Main Primitive and Cryptography Tools for Authentication in VANET Environment: Literature Review

Authors

DOI:

https://doi.org/10.56714/bjrs.50.1.19

Keywords:

VANET, Authentication, Blockchain, Fog Computing

Abstract

Vehicular ad hoc networks (VANETs) provide the potential to improve transportation efficiency by facilitating the sharing of traffic information among vehicles. Acceptance of VANET depends on communication speed and accuracy as well as privacy protection guaranteeing an individual's safety. Vehicle authentication is necessary to ensure message correctness. This necessitates the implementation of an effective privacy-preserving authentication scheme, as well as the need for both secrecy and timebound delivery of messages. Various privacy-preserving authentication schemes have been suggested to guarantee the integrity of messages in communications. However, most of the schemes are not able to solve issues related to computing costs, communication, security, privacy, threats, and vulnerabilities. In this review, we focus on cryptographic strategies that are suggested to accomplish privacy and authentication, such as identity-based, public key cryptography-based, pseudonym-based, and blockchain-based schemes. We provide a thorough analysis of schemes, including their categorizations, advantages, and drawbacks. The study demonstrates that the majority of current authentication techniques necessitate trusted authorities that lack transparency in their operations. Additionally, authentication process incurs substantial computational and communication overhead, leading to a considerable impact on the timely delivery of messages. More efforts are required to enhance the development of efficient authentication schemes in VANETs.

Downloads

Download data is not yet available.

References

M. N. Mejri, J. Ben-Othman, and M. Hamdi, "Survey on VANET security challenges and possible cryptographic solutions," Vehicular Communications, vol. 1, no. 2, pp. 53-66, 2014, doi: https://doi.org/10.1016/j.vehcom.2014.05.001.

A. Ali, M. M. Iqbal, S. Jabbar, M. N. Asghar, U. Raza, and F. Al-Turjman, "VABLOCK: A blockchain-based secure communication in V2V network using icn network support technology," Microprocessors and Microsystems, vol. 93, p. 104569, 2022, doi: https://doi.org/10.1016/j.micpro.2022.104569.

O. S. Al-Heety, Z. Zakaria, M. Ismail, M. M. Shakir, S. Alani, and H. Alsariera, "A comprehensive survey: Benefits, services, recent works, challenges, security, and use cases for sdn-vanet," IEEE Access, vol. 8, pp. 91028-91047, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2992580.

I. M. Hassan and K. R. Hassan, "Vehicular social networks and vehicular ad-hoc networks, applications, modelling tools and challenges: A survey," International Journal of Computer Applications, vol. 975, p. 8887, 2020, doi: http://dx.doi.org/10.5120/ijca2020920224.

S. Wang, Z. Fan, Y. Su, B. Zheng, Z. Liu, and Y. Dai, "A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks," Electronics, vol. 13, no. 8, p. 1418, 2024, doi: https://doi.org/10.3390/electronics13081418.

M. A. A. Sibahee, V. O. Nyangaresi, Z. A. Abduljabbar, C. Luo, J. Zhang, and J. Ma, "Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks," IEEE Internet of Things Journal, vol. 11, no. 8, pp. 14253-14266, 2024, doi: https://doi.org/10.1109/JIOT.2023.3340259.

A. Guerna, S. Bitam, and C. T. Calafate, "Roadside unit deployment in internet of vehicles systems: A survey," Sensors, vol. 22, no. 9, p. 3190, 2022, doi: https://doi.org/10.3390/s22093190.

I. A. Aljabry and G. A. Al-Suhail, "A survey on network simulators for vehicular ad-hoc networks (VANETS)," Int. J. Comput. Appl, vol. 174, no. 11, pp. 1-9, 2021, doi: http://dx.doi.org/10.5120/ijca2021920979

Y. Lai, Y. Xu, F. Yang, W. Lu, and Q. Yu, "Privacy-aware query processing in vehicular ad-hoc networks," Ad Hoc Networks, vol. 91, p. 101876, 2019/08/01/ 2019, doi: https://doi.org/10.1016/j.adhoc.2019.101876.

I. Ali, T. Lawrence, and F. Li, "An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs," Journal of Systems Architecture, vol. 103, p. 101692, 2020/02/01/ 2020, doi: https://doi.org/10.1016/j.sysarc.2019.101692.

A. Alrawais, A. Alhothaily, B. Mei, T. Song, and X. Cheng, "An Efficient Revocation Scheme for Vehicular Ad-Hoc Networks," Procedia Computer Science, vol. 129, pp. 312-318, 2018/01/01/ 2018, doi: https://doi.org/10.1016/j.procs.2018.03.081.

S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan, "An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks," Information Sciences, vol. 317, pp. 48-66, 2015/10/01/ 2015, doi: https://doi.org/10.1016/j.ins.2015.04.033.

J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu, "An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks," Information Sciences, vol. 451-452, pp. 1-15, 2018/07/01/ 2018, doi: https://doi.org/10.1016/j.ins.2018.03.060.

M. Aloqaily, S. Otoum, I. Al Ridhawi, and Y. Jararweh, "An intrusion detection system for connected vehicles in smart cities," Ad Hoc Networks, vol. 90, p. 101842, 2019, doi: https://doi.org/10.1016/j.adhoc.2019.02.001.

K. Kim, J. S. Kim, S. Jeong, J.-H. Park, and H. K. Kim, "Cybersecurity for autonomous vehicles: Review of attacks and defense," Computers & Security, vol. 103, p. 102150, 2021/04/01/ 2021, doi: https://doi.org/10.1016/j.cose.2020.102150.

H. Fatemidokht, M. K. Rafsanjani, B. B. Gupta, and C.-H. Hsu, "Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems," IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4757-4769, 2021., doi: https://doi.org/10.1109/TITS.2020.3041746.

M. Bellés-Muñoz, B. Whitehat, J. Baylina, V. Daza, and J. L. Muñoz-Tapia, "Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits," Mathematics, vol. 9, no. 23, p. 3022, 2021, doi: https://doi.org/10.3390/math9233022.

S. H. L. Kanickam and L. Jayasimman, "Comparative analysis of hash authentication algorithms and ECC based security algorithms in cloud data," Asian J Comput Sci Technol, vol. 8, no. 1, pp. 53-61, 2019, doi: http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.

O. Siedlecka-Lamch, "Probabilistic and Timed Analysis of Security Protocols," in Computational Intelligence in Security for Information Systems, 2019, doi: https://doi.org/10.1007/978-3-030-57805-3_14.

C. J. Cremers, "The scyther tool: Verification, falsification, and analysis of security protocols: Tool paper," in International conference on computer aided verification, 2008: Springer, pp. 414-418, doi: https://doi.org/10.1007/978-3-540-70545-1_38.

N. El Madhoun and G. Pujolle, "A secure cloud-based NFC payment architecture for small traders," in 2016 3rd Smart Cloud Networks & Systems (SCNS), 2016: IEEE, pp. 1-6, doi: https://doi.org/10.1109/SCNS.2016.7870562.

G. Mathur, "GANACHE: A Robust Framework for Efficient and Secure Storage of Data on Private Ethereum Blockchains," 2023, doi: https://doi.org/10.21203/rs.3.rs-3495549/v1.

A. Dolgui, D. Ivanov, S. Potryasaev, B. Sokolov, M. Ivanova, and F. Werner, "Blockchain-oriented dynamic modelling of smart contract design and execution in the supply chain," International Journal of Production Research, vol. 58, no. 7, pp. 2184-2199, 2020, doi: https://doi.org/10.1080/00207543.2019.1627439.

L. W. Cong and Z. He, "Blockchain disruption and smart contracts," The Review of Financial Studies, vol. 32, no. 5, pp. 1754-1797, 2019., doi: https://doi.org/10.1093/rfs/hhz007.

A. Goñi, A. Burgos, L. Dranca, J. Rodríguez, A. Illarramendi, and J. Bermúdez, "Architecture, cost-model and customization of real-time monitoring systems based on mobile biological sensor data-streams," Computer methods and programs in biomedicine, vol. 96, no. 2, pp. 141-157, 2009, doi: https://doi.org/10.1016/j.cmpb.2009.04.010.

A. S. Rajasekaran, A. Maria, F. Al-Turjman, C. Altrjman, and L. Mostarda, "ABRIS: Anonymous blockchain based revocable and integrity preservation scheme for vehicle to grid network," Energy Reports, vol. 8, pp. 9331-9343, 2022, doi: https://doi.org/10.1016/j.egyr.2022.07.064.

A. Giannaros et al., "Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions," Journal of Cybersecurity and Privacy, vol. 3, no. 3, pp. 493-543, 2023, doi: https://doi.org/10.3390/jcp3030025.

E. Alalwany and I. Mahgoub, "Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle CAN-Network," Sensors, vol. 22, no. 23, p. 9195, 2022, doi: https://doi.org/10.3390/s22239195.

X. He, X. Niu, Y. Wang, L. Xiong, Z. Jiang, and C. Gong, "A hierarchical blockchain-assisted conditional privacy-preserving authentication scheme for vehicular ad hoc networks," Sensors, vol. 22, no. 6, p. 2299, 2022, doi: https://doi.org/10.3390/s22062299.

B. Akwirry, N. Bessis, H. Malik, and S. McHale, "A multi-tier trust-based security mechanism for vehicular ad-hoc network communications," Sensors, vol. 22, no. 21, p. 8285, 2022, doi: https://doi.org/10.3390/s22218285.

K. N. Qureshi et al., "A blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the internet of vehicles," Applied Sciences, vol. 12, no. 1, p. 476, 2022, doi: https://doi.org/10.3390/app12010476.

A. Verma, R. Saha, G. Kumar, and T.-h. Kim, "The security perspectives of vehicular networks: a taxonomical analysis of attacks and solutions," Applied Sciences, vol. 11, no. 10, p. 4682, 2021, doi: https://doi.org/10.3390/app11104682.

B. Hou, Y. Xin, H. Zhu, Y. Yang, and J. Yang, "VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain," Applied Sciences, vol. 13, no. 9, p. 5733, 2023, doi: https://doi.org/10.3390/app13095733.

S. Umran, S. Lu, Z. Abduljabbar, J. Zhu, and J. Wu, "Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology," Applied Sciences, vol. 11, 07/09 2021, doi: https://doi.org/10.3390/app11146376.

V. Singla, I. K. Malav, J. Kaur, and S. Kalra, "Develop leave application using blockchain smart contract," in 2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019: IEEE, pp. 547-54, doi: https://doi.org/10.1109/COMSNETS.2019.8711422.

S. M. Umran, S. Lu, Z. A. Abduljabbar, and V. O. Nyangaresi, "Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry," Internet of Things, vol. 24, p. 100969, 2023/12/01/ 2023, doi: https://doi.org/10.1016/j.iot.2023.100969.

Z. A. Hussien et al., "Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems," Applied Sciences, vol. 13, no. 2, p. 691, 2023, doi: https://doi.org/10.3390/app13020691.

R. Banno and K. Shudo, "Simulating a blockchain network with simblock," in 2019 IEEE international conference on blockchain and cryptocurrency (ICBC), 2019: IEEE, pp. 3-4, doi: https://doi.org/10.1109/BLOC.2019.8751431.

S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, "Blockchain-enabled smart contracts: architecture, applications, and future trends," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 11, pp. 2266-2277, 2019, doi: https://doi.org/10.1109/TSMC.2019.2895123.

A. M. Farooqi, S. I. Hassan, and M. A. Alam, "Sustainability and fog computing: applications, advantages and challenges," in 2019 3rd International Conference on Computing and Communications Technologies (ICCCT), 2019: IEEE, pp. 18-23, doi: https://doi.org/10.1109/ICCCT2.2019.8824983.

S. Misra, S. P. Rachuri, P. K. Deb, and A. Mukherjee, "Multiarmed-bandit-based decentralized computation offloading in fog-enabled IoT," IEEE Internet of Things Journal, vol. 8, no. 12, pp. 10010-10017, 2020, doi: https://doi.org/10.1109/JIOT.2020.3048365.

A. Hazra, P. Choudhary, and O. Vivek, "An advance mobility management scheme in wireless network," in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2018: IEEE, pp. 1-5, doi: https://doi.org/10.1109/ICCCNT.2018.8493854.

A. Hazra, M. Adhikari, T. Amgoth, and S. N. Srirama, "Joint computation offloading and scheduling optimization of IoT applications in fog networks," IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 3266-3278, 2020, doi: https://doi.org/10.1109/TNSE.2020.3021792.

J.-P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security & Privacy, vol. 2, no. 3, pp. 49-55, 2004, doi: https://doi.org/10.1109/MSP.2004.26.

M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of computer security, vol. 15, no. 1, pp. 39-68, 2007, doi: https://doi.org/10.3233/JCS-2007-15103.

Q. Wu, J. Domingo-Ferrer, and Ú. González-Nicolás, "Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications," Vehicular Technology, IEEE Transactions on, vol. 59, pp. 559-573, 03/01 2010, doi: https://doi.org/10.1109/TVT.2009.2034669.

C. Zhang, P.-H. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Networks, vol. 17, pp. 1851-1865, 2011, doi: https://doi.org/10.1007/s11276-011-0383-2.

J.-W. Rhim, "A Study on MAC-Based Efficient Message Authentication Scheme for VANET," Master's degree M.S. Thesis, Hanyang University, 2012.

E. Garcia-Lozano, C. T. Barba, M. A. Igartua, and C. Campo, "A distributed, bandwidth-efficient accident prevention system for interurban VANETs," in 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT), 2013, vol. 1: IEEE, pp. 1-5, doi: https://doi.org/10.1109/SaCoNeT.2013.6654564.

D. He, S. Zeadally, B. Xu, and X. Huang, "An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2681-2691, 2015, doi: https://doi.org/10.1109/TIFS.2015.2473820.

A. Paranjothi, M. S. Khan, M. Nijim, and R. Challoo, "MAvanet: Message authentication in VANET using social networks," in 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 20-22 Oct. 2016 2016, pp. 1-8, doi: https://doi.org/10.1109/UEMCON.2016.7777915.

U. Rajput, F. Abbas, and H. Oh, "A hierarchical privacy preserving pseudonymous authentication protocol for VANET," Ieee Access, vol. 4, pp. 7770-7784, 2016, doi: https://doi.org/10.1109/ACCESS.2016.2620999.

K. Rabieh, M. M. Mahmoud, and M. Younis, "Privacy-preserving route reporting schemes for traffic management systems," IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2703-2713, 2016, doi: https://doi.org/10.1109/TVT.2016.2583466.

T. Gao, Y. Li, N. Guo, and I. You, "An anonymous access authentication scheme for vehicular ad hoc networks under edge computing," International Journal of Distributed Sensor Networks, vol. 14, no. 2, p. 1550147718756581, 2018, doi: https://doi.org/10.1177/1550147718756581.

M. Asghar, R. R. M. Doss, and L. Pan, "A scalable and efficient PKI based authentication protocol for VANETs," in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), 2018: IEEE, pp. 1-3, doi: https://doi.org/10.1109/ATNAC.2018.8615224.

H. Tan, D. Choi, P. Kim, S. Pan, and I. Chung, "Secure certificateless authentication and road message dissemination protocol in VANETs," Wireless Communications and Mobile Computing, vol. 2018, 2018, doi: https://doi.org/10.1155/2018/7978027.

Z. Lu, Q. Wang, G. Qu, and Z. Liu, "BARS: A blockchain-based anonymous reputation system for trust management in VANETs," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018: IEEE, pp. 98-103, doi: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00025.

Z. Lu, W. Liu, Q. Wang, G. Qu, and Z. Liu, "A privacy-preserving trust model based on blockchain for VANETs," Ieee Access, vol. 6, pp. 45655-45664, 2018, doi: https://doi.org/10.1109/ACCESS.2018.2864189.

X. Zhang, R. Li, and B. Cui, "A security architecture of VANET based on blockchain and mobile edge computing," in 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), 2018: IEEE, pp. 258-259, doi: https://doi.org/10.1109/HOTICN.2018.8605952.

I. Ali, M. Gervais, E. Ahene, and F. Li, "A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs," Journal of Systems Architecture, vol. 99, p. 101636, 2019, doi: https://doi.org/10.1016/j.sysarc.2019.101636.

Y. Ming and H. Cheng, "Efficient certificateless conditional privacy-preserving authentication scheme in VANETs," Mobile Information Systems, vol. 2019, 2019, doi: https://doi.org/10.1155/2019/7593138.

M. A. Alazzawi, H. Lu, A. A. Yassin, and K. Chen, "Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network," IEEE Access, vol. 7, pp. 71424-71435, 2019, doi: https://doi.org/10.1109/TVT.2020.2977361.

D. Gabay, K. Akkaya, and M. Cebe, "Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs," IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 5760-5772, 2020.

J. Guo et al., "TROVE: A context-awareness trust model for VANETs using reinforcement learning," IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6647-6662, 2020, doi: https://doi.org/10.1371/journal.pone.0228319.

M. Han, S. Liu, S. Ma, and A. Wan, "Anonymous-authentication scheme based on fog computing for VANET," PLoS one, vol. 15, no. 2, p. e0228319, 2020.

M. Shen et al., "Blockchain-assisted secure device authentication for cross-domain industrial IoT," IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 942-954, 2020, doi: https://doi.org/10.1109/JSAC.2020.2980916.

Z. Liu et al., "LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications," Information Fusion, vol. 73, pp. 144-156, 2021, doi: https://doi.org/10.1016/j.inffus.2021.03.003.

Y. Inedjaren, M. Maachaoui, B. Zeddini, and J.-P. Barbot, "Blockchain-based distributed management system for trust in VANET," Vehicular Communications, vol. 30, p. 100350, 2021, doi: https://doi.org/10.1016/j.vehcom.2021.100350.

C. Chukwuocha, P. Thulasiraman, and R. K. Thulasiram, "Trust and scalable blockchain-based message exchanging scheme on VANET," Peer-to-Peer Networking and Applications, vol. 14, pp. 3092-3109, 2021, doi: https://doi.org/10.1007/s12083-021-01164-9.

R. Kalaria, A. Kayes, W. Rahayu, and E. Pardede, "A Secure Mutual authentication approach to fog computing environment," computers & security, vol. 111, p. 102483, 2021, doi: https://doi.org/10.1016/j.cose.2021.102483.

F. Ghovanlooy Ghajar, J. Salimi Sratakhti, and A. Sikora, "Sbtms: Scalable blockchain trust management system for vanet," Applied Sciences, vol. 11, no. 24, p. 11947, 2021, doi: https://doi.org/10.3390/app112411947.

C. Pu, "A novel blockchain-based trust management scheme for vehicular networks," in 2021 wireless telecommunications symposium (WTS), 2021: IEEE, pp. 1-6, doi: https://doi.org/10.1109/WTS51064.2021.9433711.

Z. Liu et al., "PPTM: A privacy-preserving trust management scheme for emergency message dissemination in space–air–ground-integrated vehicular networks," IEEE Internet of Things Journal, vol. 9, no. 8, pp. 5943-5956, 2021, doi: https://doi.org/10.1109/JIOT.2021.3060751.

A. Bhargava and S. Verma, "DUEL: Dempster uncertainty-based enhanced-trust level scheme for VANET," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 15079-15090, 2022, doi: https://doi.org/10.1109/TITS.2021.3136548.

A. Rehman et al., "CTMF: Context-aware trust management framework for internet of vehicles," IEEE Access, vol. 10, pp. 73685-73701, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3189349.

Z. Bi, G. Xu, G. Xu, M. Tian, R. Jiang, and S. Zhang, "Intrusion detection method for in-vehicle can bus based on message and time transfer matrix," Security and Communication Networks, vol. 2022, 2022., doi: https://doi.org/10.1155/2022/2554280.

H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, "A security solution for V2V communication within VANETs," 2018 Wireless Days (WD), pp. 181-183, 2018, doi: https://doi.org/10.1109/WD.2018.8361716.

F. Ahmad, V. N. L. Franqueira, and A. Adnane, "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks," IEEE Access, vol. 6, pp. 28643-28660, 2018, doi: https://doi.org/10.1109/ACCESS.2018.2837887.

F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-rimy, A. Alsaeedi, and W. Boulila, "Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network," Remote Sensing, vol. 11, no. 23, p. 2852, 2019, doi: https://doi.org/10.3390/rs11232852.

F. Zhu, X. Yi, A. Abuadbba, I. Khalil, X. Huang, and F. Xu, "A security-enhanced certificateless conditional privacy-preserving authentication scheme for vehicular ad hoc networks," IEEE Transactions on Intelligent Transportation Systems, 2023, doi: https://doi.org/10.1109/TITS.2023.3275077.

B. Chen, Z. Wang, T. Xiang, J. Yang, D. He, and K.-K. R. Choo, "BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs," Vehicular Communications, vol. 41, p. 100602, 2023, doi: https://doi.org/10.1016/j.vehcom.2023.100602.

H. Liu, H. Huang, Y. Zhou, and Q. Chen, "Improvement of blockchain-based multi-layer location data sharing scheme for Internet of Things," Computer Communications, vol. 201, pp. 131-142, 2023. doi: https://doi.org/10.1016/j.comcom.2023.02.005.

S. Prajapat et al., "Secure Lattice-Based Aggregate Signature Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Vehicular Technology, pp. 1-15, 2024, doi: https://doi.org/10.1109/TVT.2024.3383967.

S. Yu et al., "Efficient ECC-based Conditional Privacy-preserving Aggregation Signature Scheme in V2V," IEEE Transactions on Vehicular Technology, 2023, doi: https://doi.org/10.1109/TVT.2023.3287989.

Q. Wang, Y. Li, Z. Tan, N. Fan, and G. Yao, "Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms," Journal of Information Security and Applications, vol. 78, p. 103616, 2023, doi: https://doi.org/10.1016/j.jisa.2023.103616.

A. Namdev and H. Lohiya, "Design and Implementation of Biometric Blockchain Authentication for VANET Security," in 2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS), 2024: IEEE, pp. 1-8, doi: https://doi.org/10.1109/SCEECS61402.2024.10482007.

H. Su, S. Dong, N. Wang, and T. Zhang, "An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs," Vehicular Communications, vol. 45, p. 100727, 2024, doi: https://doi.org/10.1016/j.vehcom.2024.100727.

J. Huang et al., "Secure data sharing over vehicular networks based on multi-sharding blockchain," ACM Transactions on Sensor Networks, vol. 20, no. 2, pp. 1-23, 2024, doi: https://dl.acm.org/doi/10.1145/3579035.

C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao, "Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme," Selected Areas in Communications, IEEE Journal on, vol. 31, pp. 37-46, 09/01 2013, doi: https://doi.org/10.1109/JSAC.2013.SUP.0513004.

L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A Scalable Robust Authentication Protocol for Secure Vehicular Communications," Vehicular Technology, IEEE Transactions on, vol. 59, pp. 1606-1617, 06/01 2010, doi: https://doi.org/10.1109/TVT.2009.2038222.

A. Braeken, P. Porambage, M. Stojmenovic, and L. Lambrinos, "EDAAAS: Efficient distributed anonymous authentication and access in smart homes," International Journal of Distributed Sensor Networks, vol. 12, 12/09 2016, doi: https://doi.org/10.1177/1550147716682037.

T. W. Chim, S. Yiu, and V. Li, "SPECS: Secure and privacy enhancing communications schemes for VANETs," Ad Hoc Networks, vol. 9, pp. 189-203, 03/01 2011, doi: https://doi.org/10.1016/j.adhoc.2010.05.005.

N. Gayathri, G. Thumbur, P. V. Reddy, and M. Z. U. Rahman, "Efficient pairing-free certificateless authentication scheme with batch verification for vehicular ad-hoc networks," IEEE Access, vol. 6, pp. 31808-31819, 2018, doi: https://doi.org/10.1109/ACCESS.2018.2845464.

J. Li, Y. Ji, K.-K. R. Choo, and D. Hogrefe, "CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10332-10343, 2019, doi: https://doi.org/10.1109/JIOT.2019.2938008.

A. K. Sutrala, P. Bagga, A. K. Das, N. Kumar, J. J. Rodrigues, and P. Lorenz, "On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment," IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5535-5548, 2020, doi: https://doi.org/10.1109/TVT.2020.2981934

H. Tan and I. Chung, "Secure Authentication and Key Management with Blockchain in VANETs," IEEE Access, vol. 8, pp. 2482-2498, 12/27 2019, doi: https://doi.org/ 10.1109/ACCESS.2019.2962387.

Y. Chen, J.-F. Martínez, P. Castillejo, and L. López, "An Anonymous Authentication and Key Establish Scheme for Smart Grid: FAuth," Energies, vol. 10, no. 9, p. 1354, 2017, doi: https://doi.org/10.3390/en10091354.

K. Mahmood, S. A. Chaudhry, S. H. A. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, "An elliptic curve cryptography based lightweight authentication scheme for smart grid communication," Future Gener. Comput. Syst., vol. 81, pp. 557-565, 2018, doi: https://doi.org/10.1016/j.future.2017.05.002

X. Li, F. Wu, S. Kumari, L. Xu, A. K. Sangaiah, and K.-K. R. Choo, "A provably secure and anonymous message authentication scheme for smart grids," Journal of Parallel and Distributed Computing, vol. 132, pp. 242-249, 2019/10/01/ 2019, doi: https://doi.org/10.1016/j.jpdc.2017.11.008.

A. A. Khan, V. Kumar, M. Ahmad, S. Rana, and D. Mishra, "PALK: Password-based anonymous lightweight key agreement framework for smart grid," International Journal of Electrical Power & Energy Systems, vol. 121, p. 106121, 2020/10/01/ 2020, , doi: https://doi.org/10.1016/j.ijepes.2020.106121.

Main Primitive and Cryptography Tools for Authentication in VANET Environment: Literature Review

Downloads

Published

30-06-2024

How to Cite

Alzaidi, Z. S., Yassin , A. A., & Abduljabbar, Z. A. (2024). Main Primitive and Cryptography Tools for Authentication in VANET Environment: Literature Review. Basrah Researches Sciences, 50(1), 29. https://doi.org/10.56714/bjrs.50.1.19

Issue

Section

Articles