Security Analysis and Improvements of Awais et al.’s Fog- Based Authentication Scheme for VANETs

Authors

  • Tushar Sharma Department of Mathematics, Chaudhary Charan Singh University, Uttar Pradesh, India Author
  • Akash Kumar Department of Mathematics, Chaudhary Charan Singh University, Uttar Pradesh, India Author
  • Saru Kumari Department of Mathematics, Chaudhary Charan Singh University, Uttar Pradesh, India Author

Keywords:

Mutual Authentication, Key Agreement, VANETs, IoT

Abstract

A Fog Based authentication technique was developed by Awais et al. for vehicular ad hoc network. In their article, they introduced Fog based authentication protocol based on a password and smart card. They claimed that their technique is impervious to a variety of assaults, including offline password guessing attempt and insider attack. However, after reviewing their scheme, we found some flaws in it, such as insider attack, offline password guessing attack. In conclusion, we offer several recommendations to enhance the analysed scheme and address the identified weaknesses.

Downloads

Download data is not yet available.

References

L. Atzori, A. Iera and G. Morabito, "SIoT: Giving a Social Structure to the Internet of Things," in IEEE Communications Letters, vol. 15, no. 11, pp. 1193-1195, (2011)

Mohammad Sabzinejad Farash, Muhamed Turkanović, Saru Kumari, Marko Hölbl, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things” environment, Ad Hoc Networks, Volume 36, Part 1, (2016) Pages 152-176, ISSN 1570-8705

M.B. Amin, A. Razaque, J. Saeed, M.A. ulQadir, N. Alrajeh, I. Khalil, Lightweight authentication and key agreement protocol for internet of things devices, Comput. Secur.85 (2019) 235–253.

K. Park, Y. Park, A.K. Das, S. Yu, J. Lee, Park, A dynamic privacy-preserving key management protocol for V2G in social internet of things, IEEE Access 7(2019 )76812–76832.

J. Zhang, J. Cui, H. Zhong, Z. Chen, L. Liu, PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks, IEEE Trans. Dependable Secure Comput. 18 (2) (2019) 722–735.

M. Wazid, A.K. Das, N. Kumar, A.V. Vasilakos, Design of secure key management and user authentication scheme for fog computing services, Future Gener. Comput. Syst. 91 (2019) 475–492.

S. Ahmed, S. Kumari, M.A. Saleem, K. Agarwal, K. Mahmood, M.-H. Yang, Anonymous key-agreement protocol for V2G environment within social internet of vehicles, IEEE Access 8 (2020) 119829–119839.

Z. Xu, W. Liang, K.-C. Li, J. Xu, H. Jin, A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles, J. Parallel Distrib.Comput.149(2021)29–39.

S.A. Eftekhari, M. Nikooghadam, M. Rafighi, Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications, Veh. Commun. 28 (2021) 100306.

T.-Y. Wu, Z. Lee, L. Yang, J.-N. Luo, R. Tso, provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks, J. Supercomput. 77 (2021) 6992–7020.

C.-M. Chen, Y. Huang, K.-H. Wang, S. Kumari, M.-E. Wu, A secure authenticated and key exchange scheme for fog computing, Enterpr. Inf. Syst. 15 (9) (2021) 1200–1215.

Z. Li, Q. Miao, S.A. Chaudhry, C.-M. Chen, A provably secure and lightweight mutual authentication protocol in fog-enabled social internet of vehicles, Int. J. Distrib. Sens. Netw. 18 (6) (2022) 15501329221104332.

Tyagi, P.; Kumari, S.; Alzahrani, B.A.; Gupta, A.; Yang, M.-H. An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT. Sensors (2022), 22, 8793.

J. Sun, G. Xu, T. Zhang, X. Cheng, X. Han, M. Tang, Secure data sharing with flexible cross-domain authorization in autonomous vehicle systems, IEEE Trans. In tell. Transp. Syst. (2022).

Tyagi, P., Kumari, S., Gupta, M. K., Chen, C. M., Wu, T. Y., & Kumar, S. (2023). A secure protocol for patient monitoring in wireless body area networks. Concurrency and Computation: Practice and Experience, 35(10), e7676.

Chen, C. M., Li, Z., Kumari, S., Srivastava, G., Lakshmanna, K., & Gadekallu, T. R. (2023). A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment. Vehicular Communications, 39, 100567.

S. M. Awais et al., "PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET," in IEEE Transactions on Vehicular Technology, vol. 73, no. 5, pp. 6727-6739, (2024)

Awais, S. M., Yucheng, W., Mahmood, K., Badar, H. M. S., Kharel, R., & Das, A. K. (2024). Provably secure fog-based authentication protocol for VANETs. Computer Networks, 246, 110391.

Rajkumar, Y., & Kumar, S. S. (2024). An elliptic curve cryptography-based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wireless Networks, 30(1), 335-362.

Y. Chen, J. Zhang, X. Wei, Y. Wang, et al., Cross-domain authentication scheme for vehicles based on given virtual identities, IEEE Internet Things J. (2024).

Dolev, D. & Yao, A. On the security of public key protocols. IEEE Transactions on Information Theory. 29, 198-208 (1983).

Downloads

Published

05-04-2025

Issue

Section

Research Articles