Lightweight HMAC-Based Anti-Linkability Authentication Scheme with Bloom Filter Token Revocation for V2I Network
Abstract
In this paper, we present a lightweight privacy-preserving authentication scheme for vehicle-toinfrastructure (V2I) communications with the following features: (1) resistance against linkability and (2) forward secrecy. The suggested solution is designed as a 4-phase protocol: pseudonym set-up, token-based authentication, session concealment and pseudonym-token refresh. Using symmetric HMAC operations and Bloom filter based revocation, the scheme provides a secure session management and an efficient revocation without computational overhead of PKI. We formally modeled and verified the proposed scheme by using AVISPA which confirmed resistance against replay, impersonation and man-in-the-middle attacksas well as mutual authentication and session unlinkability. The lightness of the protocol has been verified by comprehensive simulations, with computation time reduced by up to 35% and communication overhead saved by up to 22% versus the state-of-the-art works OTAuth and ECA-VFog. These results illustrate the adaptability of our protocol into a latency-sensitive and resource-constrained vehicular environment.References
A. R. Khan, M. F. Jamlos, N. E. Osman,
M. I. Ishak, F. Dzaharudin, Y. K. Yeow, and
K. A. Khairi, “Dsrc technology in vehicle-
to-vehicle (v2v) and vehicle-to-infrastructure
(v2i) iot system for intelligent transportation
system (its): A review,” Lecture Notes in
Electrical Engineering, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:237651229
C. Ge and S. feng Qin, “Digital twin
intelligent transportation system (dt-its)—a
systematic review,” IET Intelligent Trans-
port Systems, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:271730228
R. Suryadithia, M. M. A. Faisal, A. S. Putra,
and N. Aisyah, “Technological developments
in the intelligent transportation system (its),”
International Journal of Science, Technol-
ogy & Management, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:236337635
R. Dudhwala and D. J. R. Pitroda, “Intelligent
transportation system (its) - a review,”
International Journal of Constructive Research
in Civil Engineering, 2020. [Online]. Available:
https://api.semanticscholar.org/CorpusID:242230842
L. Li, D. Chen, Y. Liu, Y. hua
Liang, Y. Wang, and X. Wu, “Un-
linkable and revocable signcryption scheme
for vanets,” Electronics, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:272187483
A. Manasrah, Q. M. Yaseen, H. Al-Aqrabi,
and L. Liu, “Identity-based authentication
in vanets: A review,” IEEE Transac-
tions on Intelligent Transportation Systems,
vol. 26, pp. 4260–4282, 2025. [Online]. Available:
https://api.semanticscholar.org/CorpusID:275890166
T. Nandy, R. M. Noor, R. Kolandaisamy, M. Y. I.
Idris, and S. Bhattacharyya, “A review of security
attacks and intrusion detection in the vehicular
networks,” J. King Saud Univ. Comput. Inf.
Sci., vol. 36, p. 101945, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:267484986
M. D. Vincenzi, G. Costantino, I. Mat-
teucci, F. Fenzl, C. Plappert, R. Rieke,
and D. Zelle, “A systematic review on
security attacks and countermeasures in
automotive ethernet,” ACM Computing Sur-
veys, vol. 56, pp. 1 – 38, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:266177229
F. Azam, S. kumar Yadav, N. Priyadarshi,
S. Padmanaban, and R. C. Bansal, “A com-
prehensive review of authentication schemes in
vehicular ad-hoc network,” IEEE Access, vol. 9,
pp. 31 309–31 321, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:232071217
A. N. Patil and S. V. Mallapur, “A review on
security-based routing protocols for vehicular ad
hoc networks,” 2022 5th International Conference
on Contemporary Computing and Informat-
ics (IC3I), pp. 399–405, 2022. [Online]. Available:
https://api.semanticscholar.org/CorpusID:257667564
U. Iqbal, T. Davies, and P. Perez, “A review of
recent hardware and software advances in gpu-
accelerated edge-computing single-board comput-
ers (sbcs) for computer vision,” Sensors (Basel,
Informatica 47 (2023) 41–52 11
Switzerland), vol. 24, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:271488200
H. Mistareehi, H. A. B. Salameh, and
D. Manivannan, “An on-board hardware
implementation of aodv routing protocol in
vanet: Design and experimental evaluation,”
9th International Conference on Internet
of Things: Systems, Management and Security
(IOTSMS), pp. 1–6, 2022. [Online]. Available:
https://api.semanticscholar.org/CorpusID:257524869
A. Kaur, R. Kaur, and R. Chhabra, “Role
of artificial intelligence for pedestrian detection
in iov: A systematic review,” 2023 IEEE
nd International Conference on Indus-
trial Electronics: Developments & Applications
(ICIDeA), pp. 505–510, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:264879538
B. Schiel, S. Swindler, A. Farmer, D. Sharp,
A. H. Murali, B. Corry, and P. Lundrigan,
“A multi-layered framework for informing
v2i deployment decisions using commercial
hardware-in-the-loop testing of rsus,” 2024
IEEE Vehicular Networking Conference
(VNC), pp. 313–320, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:270928951
J. P. A. Le´on, A. Busson, L. J. de la Cruz Llopis,
T. Begin, and A. F. M. Boukerche, “Strategies to
plan the number and locations of rsus for an ieee
11p-based infrastructure in urban environ-
ment,” Proceedings of the Int’l ACM Conference
on Modeling Analysis and Simulation of Wireless
and Mobile Systems, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:264450005
A. C. H. Chen, C.-K. Liu, C.-F. Lin, and
B.-Y. Lin, “V2x credential management system
comparison based on ieee 1609.2.1 and etsi
ts 102 941,” 2024 IEEE North Karnataka
Subsection Flagship International Conference
(NKCon), pp. 1–6, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:274641415
Y. Zhou, J. Chen, G. Ye, D. Wu, J. H. Wang, and
M. Chen, “Collaboratively replicating encoded
content on rsus to enhance video services for vehi-
cles,” IEEE Transactions on Mobile Computing,
vol. 20, pp. 877–892, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:213790328
M. A. Al-Shareeda, T. Gaber, M. A. Alqarni,
M. H. Alkinani, A. A. Almazroey, and A. A. Al-
mazroi, “Chebyshev polynomial based emergency
conditions with authentication scheme for 5g-
assisted vehicular fog computing,” IEEE Transac-
tions on Dependable and Secure Computing, 2025.
B. A. Mohammed, M. A. Al-Shareeda, S. Man-
ickam, Z. G. Al-Mekhlafi, A. Alreshidi,
M. Alazmi, J. S. Alshudukhi, and M. Alsaf-
far, “Fc-pa: fog computing-based pseudonym
authentication scheme in 5g-enabled vehicular
networks,” IEEE Access, vol. 11, pp. 18 571–
581, 2023.
A. A. Almazroi, E. A. Aldhahri, M. A. Al-
Shareeda, and S. Manickam, “Eca-vfog: An ef-
ficient certificateless authentication scheme for
g-assisted vehicular fog computing,” Plos one,
vol. 18, no. 6, p. e0287291, 2023.
Z. G. Al-Mekhlafi, S. A. Lashari, J. Altmemi,
M. A. Al-Shareeda, B. A. Mohammed, A. A. Sal-
lam, B. A. Al-Qatab, M. T. Alshammari, and
A. M. Alayba, “Oblivious transfer-based authen-
tication and privacy-preserving protocol for 5g-
enabled vehicular fog computing,” IEEE Access,
T. Haines, J. M¨uller, and I. Querejeta-
Azurmendi, “Scalable coercion-resistant e-voting
under weaker trust assumptions,” Proceedings
of the 38th ACM/SIGAPP Symposium on
Applied Computing, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:259099319
C. C. Fung, S. Yogarayan, S. F. A. Razak,
and A. B. Azman, “A review study of
ieee 802.11p on-board unit for v2x deploy-
ment,” 2023 11th International Conference on
Information and Communication Technology
(ICoICT), pp. 165–171, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:263228892
A. Al-Mohtaseb, A. Q. Hanoon, G. Samara,
E. A. Daoud, O. K. A. Alidmat, R. Batyha,
M. Aljaidi, R. Alazaidah, and A. Elrashidi,
“A comprehensive review of vanet attacks:
Predictive models, vulnerability management,
and defense selection,” 2024 25th International
Arab Conference on Information Technology
(ACIT), pp. 1–9, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:276434897
B. Hildebrand, M. Baza, T. Salman, F. H.
Amsaad, A. Razaqu, and A. Alourani, “A
comprehensive review on blockchains for internet
of vehicles: Challenges and directions,” ArXiv,
vol. abs/2203.10708, 2022. [Online]. Available:
https://api.semanticscholar.org/CorpusID:247594668
DOI:
https://doi.org/10.31449/inf.v49i20.11302Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







