LAIOV-5G: LIGHTWEIGHT AUTHENTICATION SCHEME FOR IOV BASED ON 5G TECHNOLOGY IN SMART-CITY ENVIRONMENT


(Received: 12-Oct.-2024, Revised: 3-Dec.-2024 , Accepted: 6-Dec.-2024)
The Fifth Generation (5G) networks have enabled the development of smart cities, in which massive amounts of data are collected, stored and disseminated. The ultimate objective of these smart cities is to cut costs and improve security performance. In this environment, Internet of Vehicles (IoV) helps connect vehicles, pedestrians, control rooms and some roadside infrastructure. Owing to the insecure nature of the communication channel utilized in IoV to exchange information, it is important to develop practical techniques to preserve data confidentiality and privacy. To this end, numerous security solutions have been proposed over the recent past. Unfortunately, most of these authentication techniques have security flaws, which endangers the transmitted data, while some of them are highly inefficient. To address these gaps, we present a Lightweight Authentication Scheme for the Internet of Vehicles (IoV) based on 5G technology (LAIOV-5G).The security analysis carried out demonstrates that LAIOV-5G mitigates numerous potential attacks that threaten the IoV communication in a smart-city environment. In addition, the performance analysis of LAIOV-5G verifies its effectiveness and efficiency.

[1] S. Chen, H. Xu, D. Liu, B. Hu and H. Wang, "A Vision of IoT: Applications, Challenges andOpportunities with China Perspective,'' IEEE Internet of Things J., vol. 1, no. 4, pp. 349-359, 2014.

[2] C.-M. Chen, Z. Li, A. K. Das, S. A. Chaudhry and P. Lorenz, "Provably Secure Authentication Schemefor Fog Computing-enabled Intelligent Social Internet of Vehicles," IEEE Transactions on Vehicular Technology, vol. 73, no. 9, pp. 13600-13610, DOI: 10.1109/TVT.2024.3382971, Sept. 2024.

[3] S. Mumtaz, A. Bo, A. Al-Dulaimi and K.-F. Tsang, "Guest Editorial 5G and Beyond Mobile Technologiesand Applications for Industrial IoT (IIoT),'' IEEE Transactions on Industrial Informatics, vol. 14, no. 6, pp. 25882591, Jun. 2018.

[4] S. Garg et al., "MobQoS: Mobility-aware and QoS-driven SDN Framework for Autonomous Vehicles,''IEEE Wireless Communications, vol. 26, no. 4, pp. 1220, Aug. 2019.

[5] M. A. Al Sibahee et al., "Blockchain-based Authentication Schemes in Smart Environments: ASystematic Literature Review," IEEE Internet of Things J., vol. 11, no. 21, pp. 34774-34796, 2024.

[6] V.O. Nyangaresi et al., "Energy Efficient Dynamic Symmetric Key Based Protocol for Secure TrafficExchanges in Smart Homes," Applied Sciences, vol. 12, no. 24, p. 12688, 2022.

[7] V.O. Nyangaresi et al., "Smart City Energy Efficient Data Privacy Preservation Protocol Based onBiometrics and Fuzzy Commitment Scheme," Scientific Reports, vol. 14, Article no. 16223, 2024.

[8] V. O. Nyangaresi et al., "Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5GNetworks," Proc. of the 2021 IEEE 2nd Int. Conf. on Signal, Control and Communication (SCC), pp. 188-193, DOI: 10.1109/SCC53769.2021.9768338, Tunis, Tunisia, 2021.

[9] V. O. Nyangaresi et al., "Towards Security and Privacy Preservation in 5G Networks," Proc. of the 202129th Telecommuni. Forum (TELFOR), pp. 1-4, DOI: 10.1109/TELFOR52709.2021.9653385, Belgrade, Serbia, 2021.

[10] G. Rathee et al., "Trusted Orchestration for Smart Decision-making in Internet of Vehicles," IEEEAccess, vol. 8, pp. 157427-157436, 2020.

[11] C.-M. Chen, Q. Miao, S. Kumari, M. K. Khan and J. J. P. C. Rodrigues, "A Privacy-preservingAuthentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain," IEEE Internet of Things J., vol. 11, no. 10, pp. 17538-17551, 15 May15, 2024.

[12] C.-M. Chen et al., "A Secure Authentication Protocol for Internet of Vehicles," IEEE Access, vol. 7, pp.12047-12057, 2019.

[13] J. G. Andrews et al., "What Will 5G Be?" IEEE Journal on Selected Areas in Communications, vol. 32,pp. 1065–1082, 2014.

[14] X. Huang, R. Yu, J. Kang, Y. He and Y. Zhang, "Exploring Mobile Edge Computing for 5G-enabledSoftware Defined Vehicular Networks," IEEE Wireless Communications, vol. 24, pp. 55–63, 2017.

[15] S. A. A. Shah, E. Ahmed, M. Imran and S. Zeadally, "5G for Vehicular Communications," IEEECommunications Magazine, vol. 56, pp. 111–117, 2018.

[16] M. A. Al-Shareeda et al., "Password-guessing Attack-aware Authentication Scheme Based on ChineseRemainder Theorem for 5G-enabled Vehicular Networks," Applied Sciences, vol. 12, no. 3, p. 383, 2022.

[17] B. Parno and A. Perrig, "Challenges in Securing Vehicular Networks,'' Proc. of Workshop Hot TopicsNetwork (HotNets-IV), pp. 1_6, Annapolis, MD, USA, 2005.

[18] S. Capkun and J.-P. Hubaux, "Secure Positioning of Wireless Devices with Application to SensorNetworks,'' Proc. of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1917-1928, Miami, USA, Mar. 2005.

[19] L. Lazos, R. Poovendran and S. Apkun, "ROPE: Robust Position Estimation in Wireless SensorNetworks,'' Proc. of the IEEE 4th Int. Symposium on Information Processing in Sensor Networks (IPSN 2005), Boise, USA, p. 43, 2005.

[20] A. Studer, F. Bai, B. Bellur and A. Perrig, "Flexible, Extensible and Efficient VANET Authentication,'' Journal of Communications and Networks, vol. 11, no. 6, pp. 574-588, Dec. 2009.

[21] X. Lin et al., "TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving,''IEEE Transactions on Wireless Communications, vol. 7, no. 12, pp. 4987-4998, Dec. 2008.

[22] B. Ying, D. Makrakis and H. T. Mouftah, "Privacy Preserving Broadcast Message AuthenticationProtocol for VANETs,'' J. of Network and Computer Applications, vol. 36, no. 5, pp. 1352-1364, 2013.

[23] C. Zhang, R. Lu, X. Lin, P.-H. Ho and X. Shen, "An Efficient Identity-based Batch Verification Schemefor Vehicular Sensor Networks,'' Proc. of the 27th IEE Conf. on Computer Communications (IEEE INFOCOM 2008), pp. 246-250, Phoenix, USA, Apr. 2008.

[24] C. Zhang, P.-H. Ho and J. Tapolcai, "On Batch Verification with Group Testing for VehicularCommunications,'' Wireless Networks, vol. 17, no. 8, p. 1851, 2011.

[25] M. Eltoweissy, S. Olariu and M. Younis, "Towards Autonomous Vehicular Clouds,'' Proc. of the Int.Conf. on Ad Hoc Networks, Part of the Book Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Eng., vol. 49 pp. 1-16, Berlin, Germany, 2010.

[26] D. Bernstein, N. Vidovic and S. Modi, "A Cloud PAAS for High Scale, Function and Velocity MobileApplications - With Reference Application As the Fully Connected Car,'' Proc. of the 2010 IEEE 5th Int. Conf. on Systems and Networks Communications (ICSNC), pp. 117-123, Nice, France, Aug. 2010.

[27] R. Hussain, J. Son, H. Eun, S. Kimand H. Oh, "Rethinking Vehicular Communications: Merging VANETwith Cloud Computing,'' Proc. of the IEEE 4th Int. Conf. on Cloud Computing Technology and Science Proceedings (CloudCom), pp. 606-609, Taipei, Taiwan, Dec. 2012.

[28] H. Zhong, S. Han, J. Cui, J. Zhang and Y. Xu, "Privacy-preserving Authentication Scheme with FullAggregation," Information Sciences, vol. 476, pp. 211–221, 2019.

[29] M. Azees, P. Vijayakumar and L. J. Deboarh, "EAAP: Efficient Anonymous Authentication withConditional Privacy-preserving Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 18, pp. 2467–2476, 2017.

[30] L. Zhang et al., "Distributed Aggregate Privacy-preserving Authentication in VANETs," IEEETransactions on Intelligent Transportation Systems, vol. 18, pp. 516–526, 2016.

[31] M. Bayat et al., "A New and Efficient Authentication Scheme for Vehicular Ad Hoc Networks,"Journal of Intelligent Transportation Systems, vol. 24, pp. 171–183, 2020.

[32] M. Bayat, M. Pournaghi, M. Rahimi and M. Barmshoory, "NERA: A New and Efficient RSU-basedAuthentication Scheme for VANETs," Wireless Networks, vol. 26, pp. 3083–3098, 2020.

[33] S. M. Pournaghi et al., "NECPPA: A Novel and Efficient Conditional Privacy-preserving AuthenticationScheme for VANET," Computer Networks, vol. 134, pp. 78–92, 2018.

[34] M. A. Al-Shareeda et al., "SE-CPPA: A Secure and Efficient Conditional Privacy-preservingAuthentication Scheme in Vehicular Ad Hoc Networks," Sensors, vol. 21, p. 8206, 2021.

[35] D. He, S. Zeadally, B. Xu and X. Huang, "An Efficient Identity-based Conditional Privacy-preservingAuthentication Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics and Security, vol. 10, pp. 2681–2691, 2015.

[36] M. R. Asaar, M. Salmasizadeh, W. Susilo and A. Majidi, "A Secure and Efficient AuthenticationTechnique for Vehicular Ad-hoc Networks," IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5409–5423, 2018.

[37] M. A. Al-Shareeda, M. Anbar, S. Manickam and I. H. Hasbullah, "Towards Identity-based ConditionalPrivacy-preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Access, vol. 9, pp. 113226–113238, 2021.

[38] M. A. Al-Shareeda, M. Anbar, M. A. Alazzawi, S. Manickam and A. S. Al-Hiti, "LSWBVM: ALightweight Security without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network," IEEE Access, vol. 8, pp. 170507-170518, DOI: 10.1109/ACCESS.2020.3024587, 2020.

[39] J. S. Alshudukhi, B. A. Mohammed and Z. G. Al-Mekhlafi, "Conditional Privacy-preservingAuthentication Scheme without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC)," IEEE Access, vol. 8, pp. 222032–222040, 2020.

[40] M. Alazzawi, H. Lu, A. Yassin and K. Chen, "Efficient Conditional Anonymity with Message Integrity and Authentication in a Vehicular Ad hoc Network," IEEE Access, vol. 7, pp. 71424–71435, 2019.

[41] M. A. Alazzawi et al., "ID-PPA: Robust Identity-based Privacy-preserving Authentication Scheme for aVehicular Ad-Hoc Network," Proc. of Advances in Cyber Security (ACeS 2020), Part of Book Series: Communications in Computer and Information Science, vol. 1347, DOI: 10.1007/978-981-33-6835-4_6, Springer, Singapore, 2021.

[42] J. S. Alshudukhi, Z. G. Al-Mekhlafi and B. A. Mohammed, "A Lightweight Authentication with Privacy-preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography," IEEE Access, vol. 9, pp. 15633–15642, 2021.

[43] J. Cui, J. Chen, H. Zhong, J. Zhang and L. Liu, "Reliable and Efficient Content Sharing for 5G-enabledVehicular Networks," IEEE Trans. on Intelligent Transportation Syst., vol. 23, no. 2, pp. 1–13, 2020.

[44] J. Cui, X. Zhang, H. Zhong, Z. Ying and L. Liu, "RSMA: Reputation System-based Lightweight MessageAuthentication Framework and Protocol for 5G-enabled Vehicular Networks," IEEE Internet of Things J., vol. 6, no. 4, pp. 6417–6428, 2019.

[45] J. Zhang, H. Zhong, J. Cui, M. Tian, Y. Xu and L. Liu, "Edge Computing-based Privacy-preservingAuthentication Framework and Protocol for 5G-enabled Vehicular Networks," IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7940–7954, 2020.

[46] M. A. Al-Shareeda et al., "CM-CPPA: Chaotic Map-based Conditional Privacy-preservingAuthentication Scheme in 5G-enabled Vehicular Networks," Sensors, vol. 22, no. 13, p. 5026, 2022.

[47] M. A. Al-Shareeda et al., "Efficient Conditional Privacy Preservation with Mutual Authentication inVehicular Ad Hoc Networks," IEEE Access, vol. 8, pp. 144957–144968, 2020.

[48] M. A. Alazzawi, H. Lu, A. A.Yassin and K. Chen, "Robust Conditional Privacy-preservingAuthentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks," KSII Trans. on Internet and Information Systems, vol. 13, no. 12, DOI: 10.3837/tiis.2019.12.018, 2019.

[49] T.-Y. Wu, Z. Lee, L. Yang and C.-M. Chen, "A Provably Secure Authentication and Key ExchangeProtocol in Vehicular Ad Hoc Networks," Security and Communication Networks, vol. 2021, no. 1, p. 9944460, 2021.

[50] S. M. Karim et al., "BSDCE-IoV: Blockchain-based Secure Data Collection and Exchange Scheme forIoV in 5G Environment," IEEE Access, vol. 11, pp. 36158-36175, 2023.

[51] Y. Salami, V. Khajehvand and E. Zeinali, "SAIFC: A Secure Authentication Scheme for IOV Based onFog-cloud Federation," Security and Communication Networks, vol. 2023, no. 1, p. 9143563, DOI: 10.1155/2023/9143563, 2023.

[52] Q. Xie and J. Huang, "Improvement of a Conditional Privacy-preserving and Desynchronization-Resistant Authentication Protocol for IoV," Applied Sciences, vol. 14, no. 6, p. 2451, 2024.