Lightweight HMAC-Based Anti-Linkability Authentication Scheme with Bloom Filter Token Revocation for V2I Network
Abstract
In this paper, we present a lightweight privacy-preserving authentication scheme for vehicle-toinfrastructure (V2I) communications with the following features: (1) resistance against linkability and (2) forward secrecy. The suggested solution is designed as a 4-phase protocol: pseudonym set-up, token-based authentication, session concealment and pseudonym-token refresh. Using symmetric HMAC operations and Bloom filter based revocation, the scheme provides a secure session management and an efficient revocation without computational overhead of PKI. We formally modeled and verified the proposed scheme by using AVISPA which confirmed resistance against replay, impersonation and man-in-the-middle attacks
as well as mutual authentication and session unlinkability. The lightness of the protocol has been verified by comprehensive simulations, with computation time reduced by up to 35% and communication overhead saved by up to 22% versus the state-of-the-art works OTAuth and ECA-VFog. These results illustrate the adaptability of our protocol into a latency-sensitive and resource-constrained vehicular environment.
Full Text:
PDFReferences
A. R. Khan, M. F. Jamlos, N. E. Osman,
M. I. Ishak, F. Dzaharudin, Y. K. Yeow, and
K. A. Khairi, “Dsrc technology in vehicle-
to-vehicle (v2v) and vehicle-to-infrastructure
(v2i) iot system for intelligent transportation
system (its): A review,” Lecture Notes in
Electrical Engineering, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:237651229
C. Ge and S. feng Qin, “Digital twin
intelligent transportation system (dt-its)—a
systematic review,” IET Intelligent Trans-
port Systems, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:271730228
R. Suryadithia, M. M. A. Faisal, A. S. Putra,
and N. Aisyah, “Technological developments
in the intelligent transportation system (its),”
International Journal of Science, Technol-
ogy & Management, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:236337635
R. Dudhwala and D. J. R. Pitroda, “Intelligent
transportation system (its) - a review,”
International Journal of Constructive Research
in Civil Engineering, 2020. [Online]. Available:
https://api.semanticscholar.org/CorpusID:242230842
L. Li, D. Chen, Y. Liu, Y. hua
Liang, Y. Wang, and X. Wu, “Un-
linkable and revocable signcryption scheme
for vanets,” Electronics, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:272187483
A. Manasrah, Q. M. Yaseen, H. Al-Aqrabi,
and L. Liu, “Identity-based authentication
in vanets: A review,” IEEE Transac-
tions on Intelligent Transportation Systems,
vol. 26, pp. 4260–4282, 2025. [Online]. Available:
https://api.semanticscholar.org/CorpusID:275890166
T. Nandy, R. M. Noor, R. Kolandaisamy, M. Y. I.
Idris, and S. Bhattacharyya, “A review of security
attacks and intrusion detection in the vehicular
networks,” J. King Saud Univ. Comput. Inf.
Sci., vol. 36, p. 101945, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:267484986
M. D. Vincenzi, G. Costantino, I. Mat-
teucci, F. Fenzl, C. Plappert, R. Rieke,
and D. Zelle, “A systematic review on
security attacks and countermeasures in
automotive ethernet,” ACM Computing Sur-
veys, vol. 56, pp. 1 – 38, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:266177229
F. Azam, S. kumar Yadav, N. Priyadarshi,
S. Padmanaban, and R. C. Bansal, “A com-
prehensive review of authentication schemes in
vehicular ad-hoc network,” IEEE Access, vol. 9,
pp. 31 309–31 321, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:232071217
A. N. Patil and S. V. Mallapur, “A review on
security-based routing protocols for vehicular ad
hoc networks,” 2022 5th International Conference
on Contemporary Computing and Informat-
ics (IC3I), pp. 399–405, 2022. [Online]. Available:
https://api.semanticscholar.org/CorpusID:257667564
U. Iqbal, T. Davies, and P. Perez, “A review of
recent hardware and software advances in gpu-
accelerated edge-computing single-board comput-
ers (sbcs) for computer vision,” Sensors (Basel,
Informatica 47 (2023) 41–52 11
Switzerland), vol. 24, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:271488200
H. Mistareehi, H. A. B. Salameh, and
D. Manivannan, “An on-board hardware
implementation of aodv routing protocol in
vanet: Design and experimental evaluation,”
9th International Conference on Internet
of Things: Systems, Management and Security
(IOTSMS), pp. 1–6, 2022. [Online]. Available:
https://api.semanticscholar.org/CorpusID:257524869
A. Kaur, R. Kaur, and R. Chhabra, “Role
of artificial intelligence for pedestrian detection
in iov: A systematic review,” 2023 IEEE
nd International Conference on Indus-
trial Electronics: Developments & Applications
(ICIDeA), pp. 505–510, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:264879538
B. Schiel, S. Swindler, A. Farmer, D. Sharp,
A. H. Murali, B. Corry, and P. Lundrigan,
“A multi-layered framework for informing
v2i deployment decisions using commercial
hardware-in-the-loop testing of rsus,” 2024
IEEE Vehicular Networking Conference
(VNC), pp. 313–320, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:270928951
J. P. A. Le´on, A. Busson, L. J. de la Cruz Llopis,
T. Begin, and A. F. M. Boukerche, “Strategies to
plan the number and locations of rsus for an ieee
11p-based infrastructure in urban environ-
ment,” Proceedings of the Int’l ACM Conference
on Modeling Analysis and Simulation of Wireless
and Mobile Systems, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:264450005
A. C. H. Chen, C.-K. Liu, C.-F. Lin, and
B.-Y. Lin, “V2x credential management system
comparison based on ieee 1609.2.1 and etsi
ts 102 941,” 2024 IEEE North Karnataka
Subsection Flagship International Conference
(NKCon), pp. 1–6, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:274641415
Y. Zhou, J. Chen, G. Ye, D. Wu, J. H. Wang, and
M. Chen, “Collaboratively replicating encoded
content on rsus to enhance video services for vehi-
cles,” IEEE Transactions on Mobile Computing,
vol. 20, pp. 877–892, 2021. [Online]. Available:
https://api.semanticscholar.org/CorpusID:213790328
M. A. Al-Shareeda, T. Gaber, M. A. Alqarni,
M. H. Alkinani, A. A. Almazroey, and A. A. Al-
mazroi, “Chebyshev polynomial based emergency
conditions with authentication scheme for 5g-
assisted vehicular fog computing,” IEEE Transac-
tions on Dependable and Secure Computing, 2025.
B. A. Mohammed, M. A. Al-Shareeda, S. Man-
ickam, Z. G. Al-Mekhlafi, A. Alreshidi,
M. Alazmi, J. S. Alshudukhi, and M. Alsaf-
far, “Fc-pa: fog computing-based pseudonym
authentication scheme in 5g-enabled vehicular
networks,” IEEE Access, vol. 11, pp. 18 571–
581, 2023.
A. A. Almazroi, E. A. Aldhahri, M. A. Al-
Shareeda, and S. Manickam, “Eca-vfog: An ef-
ficient certificateless authentication scheme for
g-assisted vehicular fog computing,” Plos one,
vol. 18, no. 6, p. e0287291, 2023.
Z. G. Al-Mekhlafi, S. A. Lashari, J. Altmemi,
M. A. Al-Shareeda, B. A. Mohammed, A. A. Sal-
lam, B. A. Al-Qatab, M. T. Alshammari, and
A. M. Alayba, “Oblivious transfer-based authen-
tication and privacy-preserving protocol for 5g-
enabled vehicular fog computing,” IEEE Access,
T. Haines, J. M¨uller, and I. Querejeta-
Azurmendi, “Scalable coercion-resistant e-voting
under weaker trust assumptions,” Proceedings
of the 38th ACM/SIGAPP Symposium on
Applied Computing, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:259099319
C. C. Fung, S. Yogarayan, S. F. A. Razak,
and A. B. Azman, “A review study of
ieee 802.11p on-board unit for v2x deploy-
ment,” 2023 11th International Conference on
Information and Communication Technology
(ICoICT), pp. 165–171, 2023. [Online]. Available:
https://api.semanticscholar.org/CorpusID:263228892
A. Al-Mohtaseb, A. Q. Hanoon, G. Samara,
E. A. Daoud, O. K. A. Alidmat, R. Batyha,
M. Aljaidi, R. Alazaidah, and A. Elrashidi,
“A comprehensive review of vanet attacks:
Predictive models, vulnerability management,
and defense selection,” 2024 25th International
Arab Conference on Information Technology
(ACIT), pp. 1–9, 2024. [Online]. Available:
https://api.semanticscholar.org/CorpusID:276434897
B. Hildebrand, M. Baza, T. Salman, F. H.
Amsaad, A. Razaqu, and A. Alourani, “A
comprehensive review on blockchains for internet
of vehicles: Challenges and directions,” ArXiv,
vol. abs/2203.10708, 2022. [Online]. Available:
https://api.semanticscholar.org/CorpusID:247594668
DOI: https://doi.org/10.31449/inf.v49i20.11302
This work is licensed under a Creative Commons Attribution 3.0 License.








