TY - JOUR
T1 - Provably secure authentication for the internet of vehicles
AU - Haodudin Nurkifli, E.
AU - Hwang, Tzonelih
N1 - Publisher Copyright:
© 2023 The Author(s)
PY - 2023/9
Y1 - 2023/9
N2 - Rapid technological development has far-reaching implications for every aspect of life, including transportation. The emerging Intelligent Transportation System (ITS) based on the Internet of Vehicles (IoV) requires robust security measures due to the public channels used to communicate between vehicles and trusted authorities. These channels create opportunities for adversaries to intercept and exploit the transmitted data, leading to severe attacks. Moreover, cars are often parked in public areas, making them vulnerable to physical attacks such as theft of smart cards/devices, cloning, and impersonation. In this paper, we propose a new protocol for IoV that addresses these security concerns. Our protocol offers user authentication based on biometrics, using a biometric key to prevent revealing data from theft of smart cards/devices. Additionally, we use The Physical Unclonable Function (PUF) to resist cloning attacks. We have conducted an informal analysis, which confirms that our protocol fulfills security features. Furthermore, we have conducted a formal analysis using the RoR model and the Scyther tool to verify that our protocol achieves security properties and withstands well-known attacks. We also demonstrate the time complexity and show that our protocol has low computation time. Therefore, our protocol is secure and has a low computation time.
AB - Rapid technological development has far-reaching implications for every aspect of life, including transportation. The emerging Intelligent Transportation System (ITS) based on the Internet of Vehicles (IoV) requires robust security measures due to the public channels used to communicate between vehicles and trusted authorities. These channels create opportunities for adversaries to intercept and exploit the transmitted data, leading to severe attacks. Moreover, cars are often parked in public areas, making them vulnerable to physical attacks such as theft of smart cards/devices, cloning, and impersonation. In this paper, we propose a new protocol for IoV that addresses these security concerns. Our protocol offers user authentication based on biometrics, using a biometric key to prevent revealing data from theft of smart cards/devices. Additionally, we use The Physical Unclonable Function (PUF) to resist cloning attacks. We have conducted an informal analysis, which confirms that our protocol fulfills security features. Furthermore, we have conducted a formal analysis using the RoR model and the Scyther tool to verify that our protocol achieves security properties and withstands well-known attacks. We also demonstrate the time complexity and show that our protocol has low computation time. Therefore, our protocol is secure and has a low computation time.
UR - http://www.scopus.com/inward/record.url?scp=85171650678&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85171650678&partnerID=8YFLogxK
U2 - 10.1016/j.jksuci.2023.101721
DO - 10.1016/j.jksuci.2023.101721
M3 - Article
AN - SCOPUS:85171650678
SN - 1319-1578
VL - 35
JO - Journal of King Saud University - Computer and Information Sciences
JF - Journal of King Saud University - Computer and Information Sciences
IS - 8
M1 - 101721
ER -