Javascript must be enabled to continue!
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs
View through CrossRef
A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent security protocol that provides unbreakable security. In recent times, various three-factor authentication solutions for VANET were introduced that adopt the centralized Trusted Authority
T
A
, which is responsible for assigning authentication parameters during vehicle registration, and the authentication process depends on these parameters. This article first explains the vulnerabilities of the recent three-factor (3F) authentication scheme presented by Xu et al. Our analysis proves that if an
RSU
is dishonest, it can easily bypass the
T
A
and can create a session with
OBU
. Furthermore, this paper puts forward a new scheme that provides the 3F authentication for VANETs (TFPPASV) to resist
RSU
from bypassing the
T
A
and to offer user privacy. The proposed scheme fulfills the security and performance requirements of the VANET. We use BAN-Logic analysis to perform a formal security analysis of the proposed scheme, in addition to the informal security feature discussion. Finally, we compare the security and performance of the proposed TFPPASV with some recent and related schemes.
Title: TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs
Description:
A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly.
Mitigation of these threats needs an intelligent security protocol that provides unbreakable security.
In recent times, various three-factor authentication solutions for VANET were introduced that adopt the centralized Trusted Authority
T
A
, which is responsible for assigning authentication parameters during vehicle registration, and the authentication process depends on these parameters.
This article first explains the vulnerabilities of the recent three-factor (3F) authentication scheme presented by Xu et al.
Our analysis proves that if an
RSU
is dishonest, it can easily bypass the
T
A
and can create a session with
OBU
.
Furthermore, this paper puts forward a new scheme that provides the 3F authentication for VANETs (TFPPASV) to resist
RSU
from bypassing the
T
A
and to offer user privacy.
The proposed scheme fulfills the security and performance requirements of the VANET.
We use BAN-Logic analysis to perform a formal security analysis of the proposed scheme, in addition to the informal security feature discussion.
Finally, we compare the security and performance of the proposed TFPPASV with some recent and related schemes.
Related Results
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for ...
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, t...

