Lightweight HMAC-Based Anti-Linkability Authentication Scheme with Bloom Filter Token Revocation for V2I Network

Saima Anwar Lashari, Ebtesam Sabree Jaber, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah

Abstract


In this paper, we present a lightweight privacy-preserving authentication scheme for vehicle-toinfrastructure (V2I) communications with the following features: (1) resistance against linkability and (2) forward secrecy. The suggested solution is designed as a 4-phase protocol: pseudonym set-up, token-based authentication, session concealment and pseudonym-token refresh. Using symmetric HMAC operations and Bloom filter based revocation, the scheme provides a secure session management and an efficient revocation without computational overhead of PKI. We formally modeled and verified the proposed scheme by using AVISPA which confirmed resistance against replay, impersonation and man-in-the-middle attacks
as well as mutual authentication and session unlinkability. The lightness of the protocol has been verified by comprehensive simulations, with computation time reduced by up to 35% and communication overhead saved by up to 22% versus the state-of-the-art works OTAuth and ECA-VFog. These results illustrate the adaptability of our protocol into a latency-sensitive and resource-constrained vehicular environment.


Full Text:

PDF

References


A. R. Khan, M. F. Jamlos, N. E. Osman,

M. I. Ishak, F. Dzaharudin, Y. K. Yeow, and

K. A. Khairi, “Dsrc technology in vehicle-

to-vehicle (v2v) and vehicle-to-infrastructure

(v2i) iot system for intelligent transportation

system (its): A review,” Lecture Notes in

Electrical Engineering, 2021. [Online]. Available:

https://api.semanticscholar.org/CorpusID:237651229

C. Ge and S. feng Qin, “Digital twin

intelligent transportation system (dt-its)—a

systematic review,” IET Intelligent Trans-

port Systems, 2024. [Online]. Available:

https://api.semanticscholar.org/CorpusID:271730228

R. Suryadithia, M. M. A. Faisal, A. S. Putra,

and N. Aisyah, “Technological developments

in the intelligent transportation system (its),”

International Journal of Science, Technol-

ogy & Management, 2021. [Online]. Available:

https://api.semanticscholar.org/CorpusID:236337635

R. Dudhwala and D. J. R. Pitroda, “Intelligent

transportation system (its) - a review,”

International Journal of Constructive Research

in Civil Engineering, 2020. [Online]. Available:

https://api.semanticscholar.org/CorpusID:242230842

L. Li, D. Chen, Y. Liu, Y. hua

Liang, Y. Wang, and X. Wu, “Un-

linkable and revocable signcryption scheme

for vanets,” Electronics, 2024. [Online]. Available:

https://api.semanticscholar.org/CorpusID:272187483

A. Manasrah, Q. M. Yaseen, H. Al-Aqrabi,

and L. Liu, “Identity-based authentication

in vanets: A review,” IEEE Transac-

tions on Intelligent Transportation Systems,

vol. 26, pp. 4260–4282, 2025. [Online]. Available:

https://api.semanticscholar.org/CorpusID:275890166

T. Nandy, R. M. Noor, R. Kolandaisamy, M. Y. I.

Idris, and S. Bhattacharyya, “A review of security

attacks and intrusion detection in the vehicular

networks,” J. King Saud Univ. Comput. Inf.

Sci., vol. 36, p. 101945, 2024. [Online]. Available:

https://api.semanticscholar.org/CorpusID:267484986

M. D. Vincenzi, G. Costantino, I. Mat-

teucci, F. Fenzl, C. Plappert, R. Rieke,

and D. Zelle, “A systematic review on

security attacks and countermeasures in

automotive ethernet,” ACM Computing Sur-

veys, vol. 56, pp. 1 – 38, 2023. [Online]. Available:

https://api.semanticscholar.org/CorpusID:266177229

F. Azam, S. kumar Yadav, N. Priyadarshi,

S. Padmanaban, and R. C. Bansal, “A com-

prehensive review of authentication schemes in

vehicular ad-hoc network,” IEEE Access, vol. 9,

pp. 31 309–31 321, 2021. [Online]. Available:

https://api.semanticscholar.org/CorpusID:232071217

A. N. Patil and S. V. Mallapur, “A review on

security-based routing protocols for vehicular ad

hoc networks,” 2022 5th International Conference

on Contemporary Computing and Informat-

ics (IC3I), pp. 399–405, 2022. [Online]. Available:

https://api.semanticscholar.org/CorpusID:257667564

U. Iqbal, T. Davies, and P. Perez, “A review of

recent hardware and software advances in gpu-

accelerated edge-computing single-board comput-

ers (sbcs) for computer vision,” Sensors (Basel,

Informatica 47 (2023) 41–52 11

Switzerland), vol. 24, 2024. [Online]. Available:

https://api.semanticscholar.org/CorpusID:271488200

H. Mistareehi, H. A. B. Salameh, and

D. Manivannan, “An on-board hardware

implementation of aodv routing protocol in

vanet: Design and experimental evaluation,”

9th International Conference on Internet

of Things: Systems, Management and Security

(IOTSMS), pp. 1–6, 2022. [Online]. Available:

https://api.semanticscholar.org/CorpusID:257524869

A. Kaur, R. Kaur, and R. Chhabra, “Role

of artificial intelligence for pedestrian detection

in iov: A systematic review,” 2023 IEEE

nd International Conference on Indus-

trial Electronics: Developments & Applications

(ICIDeA), pp. 505–510, 2023. [Online]. Available:

https://api.semanticscholar.org/CorpusID:264879538

B. Schiel, S. Swindler, A. Farmer, D. Sharp,

A. H. Murali, B. Corry, and P. Lundrigan,

“A multi-layered framework for informing

v2i deployment decisions using commercial

hardware-in-the-loop testing of rsus,” 2024

IEEE Vehicular Networking Conference

(VNC), pp. 313–320, 2024. [Online]. Available:

https://api.semanticscholar.org/CorpusID:270928951

J. P. A. Le´on, A. Busson, L. J. de la Cruz Llopis,

T. Begin, and A. F. M. Boukerche, “Strategies to

plan the number and locations of rsus for an ieee

11p-based infrastructure in urban environ-

ment,” Proceedings of the Int’l ACM Conference

on Modeling Analysis and Simulation of Wireless

and Mobile Systems, 2023. [Online]. Available:

https://api.semanticscholar.org/CorpusID:264450005

A. C. H. Chen, C.-K. Liu, C.-F. Lin, and

B.-Y. Lin, “V2x credential management system

comparison based on ieee 1609.2.1 and etsi

ts 102 941,” 2024 IEEE North Karnataka

Subsection Flagship International Conference

(NKCon), pp. 1–6, 2024. [Online]. Available:

https://api.semanticscholar.org/CorpusID:274641415

Y. Zhou, J. Chen, G. Ye, D. Wu, J. H. Wang, and

M. Chen, “Collaboratively replicating encoded

content on rsus to enhance video services for vehi-

cles,” IEEE Transactions on Mobile Computing,

vol. 20, pp. 877–892, 2021. [Online]. Available:

https://api.semanticscholar.org/CorpusID:213790328

M. A. Al-Shareeda, T. Gaber, M. A. Alqarni,

M. H. Alkinani, A. A. Almazroey, and A. A. Al-

mazroi, “Chebyshev polynomial based emergency

conditions with authentication scheme for 5g-

assisted vehicular fog computing,” IEEE Transac-

tions on Dependable and Secure Computing, 2025.

B. A. Mohammed, M. A. Al-Shareeda, S. Man-

ickam, Z. G. Al-Mekhlafi, A. Alreshidi,

M. Alazmi, J. S. Alshudukhi, and M. Alsaf-

far, “Fc-pa: fog computing-based pseudonym

authentication scheme in 5g-enabled vehicular

networks,” IEEE Access, vol. 11, pp. 18 571–

581, 2023.

A. A. Almazroi, E. A. Aldhahri, M. A. Al-

Shareeda, and S. Manickam, “Eca-vfog: An ef-

ficient certificateless authentication scheme for

g-assisted vehicular fog computing,” Plos one,

vol. 18, no. 6, p. e0287291, 2023.

Z. G. Al-Mekhlafi, S. A. Lashari, J. Altmemi,

M. A. Al-Shareeda, B. A. Mohammed, A. A. Sal-

lam, B. A. Al-Qatab, M. T. Alshammari, and

A. M. Alayba, “Oblivious transfer-based authen-

tication and privacy-preserving protocol for 5g-

enabled vehicular fog computing,” IEEE Access,

T. Haines, J. M¨uller, and I. Querejeta-

Azurmendi, “Scalable coercion-resistant e-voting

under weaker trust assumptions,” Proceedings

of the 38th ACM/SIGAPP Symposium on

Applied Computing, 2023. [Online]. Available:

https://api.semanticscholar.org/CorpusID:259099319

C. C. Fung, S. Yogarayan, S. F. A. Razak,

and A. B. Azman, “A review study of

ieee 802.11p on-board unit for v2x deploy-

ment,” 2023 11th International Conference on

Information and Communication Technology

(ICoICT), pp. 165–171, 2023. [Online]. Available:

https://api.semanticscholar.org/CorpusID:263228892

A. Al-Mohtaseb, A. Q. Hanoon, G. Samara,

E. A. Daoud, O. K. A. Alidmat, R. Batyha,

M. Aljaidi, R. Alazaidah, and A. Elrashidi,

“A comprehensive review of vanet attacks:

Predictive models, vulnerability management,

and defense selection,” 2024 25th International

Arab Conference on Information Technology

(ACIT), pp. 1–9, 2024. [Online]. Available:

https://api.semanticscholar.org/CorpusID:276434897

B. Hildebrand, M. Baza, T. Salman, F. H.

Amsaad, A. Razaqu, and A. Alourani, “A

comprehensive review on blockchains for internet

of vehicles: Challenges and directions,” ArXiv,

vol. abs/2203.10708, 2022. [Online]. Available:

https://api.semanticscholar.org/CorpusID:247594668




DOI: https://doi.org/10.31449/inf.v49i20.11302

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.