pp. 24698–24713, Dec. 2022.
[15]
L. Kocarev and S. Lian, Chaos-Based Cryptography: Theory, Algorithms and Applications. Berlin, Germany: Springer, 2011.
[16]
L. Han, Q. Xie, W. Liu, and S. Wang, “A new efficient chaotic maps based three factor user authentication and key agreement scheme,” Wireless Pers. Commun., vol. 95, pp. 3391–3406, Feb. 2017.
[17]
R. I. Abdelfatah, N. M. Abdal-Ghafour, and M. E. Nasr, “Secure VANET authentication protocol (SVAP) using Chebyshev chaotic maps for emergency conditions,” IEEE Access, vol. 10, pp. 1096–1115, 2022.
[18]
H. Vasudev, V. Deshpande, D. Das, and S. K. Das, “A lightweight mutual authentication protocol for V2V communication in Internet of Vehicles,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 6709–6717, Jun. 2020.
[19]
J. Lee, G. Kim, A. K. Das, and Y. Park, “Secure and efficient honey list-based authentication protocol for vehicular ad hoc networks,” IEEE Trans. Netw. Sci. Eng., vol. 8, no. 3, pp. 2412–2425, Jul. 2021.
[20]
M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, “Design of secure user authenticated key management protocol for generic IoT networks,” IEEE Internet Things J., vol. 5, no. 1, pp. 269–282, Feb. 2018.
[21]
X. Li, T. Liu, M. S. Obaidat, F. Wu, P. Vijayakumar, and N. Kumar, “A lightweight privacy-preserving authentication protocol for VANETs,” IEEE Syst. J., vol. 14, no. 3, pp. 3547–3557, Sep. 2020.
[22]
X. Feng, Q. Shi, Q. Xie, and L. Wang, “P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 3888–3899, 2021.
[23]
L. Meng, H. Xu, H. Xiong, X. Zhang, X. Zhou, and Z. Han, “An efficient certificateless authenticated key exchange protocol resistant to ephemeral key leakage attack for V2V communication in IoV,” IEEE Trans. Veh. Technol., vol. 70, no. 11, pp. 11736–11747, Nov. 2021.
[24]
H. Goumidi, S. Harous, Z. Aliouat, and A. M. Gueroui, “Lightweight secure authentication and key distribution scheme for vehicular cloud computing,” Symmetry, vol. 13, no. 3, p. 484, Mar. 2021.
[25]
Q. G. K. Safi, S. Luo, C. Wei, L. Pan, and G. Yan, “Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs,” Comput. Standards Interfaces, vol. 56, pp. 107–115, Feb. 2018.
[26]
M. Ma, D. He, H. Wang, N. Kumar, and K. R. Choo, “An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks,” IEEE Internet Things J., vol. 6, no. 5, pp. 8065–8075, Oct. 2019.
[27]
J. Cui, X. Zhang, H. Zhong, J. Zhang, and L. Liu, “Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 1654–1667, 2020.
[28]
J. Zhang, H. Zhong, J. Cui, Y. Xu, and L. Liu, “SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 1810–1824, 2021.
[29]
U. I. Atmaca, C. Maple, G. Epiphaniou, and M. Dianati, “A privacy-preserving route planning scheme for the Internet of Vehicles,” Ad Hoc Netw., vol. 123, Dec. 2021, Art. no.
[30]
S. Chatterjee, S. Roy, A. K. Das, S. Chattopadhyay, N. Kumar, and A. V. Vasilakos, “Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment,” IEEE Trans. Dependable Secure Comput., vol. 15, no. 5, pp. 824–839, Sep. 2018.
[31]
J. Srinivas, A. K. Das, M. Wazid, and N. Kumar, “Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things,” IEEE Trans. Dependable Secure Comput., vol. 17, no. 6, pp. 1133–1146, Nov. 2020.
[32]
G. Xu, F. Wang, M. Zhang, and J. Peng, “Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks,” IEEE Access, vol. 8, pp. 47282–47294, 2020.
[33]
J. Cui, J. Yu, H. Zhong, L. Wei, and L. Liu, “Chaotic map-based authentication scheme using physical unclonable function for internet of autonomous vehicle,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 3, pp. 3167–3181, Mar. 2023.
[34]
X.-Y. Guo, D.-Z. Sun, and Y. Yang, “An improved three-factor session initiation protocol using Chebyshev chaotic map,” IEEE Access, vol. 8, pp. 111265–111277, 2020.
[35]
S. Qiu, D. Wang, G. Xu, and S. Kumari, “Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices,” IEEE Trans. Dependable Secure Comput., vol. 19, no. 2, pp. 1338–1351, Mar. 2022.
[36]
P. Bergamo, P. D’Arco, A. De Santis, and L. Kocarev, “Security of public-key cryptosystems based on Chebyshev polynomials,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 52, no. 7, pp. 1382–1393, Jul. 2005.
[37]
L. Zhang, “Cryptanalysis of the public key encryption based on multiple chaotic systems,” Chaos, Solitons Fractals, vol. 37, no. 3, pp. 669–674, 2008.
[38]
M. Wazid, A. K. Das, V. Odelu, N. Kumar, and W. Susilo, “Secure remote user authenticated key establishment protocol for smart home environment,” IEEE Trans. Dependable Secure Comput., vol. 17, no. 2, pp. 391–406, Mar. 2020.
[39]
C.-C. Chang and H.-D. Le, “A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 357–366, Jan. 2016.
[40]
M. A. Saleem, X. Li, M. F. Ayub, S. Shamshad, F. Wu, and H. Abbas, “An efficient and physically secure privacy-preserving key-agreement protocol for vehicular ad-hoc network,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 9, pp. 9940–9951, Sep. 2023.
[41]
D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, and V. Stettler, “A formal analysis of 5G authentication,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS), 2018, pp. 1383–1396.
[42]
Y. Wang, Z. Zhang, and Y. Xie, “Privacy-preserving and standard-compatible AKA protocol for 5G,” in Proc. 30th USENIX Secur. Symp. (USENIX Secur.), 2021, pp. 3595–3612.
Index Terms
- Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System
Index terms have been assigned to the content through auto-classification.
Recommendations
An efficient and privacy-preserving query scheme in intelligent transportation systems
AbstractPrivacy preservation is a crucial aspect of intelligent transportation systems, particularly in queries involving sensitive data stored in the Cloud. However, resource-constrained vehicles require security, privacy, and communication efficiency. ...
V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioning
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and InformaticsCloud computing has revolutionized the IT industry by enabling a virtualized resource provisioning model for organizations. The Network-as-a-Service (NaaS) provisioning model enables new ways of providing virtually isolated and on-demand networking ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
1556-6021 © 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information.
Publisher
IEEE Press
Publication History
Published: 12 August 2024
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 16 Jan 2025