The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet of vehicles and provides better experience for users. However, there are still many security problems in social vehicle networking environments. Once the vehicle is networked, the biggest problem is data security according to the three levels of data collection, intelligent analysis, and decision control of the Internet of vehicles. Recently, Wu et al. proposed a lightweight vehicle social network security authentication protocol based on fog nodes. They claimed that their security authentication protocol could resist various attacks. However, we found that their authentication protocols are vulnerable to internal attacks, smart card theft attacks, and lack perfect forward security. In this study, we propose a new protocol to overcome these limitations. Finally, security and performance analyses show that our protocol perfectly overcomes these limitations and exhibits excellent performance and efficiency.
At the Information Society Summit held in 2005, the International Telecommunication Union formally introduced the concept of the Internet of Things in the form of an Internet report. is based on the Internet, which uses radio frequency automatic identification, wireless data communication, and other technologies, to achieve automatic identification of objects and information interconnection and sharing, to build a “Internet of things” that encompasses everything in the world. The scope of application of the is gradually expanding, and its application in various industries, agriculture, transportation, and others has promoted the development of intelligence in these fields, making resources allocation more rational and improving the efficiency of these industries. The application in life-related areas, such as smart warehouses, smart medical care, smart electricity, and tourism services has substantially improved the quality of people’s lives, from the scope of services and the way they are provided to the quality of services. Fog computing is an extension of cloud computing, an IoT-based distributed computing infrastructure that can use devices in edge networks to enable the delivery of data with extremely low latency. The application of fog computing reduces inter-network distances, increases efficiency, and reduces the amount of data required to be transmitted to the cloud for processing, analysis, and storage. Fog nodes are a key component of the fog computing architecture, and they can appear in different forms and be deployed in a variety of environments.
The Internet of Vehicles is an automotive mobile technology that provides different functional services in the operation of vehicles through advanced sensor technology, communication technology, data processing technology, network technology, and information dissemination technology. The devices on the vehicles effectively use the information in the network platform. The can provide spacing between vehicles and reduce the risk of collisions; it can help vehicle owners navigate in real-time and improve the efficiency of traffic operations by communicating with other vehicles and network systems. With the advances in the application of , technology is being combined with social networks to form a new network called the social Internet of things . The will include not only the association of things and things and people, but also introduces the relationship between people and people, thus better depicting the connected world of all things. is a new application of IoT technology in social networks. Ordinary objects in our lives can be informatized in real-time using IoT’s sensing and monitoring technology, and the information of the objects can be displayed online through network technology, cloud computing technology, and cloud storage technology.
With the development of modern technology, the also requires the organic combination of traditional functions and social networking of vehicles, resulting in the rise of social networking of vehicles . The is a social approach to increase the viscosity of the user, thereby maintaining the profitability of and the related information reserve.
provides better resources and services for the development of . Telematics can be better implemented and telematics services can be better enhanced, only by continuously improving the functions of social telematics enhancing the popularity of telematics. In the environment, relevant information is entered into the telematics database in the background, and then the vehicle owner can use the telematics social services like a social software, which can always keep learning to obtain information and help the vehicle owner to improve the efficiency of the trip, and even enable the vehicle’s remote pre-diagnosis of itself to improve safety. The typical structure of is shown in Figure 1, which mainly includes vehicle, roadside unit , a fog node, and a cloud server . The cloud server is an infrastructure as a service (IaaS) service that integrates computing, storage, and network resources based on a service that provides an elastic cloud technology with customizable cloud hosting configurations. Vehicles are tangible users and beneficiaries. Vehicles can communicate with each other and owners can access information, share location, and so on, to make travel safer and smarter. The can collect information about nearby vehicles, send it to the fog node, and receive information from the fog node. In the telematics environment, the deployment of fog nodes is strongly influenced by geographical location; however, the prevalence of content within the coverage area varies greatly, because fog nodes are usually deployed in different areas and the cached content has certain geographical characteristics. A fog node is responsible for collecting and processing data of vehicles in a certain area, and subsequently, it transmits the collected data to the cloud server, reducing the computational load on the cloud server.
Typical architecture of SIoV.
However, there are still many security issues in the environment. Once a car is connected, the biggest problem is data security according to the three levels of data collection, intelligent analysis, and decision control. If we want to achieve data interoperability and data sharing, particularly, if we want to achieve decision control, ensuring data security is the most challenging issue of entire vehicle networking. In addition to traditional solution techniques such as authentication and access control, two other typical issues are how to verify the reliability of the data and protect the privacy of the data. This reflects the importance and criticality of data encryption, which encrypts data to achieve data concealment and thus protect data security. Encryption requires negotiation of a common session key between the participating actors to achieve reliable transmission. Wu et al. proposed a fog node–based secure authentication protocol for vehicular social networks and an authentication protocol that ensures user anonymity and security. Wu et al. claimed that their proposed secure authentication protocol was resistant to various attacks. However, we find that their authentication protocol is vulnerable to offline password guessing attacks, smart card theft attacks, and lacks perfect forward security, and there are also some design issues in this scheme. Here, we present these issues and make recommendations.
The main contributions of this article are as follows:
We perform a security analysis of the authentication protocol proposed by Wu et al. for and find that their authentication protocol is vulnerable to insider attacks, smart card theft attacks, and lacks perfect forward security. As a user, we focus on protecting the data anonymity and security of the vehicle, prioritize data security in the protocol design, and propose a new scheme to improve the shortcomings of Wu et al.’s protocol.
We use elliptic curve algorithms to encrypt the transmission of information, which can provide a higher level of security. We use the Real-or-Random model, a formal proof tool, to verify the validity, correctness, and security of the protocol. In addition, a detailed informal analysis shows that our protocol is resistant to known attacks and break-ins.
We also systematically evaluate the protocol’s computational performance and communication costs in addition to other factors, and show that it performs well.
The rest of this article is organized as follows. Section “Related work” presents the related work of this article. Section “Review of Wu et al.’s protocol” briefly describes Wu et al.’s authentication scheme, followed by a thorough cryptanalysis of Wu et al.’s scheme in section “Cryptanalysis of Wu et al.’s protocol.” In section “Cryptanalysis of Wu et al.’s protocol,” we propose a new scheme to improve the shortcomings of the old scheme. In section “Security analysis,” we perform a security analysis, which includes a formal analysis, security requirements analysis, and a security comparison, to demonstrate the security and stability of the new protocol in terms of these three aspects. In section “Performance evaluation,” we analyze the security and performance of the new protocol in terms of both performance evaluation and communication cost evaluation. Finally, we summarize the work in section “Conclusion.”
Related work
With the advancement of the application of , technology is combined with social networks to form a new network, that is, . With the combination of the IoV and , the social IoV has gradually emerged. Because the environment, environment, and environment have been proposed, many researchers have attempted studying how to realize data transmission safely and efficiently. Therefore, various authentication protocols have been proposed to protect the security and privacy of data transmissions.
In 2014, Yang et al.1 presented an abstract network model for , described the technologies needed to create , and different applications based on existing technologies, presented several open research challenges, and considered the development of in future domains. In 2015, Sun et al.2 reviewed IoV-related security and privacy developments, including security and privacy requirements, types of attacks and solutions, and described the future IoV-related security and privacy developments and challenges. In 2017, Contreras-Castillo et al.3 presented IoV-related architectures, protocols, and security and introduced communication protocols that enable seamless integration and operation of . Dandala et al.4 described the relation between the environment and traffic management, and provided an IoV-based traffic management solution to overcome serious traffic management problems in real-life. Ferrag et al.5 provided an overview of the previously proposed IoV-related protocols and classified these protocols according to the target environment, identified remaining issues, and proposed future directions for the research. In 2019, Chandrakar et al.6 proposed a secure authentication protocol for vehicle ad hoc networks and claimed that the protocol is secure and efficient. In 2020, Xu et al.7 proposed a blockchain-based protocol for RSU-assisted authentication and key management in vehicle networks, which they claimed to have low computational overhead, high efficiency, high authentication efficiency, and resistance to various common attacks.
Some of the research on is presented below. In 2011, Atzori et al.8 presented the research concept of and a preliminary architecture for achieving in an object structure that follows the definition of potential social responsibility. In 2012, Atzori et al.9 again presented the concept, architecture, and network of and analyzed the characteristics of the network structure through simulations. In 2015, Nitti et al.10 discussed the link selection problem in , proposed heuristic algorithms for local link selection, and proposed a method to dynamically adjust the threshold of the number of connections according to the number of hubs in the network. In 2017, Shen et al.11 proposed a privacy-preserving and lightweight key negotiation protocol based on in social and claimed that the protocol can withstand different types of attacks. In 2019, Park et al.12 proposed a dynamic privacy-preserving key management protocol for the and claimed that the protocol is resistant to a variety of attacks, such as simulations and offline passwords.
This final section presents the research work related to . In 2015, Alam et al.13 presented concepts, structures, and applications of the architecture of environments and provided implementation details and experimental analysis to demonstrate the effectiveness of the proposed system. In 2016, Maglaras et al.14 combined with smart cities, reviewing enabling technologies and key components, and presenting applications that can be deployed in smart cities. In 2018, Butt et al.15 presented a scalable architecture based on the technology and highlighted the importance of technology. In 2020, Ahmed et al.16 proposed an anonymous key negotiation protocol for the environment in and claimed that the protocol is not only lightweight, but also efficient in terms of communication and storage costs of other protocols. In 2021, Wu et al.17 proposed a lightweight authentication key negotiation protocol for vehicular social networks based on fog nodes and claimed the protocol to be lightweight, secure, and efficient.
Review of Wu et al.’s protocol
The main entities included in the protocol are the vehicle, fog node, and cloud server. A fog node can detect unsafe driving behavior in real-time, provide early warning for the behavior, impose appropriate penalty when necessary, and share the pressure of the cloud server. Table 1 lists the symbols used in the protocol. The protocol has three phases as follows: vehicle registration, fog node registration, and login authentication.
Notations used in Wu et al.’s protocol.
Symbol
Description
The ith vehicle
The jth fog node
Cloud server
Identities of , , and
Password of the
Shared key of and
Secret key of
Counter value of
Session key
Vehicle registration phase
The registration process of the vehicle is described as follows:
First, vehicle inputs its identity , password , and a random number , calculates its pseudo-identity , and then transmits the to through the secure channel.
receives , calculates the value of , initializes the value of to 0, and stores in its database. Finally, sends to .
receives . Using , , , and , it calculates the value , replaces with the value of , and stores the in its smart card.
Fog node registration phase
The registration process of the is described as follows:
First, fog node inputs its identity and a random number , by and , calculates its pseudo-identity , and sends to .
receives , selects a random number , calculates the value of , , and , and stores in its database. Finally, sends to .
receives {, , , }, calculates the value and , and stores the { } in its database.
Login and authentication phase
In the login and authentication phase, , , and complete authentication and establish session key , which is described as shown in Figure 2.
First, inputs its identity , password , according to , , and , calculates , and then compares . If equal, then logs successfully. After successful login, selects a random number and calculates , , and . Finally, sends the login request } to through a common channel.
receives , selects a random number , according to , , , and , calculates , , and finally sends to .
After receives , indexes according to , then calculates , , , checks . If it is equal, then is legal. Otherwise, the authentication process is terminated. calculates and compares . If it is equal, it means that believes that is legal. Otherwise, the authentication process is terminated. After authenticating and , calculates , , , selects a random number , and calculates , , , , , then updates , and sends message to .
receives , calculates , , and , and checks . If it is equal, it means that believes that is legal. Otherwise, the authentication process is terminated. Finally, sends message to .
receives , then calculates , , , and checks . If equal, it means that believes that and are legal. Otherwise, the authentication process is terminated. Finally, updates .
Login and authentication phase.
Cryptanalysis of Wu et al.’s protocol
This section focuses on various security flaws in the attacker model, Wu et al.’s protocol. Wu et al. claimed that it is secure against common attacks and is safe and efficient. However, we show that Wu et al.’s protocol does not resist insider attacks and smart card theft attacks and does not ensure perfect forward security.
Threat model
In this study, we define a potential attacker as . He may be an external attacker who listens to or intercepts data, or a staff member or privileged user inside the server or fog node. When acts as an external attacker, he can eavesdrop and intercept messages in the public channel without being detected by the subject protocol, can send or forge messages, and can participate in the operation of the protocol as a legitimate protocol participant. This is partially similar to the capabilities of the attacker assumed by the model. When acts as an insider attacker, he may have some privilege to access parts of the server or fog node as part of the system participants. Based on existing research, we assume that has the following capabilities:
can eavesdrop and intercept information transmitted through the public channel, and can forge, modify, delete, redirect, or replay messages transmitted through the public channel.18
When a smart card or vehicle is lost or stolen, can obtain the parameters and useful information that is stored in a smart card or vehicle.19
may be a legitimate but malicious administrator or privileged user.20
Insider attack
In an insider attack, the server can also be used as an attacker to steal user information, for example, by collecting the identifier and password submitted by the user during the registration phase and by collecting information from the user’s smart card.21
Assuming that is an internal person, he can obtain the information stored in the smart card . The attacker can guess the password repeatedly, calculate the authentication value, and complete the password guessing through the following steps:
Step 1: intercepts the information and transmitted to the common channel, and then calculates that passes .
Step 2: because obtains , and , can try to enter the value of to calculate .
Step 3: compares and verifies the calculated with to obtain .
Step 4: after obtains , also knows , thus, he calculates and verifies . If the verification is successful, obtains and .
Therefore, attacker can complete the password guessing.
Lack of perfect forward security
Forward security means that the leakage of a long-used master key does not lead to the leakage of a past session key . Forward security protects communications performed in the past from the threat of future exposure of passwords or keys.22,23
We assume that the attacker can steal , , and in the login and mutual authentication phases because they are transmitted over a common channel. The attacker can calculate session key using the following steps:
Step 1: the attacker can obtain by the first attack, and then obtain by calculating .
Step 2: obtain by calculating .
Step 3: obtain by calculating .
Therefore, the attacker can calculate the correct session key .
Smart card theft attack
A smart card theft attack occurs when secret information stored on a smart card is obtained by some unethical means, and the attacker uses the information obtained to crack the session key or cause damage to the protocol.23
We assume that the attacker steals the smart card and obtains . The attacker can steal , , and in the login and mutual authentication phase because they are transmitted over a common channel. The attacker can calculate session key using the following steps:
Step 1: the attacker can obtain by the first attack, and then obtain by calculating .
Step 2: obtain by calculating .
Step 3: obtain by calculating .
Therefore, the attacker can calculate the correct session key .
The proposed protocol
In this section, we elaborate the various components of the protocol. First, the protocol involves three constituent entities as follows: (1) the vehicle , (2) the fog node , and (3) the cloud server . can establish a session key with the cloud server via the fog node, and then can exchange information to obtain useful information, such as real-time road conditions and weather conditions. is the equivalent of a trusted intermediary between and , which verifies the legitimacy of , accepts authentication and requests from and sends them to or receives feedback from and sends them to . has the function of processing data, saving and transmitting information, and it plays an important role in the protocol. registers the legal identity of and in the registration phase and provides legal authentication and key establishment for and in the authentication phase. The protocol consists of the following parts: (1) vehicle registration phase, (2) fog node registration phase, and (3) login and mutual authentication phase. Table 2 lists the symbols used in the protocol.
Notations used in the improved protocol.
Symbol
Description
The ith vehicle
The jth fog node
Cloud server
Identities of , password of
Identities of
Shared key of and
Secret key of
Session key
The ith timestamp
Hash function
⊕
Bit-wise XOR operation
∥
Concatenate operation
Vehicle registration phase
In the registration phase, sends the registration request to the over a secure channel, and the then computes a series of messages and returns them to , allowing to obtain a legitimate identity. The process diagram for this phase is shown in Figure 3, and the steps are detailed as follows:
First, selects and enters his identity and password , and then transmits to the via a secure channel.
Following receipt of the information from , generates the random number and computes and , and then stores in its own memory and subsequently transmits the random number to via a secure channel.
Following receipt of the information from , generates a random number and then computes and and stores in the smart card. The registration phase is complete.
Vi registration phase.
Fog node registration phase
In preparation for the authentication phase, sends a registration request to the and registers as a legitimate fog node. The detailed process diagram of this phase is shown in Figure 4, and the detailed steps are as follows:
selects a unique identity and then transmits to the through a secure channel.
After receiving the message from , generates a random number and calculates and . Then, stores into memory according to its counterpart and subsequently transmits the message to through a secure channel.
Once receives the information from , he generates the random number and then starts computing , preferably storing in his own memory. This completes the registration phase.
Fj registration phase.
Login and authentication phase
In the login and mutual authentication phase, the on-board login device verifies the correctness of the identifiers and entered by , and only those that pass the verification will be allowed to use the system. During the mutual authentication phase, , , and negotiate a common session key to allow for quick information sharing during subsequent use. This phase is the most important stage of the protocol, and the detailed process is described in Figure 5, and the detailed steps are described as follows:
First, the on-board device verifies the correctness and legitimacy of the user, inputs and , calculates and then verifies that . If they are equal, authentication is successful; otherwise, login is denied.
After completing verification, computes and , and then generates a random number and timestamp . It encapsulates into by computing and then computes and subsequently transmits the message to through the common channel.
Immediately after receiving the message from , verifies the timestamp parameter by computing , then generates the random number and timestamp , computes , , and , and finally the message is transmitted to the via the common channel.
After receiving the message from , verifies the timestamp and calculates , , , , , and , and then verifies that to authenticate the legitimacy and validity of identity by verifying that to determine the legitimacy of the identity of . Then, computes and to generate a random number and timestamp . Once this is complete, generates the session key , . Then calculate , , , and , and then the message is sent to through the common channel.
After receives the message , it starts verifying timestamp , and if passes the verification, the nominal message is considered to be a new and valid message. then computes and verifies that . If the verification passes, is a trusted server; otherwise, rejects the request and aborts the protocol process. If it passes, computes and , and subsequently generates timestamp , computes , and transmits the message to through the common channel.
receives the message back from and verifies the freshness and legitimacy of this message by , and then verifies the legitimacy identity of by computing . If the authentication passes, computes the session key . By completing the aforementioned steps, the login and authentication phase of the protocol is complete, and a common session key is established between the three parties , , and .
Login and authentication phase.
Security analysis
In this section, a formal security analysis, an analysis of security requirements, and a security comparison are performed to demonstrate the security of our proposed scheme. First, the formal analysis uses the real-or-random model, and then the analysis of security requirements demonstrates that our proposed protocol is resistant to insider attacks, smart card theft attacks, and ensures perfect forward security. Finally, by comparing the security of our protocol with that of Ma et al.,24 Jia et al.,25 Eftekhari et al.,26 and Wu et al.,17 we can observe that our protocol is secure and reliable.
Formal security analysis
In this section, the model27 is used to perform a formal security analysis. The model is used to prove the semantic security of the proposed protocol. Using the model, we successfully proved that the session key of the protocol is secure and reliable. Before proving the session key security of the proposed protocol in Theorem 1, we briefly discuss the model.
ROR model
In our model, the attacker is represented by , and the protocol has three participants: the vehicle, fog node, and cloud server and are represented by , , and , respectively. Assuming that denotes the communication between and the protocol entity, then denotes that communicates with the ith instance of the vehicle, denotes that communicates with the jth instance of the fog node, and denotes that communicates with the cloud server. The attacker can also obtain relevant information through the following queries:
, where can intercept and obtain information exchanged or transmitted between communicating entities , , and through the open channel. This query is often used to perform eavesdropping attacks.
: using this query, can send a message to any entity in and obtain the corresponding feedback. can perform man-in-the-middle and simulated attacks.
: in this query, can obtain the corresponding fixed value after executing the query by entering a fixed-length string.
: can send this query to and fetch the private value stored in the smart card of . Furthermore, can send this query to or , which then obtains the long-term private key stored in the cloud server and the temporary information generated by the participant. can perform forward secrecy attacks, privileged insider attacks, stolen smart card attacks, and vehicle simulation attacks with this query.
: using this query, can disclose the session key generated between entities to . can then simulate the known session key to perform the attack.
: can perform this query by flipping a uniformly textured coin ◯. If ◯ is , the attacker will obtain the correct session key. Otherwise, the attacker will receive a null value.
Theorem : if is a function of the dominance of adversary in breaching the security of the proposed authenticated key exchange protocol, then and denote the number of queries performed and the queries performed, respectively. denotes the length of a user’s identity as well as the password, and denote the parameters of Zipf,28 and then
Security proof
Proof
In the following proof, we define six games named GM(i), i ∈ [0, 6], and each game has its own rule. We define (i = 0, 1, 2, 3, 4, 5, 6) to represent the probability of success of the game under each rule. In addition, “’s advantage in winning a match ” is expressed and defined by . The specific proof procedure is as follows:
: in , this round simulates for the actual attack, and because the bit ◯ is selected randomly at the start of , we obtain
: adds the operation to , which is equivalent to intercepting and obtaining information on the public channel {}, and executes the operation, thus, we obtain
: adds the operation to , and can send messages to the entity through the common channel, thus, we can obtain
: adds another operation to , and can use queries to obtain specific values and strings. Using the theory of the birthday paradox, we obtain
: in , we have added the partial functionality of the operation to that allows to obtain the long-term key between and or to crack any random number in the protocol authentication process. Under these conditions, we consider the threats to the session key , verifying that the protocol has perfect forward security and is resistant to known session-specific temporary information attacks.
Perfect forward secrecy: we assume uses queries to obtain the long-term key , and then uses , , , and operations to attempt to obtain the protocol’s session key . After obtains , can obtain in the message on the public channel using the operation, and then to compute . If computes , can compute by . Then, computes to compute . Thus, everything points to , however, as , cannot obtain ; therefore, he cannot compute , and cannot threaten the protocol .
Known session-specific temporary information attacks: we assume uses the query to obtain a random number that is most likely to crack , and then uses the operation to obtain the information and on the common channel. Subsequently, can calculate to obtain , and then calculate to obtain . However, cannot compute or intercept the acquisition of ; thus, cannot threaten the protocol . As a result, the probability of this round is
: in , we have added additional parts of the operation to to allow to access the information stored in the smart card via to verify that the protocol is resistant to offline password guessing attacks. We assume that has access to the information stored on the smart card , because has no other useful information about , cannot decrypt the information about , thus, cannot compute the session key . Using Zipf’s law,28 the probability that succeeds in guessing the user’s password is 1/2, and the probability that can successfully guess the user’s password is greater than 1/2 when the number of bits transmitted ends ≤106. Thus, we obtain
: is used to verify that the proposed protocol is resistant to simulation attacks. In , issues a query to determine whether it is possible to obtain . Here, the game was aborted. Thus, we can obtain the possibility of as
Because has an equal probability of success and failure, the
From the aforementioned formula above, we can obtain
Then, we obtain
Thus, we can use the model to demonstrate that our proposed new protocol is resistant to common attacks (such as smart card theft attacks, offline password guessing attacks, man-in-middle attacks, and known session-specific temporary information attacks) and provides perfect forward security.
Analysis of security requirements
This section presents an analysis of our security requirements for the proposed protocol, which shows that our protocol can withstand attacks that the protocol proposed by Wu et al.17 cannot, as well as other common attacks. In the following, we use to represent the attacker, as demonstrated by the following:
Resist insider attacks
Assuming obtains in the smart card , he can attempt to compute . However, guessing both and is nearly impossible, and would be unable to obtain the user’s identifier and password by collecting information from the user. Thus, our protocol is resistant to internal attacks.
Ensure perfect forward secrecy
In the protocol, assuming that the long-term key of is compromised, can obtain by calculating because is a public channel transmission. However, cannot calculate . This is because in , cannot obtain the value of and cannot compute useful concrete information. Thus, our protocol has a perfect forward security.
Resist stolen smart card attacks
Assuming that obtains the information in smart card . Because cannot obtain identifier and password , cannot decrypt the relevant information about , and thus, cannot compute the session key . Therefore, our protocol is resistant to stolen smart card attacks.
Ensure mutual authentication
During the login authentication phase, , , and can authenticate each other and establish the same session key in a secure manner. The in the message contains information about . receives and encapsulates and its own information in and transmits it to , which authenticates and by verifying and . can achieve authentication of by verifying in the message , and achieves authentication of by verifying in message . Thus, mutual authentication is ensured among the three participants in our protocol.
Ensure user anonymity
In the protocol, we do not use real identity but a pseudo-identity , and no information related to identity is transmitted on the public channel which effectively protects user privacy. If wants to trace , the timestamped validation also prevents from using expired feedback to obtain useful information about the user. Thus, our protocol ensures user anonymity.
Resist replay attacks
Replay attacks can occur during any network communication and are one of the common attacks used by hackers in the computer world. It refers to the attacker sending a packet that has already been received by the destination host for the purpose of spoofing the system, and is mainly used in the authentication process to undermine the accuracy of the authentication. In our protocol, we add timestamps to all messages , to ensure the timeliness and freshness of the transmitted information, to ensure that the transmission of the message is completed within a valid time, and to prevent the attacker from replaying the message to obtain valid feedback. Thus, our protocol can resist replay attacks.
Resist offline password guessing attacks
In the login and authentication phase, must enter both , and , and then compute when logging in. Even if obtains the information in the smart card, it cannot guess both and ; thus, cannot obtain identifier and password through the guessing attack.
Resist known session-specific temporary information attacks
During the login authentication phase, three random numbers are generated: , , and . These three random numbers are also part of the session key. Assuming that learns the random number , he can only obtain by computing and nothing else. Assuming that learns the random number , because and are transmitted on a common channel, can obtain by computing , and then can obtain by computing . However, cannot obtain , and therefore cannot compute . We assume that learns the random number ; however, he cannot compute useful information. Therefore, our protocol is resistant to known session-speculative temporary information attacks.
Resist man-in-the-middle attacks
A man-in-the-middle attack is performed by intercepting normal network communication data and performing data tampering and sniffing without the knowledge of the two parties communicating. In the framework environment, does not authenticate but sends its own authentication information along with that of to , which promptly authenticates and . If tampers with the data during the process, it will be subjected to a double test of the timestamp and authentication. Clearly, will not be able to pass authentication safely and will be denied access. Therefore, our protocol is resistant to man-in-the-middle attacks.
Security comparisons
As shown in Table 3, we compare the security analysis of the protocol and use ✓ and ✗ to indicate whether the protocol meets the relevant security requirements.
Known session-specific temporary information attacks
✗
✗
✓
✓
✓
Resist man-in-the-middle attacks
✓
✓
✓
✓
✓
As shown in the table, the protocol of Ma et al.24 is considered by Eftekhari et al.26 to be unable to resist insider attacks, provide anonymity and untraceability, and resist known session-specific temporary information attacks and stolen smart card/vehicle attacks. Furthermore, the protocol of Jia et al.25 cannot provide mutual authentication and cannot resist known session-specific temporary information attacks. Therefore, in 2021, Eftekhari et al.26 proposed a security-enhanced three-party pairwise shared key agreement protocol for fog-based vehicle communication. They claimed that they can save approximately 23.65% of the computing costs. However, the protocol of Eftekhari et al.26 cannot guarantee perfect forward secrecy. In addition, Wu et al.17 proposed a lightweight authentication key protocol based on a fog node in . In this study, we demonstrated that it cannot guarantee perfect forward security and cannot resist insider attacks and stolen smart card attacks.
Performance evaluation
In this section, we compare the performance of the proposed protocol with the protocol in Table 3, which includes calculation evaluation and communication evaluation. In terms of computing evaluation, we used more real simulation experiments. The use of mobile phones and computers to simulate an environment can more accurately reflect the computing performance of the protocol.
Hardware environment
We used the mobile phone to simulate the on-board equipment, the computer model to simulate the fog node, and the computer model to simulate the cloud server. Table 4 shows the platform used for the equipment.
Simulation platform.
Device
Operating system
Flyme 6.3.5.0A
Windows 10
Windows 10
CPU
Helio X10 Turbo
Pentium(R)CPU E5500@2.80 GHz
Intel(R) i7-8750HCPU@2.20 GHz
Memory
3 GB RAM
2 GB RAM
24 GB RAM
CPU: central processing unit; RAM: random access memory.
Computation evaluation
Based on the aforementioned platform, we also calculated the following cryptographic operations according to the time consumption: hash function, point encryption, symmetric key encryption/decryption, scalar multiplication, and binary pairing. Here, the time consumption of the XOR operation and connection operation is very small to be ignored, and the abbreviations and consumption times corresponding to various operations are shown in Table 5.
Execution time of basic operation.
Operations
Abbreviation
(ms)
(ms)
(ms)
Hash function
0.0049
0.0044
0.0025
Point addition
0.4894
0.1723
0.0527
Encryption/decryption
17.213
11.477
8.094
Scala multiplication
7.983
5.889
3.221
Bilinear pairing
21.607
15.532
8.607
To evaluate the calculation cost of the protocol, we divide the time cost of each protocol into four parts: , , , and the total calculation cost, and calculate the time spent in each part to more accurately reflect the performance of the protocol. The specific calculation costs are shown in Table 6. After a detailed comparison, we can observe that the time cost of our protocol is similar to that of Wu et al.;17 however, our protocol provides higher security and reliability. Compared with Ma et al.,24 Jia et al.,25 and Eftekhari et al.,26 the proposed protocol is much faster and saves considerable computing costs. In addition to saving costs, our protocol can ensure high security, while requiring less time.
In terms of computation cost evaluation, we define the output of the hash function to account for 160 bits, the random/non-random number as 160 bits, the elliptic curve points as 320 bits, the identifier as 64 bits, and the timestamp as 32 bits. The message sent by in our protocol is and the communication cost is [160+160+32], the message sent by is and and the communication cost is [160+160+160+160+160+160+160+32+160+160+32], and the sends a message with with a communication cost of [160+160+160+160+160+32], adding up to a total cost of 2208 bits. After our calculation of the message data size transmitted by the protocol in Figure 6 at each stage, the total calculation is shown in Figure 6. At stage , our protocol spends the least amount of communication, imposing the least amount of computational stress on the vehicle user. In stage , our fog node computational pressure is not significantly different from Wu et al.’s17 protocol; however, it is much better than other protocols and can reduce communication costs. For the cloud server, the communication cost of our protocol is the same as that of Jia et al.25 and is not much different from that of Wu et al.17 in terms of overall communication cost, and our protocol is the least expensive in terms of communication cost, which is less than half of that of Ma et al.24 In short, although our protocol has a negligible difference in computational cost compared to Wu et al.’s protocol, we are better than Wu et al.’s protocol in terms of communication cost, not to mention that our protocol has better security than Wu et al.’s protocol and can withstand attacks that Wu et al. cannot. All things considered, our protocol is very efficient and secure.
Communication cost evaluation.
Conclusion
In this study, we improved the protocol proposed by Wu et al. in social telematics. The improved protocol is a fast and secure authentication protocol based on the fog node that operates in the , which does not ensure perfect forward security and is not resistant to insider and smart card theft attacks. The improved protocol not only compensates for the vulnerabilities and flaws of the existing protocol and can successfully resist attacks that the original protocol cannot, but can also resist replay attacks, insider attacks, simulated attacks, and more aggressive known session-specific temporary information attacks. It also exhibits excellent performance and efficiency in terms of security and computational cost. Therefore, it can be considered more suitable for use in fog-based . Contemporary research needs to address not only connected vehicle problems, but also some ancillary classes of problems, such as high precision maps. Currently, there are technical challenges for high precision maps, as well as policy and regulatory challenges, and this aspect is beyond the scope of this article.
In the future, will become a new starting point and a new pursuit for IoV development. will help vehicles become fully intelligent and greatly improve the user’s travel experience. We should be thankful that we live in an era of rapid social change, and I hope this article will provide a reference to address the security of data.
Footnotes
Handling Editor: Yanjiao Chen
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research,authorship,and/or publication of this article.
Funding
The author(s) received no financial support for the research,authorship,and/or publication of this article.
ORCID iD
Chien-Ming Chen
References
1.
YangFWangSLiJ, et al. An overview of Internet of vehicles. China Commun2014; 11(10): 1–15.
2.
SunYWuLWuS, et al. Security and privacy in the Internet of vehicles. In: 2015 international conference on identification, information, and knowledge in the Internet of Things (IIKI), Beijing, China, 22–23 October 2015, pp.116–121. New York: IEEE.
3.
Contreras-CastilloJZeadallySGuerrero-IbañezJA.Internet of vehicles: architecture, protocols, and security. IEEE Internet Things2017; 5(5): 3701–3709.
4.
DandalaTTKrishnamurthyVAlwanR. Internet of vehicles (IoV) for traffic management. In: 2017 international conference on computer, communication and signal processing (ICCCSP), Chennai, India, 10–11 January 2017, pp.1–4. New York: IEEE.
5.
FerragMAMaglarasLAJanickeH, et al. Authentication protocols for internet of things: a comprehensive survey. Secur Commun Netw2017; 2017: 6562953.
6.
ChandrakarPJainABalivadaS, et al. A secure authentication protocol for vehicular ad-hoc networks. In: 2019 IEEE international conference on electrical, computer and communication technologies (ICECCT), Coimbatore, India, 20–22 February 2019, pp.1–7. New York: IEEE.
7.
XuZLiangWLiKC, et al. A blockchain-based roadside unit-assisted authentication and key agreement protocol for Internet of vehicles. J Parallel Distr Com2021; 149: 29–39.
8.
AtzoriLIeraAMorabitoG.SIoT: giving a social structure to the internet of things. IEEE Commun Lett2011; 15(11): 1193–1195.
9.
AtzoriLIeraAMorabitoG, et al. The social Internet of things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw2012; 56(16): 3594–3608.
10.
NittiMAtzoriLCvijikjIP.Friendship selection in the social Internet of things: challenges and possible strategies. IEEE Internet Things2014; 2(3): 240–247.
11.
ShenJZhouTWeiF, et al. Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of things. IEEE Internet Things2017; 5(4): 2526–2536.
12.
ParkKParkYDasAK, et al. A dynamic privacy-preserving key management protocol for V2G in social Internet of things. IEEE Access2019; 7: 76812–76832.
13.
AlamKMSainiMEl SaddikA.Toward social Internet of vehicles: concept, architecture, and applications. IEEE Access2015; 3: 343–357.
14.
MaglarasLAAl-BayattiAHHeY, et al. Social Internet of vehicles for smart cities. J Sens Actuator Netw2016; 5(1): 3.
15.
ButtTAIqbalRShahSC, et al. Social internet of vehicles: architecture and enabling technologies. Comput Electr Eng2018; 69: 68–84.
16.
AhmedSKumariSSaleemMA, et al. Anonymous key-agreement protocol for V2G environment within social internet of vehicles. IEEE Access2020; 8: 119829–119839.
17.
WuTYGuoXYangL, et al. A lightweight authenticated key agreement protocol using fog nodes in social Internet of vehicles. Mob Inf Syst2021; 2021: 3277113.
18.
DolevDYaoA.On the security of public key protocols. IEEE T Inform Theory1983; 29(2): 198–208.
19.
MessergesTSDabbishEASloanRH.Examining smart-card security under the threat of power analysis attacks. IEEE T Comput2002; 51(5): 541–552.
20.
AzamFYadavSKPriyadarshiN, et al. A comprehensive review of authentication schemes in vehicular ad-hoc network. IEEE Access2021; 9: 31309–31321.
21.
ChenCMLiZChaudhrySA, et al. Attacks and solutions for a two-factor authentication protocol for wireless body area networks. Secur Commun Netw2021; 2021: 3116593.
22.
WuFLiXXuL, et al. A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst J2020; 15(1): 1120–1129.
23.
MasudMGabaGSChoudharyK, et al. Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things2021; 9: 2649–2656.
24.
MaMHeDWangH, et al. An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things2019; 6(5): 8065–8075.
25.
JiaXHeDKumarN, et al. Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel Netw2019; 25(8): 4737–4750.
AbdallaMFouquePAPointchevalD. Password-based authenticated key exchange in the three-party setting. In: International workshop on public key cryptography, Les Diablerets, 23–26 January 2005, pp.65–84. Berlin: Springer.
28.
WangDChengHWangP, et al. Zipf’s law in passwords. IEEE T Inf Foren Sec2017; 12(11): 2776–2791.