Secure Communication Protocol for Smart Transportation Based on VC]Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud

12/30/2019
by   Trupil Limbasiya, et al.
IIT Rajasthan
BITS Pilani
0

The pioneering concept of connected vehicles has transformed the way of thinking for researchers and entrepreneurs by collecting relevant data from nearby objects. However, this data is useful for a specific vehicle only. Moreover, vehicles get a high amount of data (e.g., traffic, safety, and multimedia infotainment) on the road. Thus, vehicles expect adequate storage devices for this data, but it is infeasible to have a large memory in each vehicle. Hence, the vehicular cloud computing (VCC) framework came into the picture to provide a storage facility by connecting a road-side-unit (RSU) with the vehicular cloud (VC). In this, data should be saved in an encrypted form to preserve security, but there is a challenge to search for information over encrypted data. Next, we understand that many of vehicular communication schemes are inefficient for data transmissions due to its poor performance results and vulnerable to different fundamental security attacks. Accordingly, on-device performance is critical, but data damages and secure on-time connectivity are also significant challenges in a public environment. Therefore, we propose reliable data transmission protocols for cutting-edge architecture to search data from the storage, to resist against various security attacks, and provide better performance results. Thus, the proposed data transmission protocol is useful in diverse smart city applications (business, safety, and entertainment) for the benefits of society.

READ FULL TEXT VIEW PDF

Authors

page 3

12/30/2019

Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud

The pioneering concept of connected vehicles has transformed the way of ...
07/20/2020

B-FERL: Blockchain based Framework for Securing Smart Vehicles

The ubiquity of connecting technologies in smart vehicles and the increm...
03/09/2020

Danger Aware Vehicular Networking

IEEE 802.11p is one of the key technologies that enable Dedicated Short-...
12/28/2017

A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

Public key infrastructure (PKI) is the most widely used security mechani...
07/23/2019

Towards Secure IoT: Securing Messages Dissemination in Intelligent Traffic Systems

A few years ago, Automotive area in the IoT was seen as theoretical conc...
08/25/2020

Platoon–assisted Vehicular Cloud in VANET: Vision and Challenges

Intelligent connected vehicles equipped with wireless sensors, intellige...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

1 Introduction

The vehicular ad-hoc network (VANET) is a specific environment for vehicle users to exchange messages (of traffic information, weather situations, road conditions, etc.) with other nearby vehicles and road-side-units (RSUs). The VANETs include two types of communications as V2I (vehicle-to-infrastructure) and V2V (vehicle-to-vehicle), which are done using dedicated short-range communications (DSRC) over the physical layer and the data link layer of the OSI model [1]. The VANET has various applications, e.g., road safety, driver assistance, payment, curve speed warning, lane change warning, emergency status, forward collision, store location, etc. Thus, an intelligent transport system (ITS) is an essential application of VANETs [2], [3]. There are two communication components, i.e., RSU and OBU (on-board-unit). An RSU is available on the road network to transmit information to nearby vehicles. An OBU is installed in a vehicle to transfer messages to nearby RSUs and other OBUs.

By 2020, it is anticipated that 75% car of the world will be enabled with web services. Hence, vehicle users can perform different day-to-day operations (entertainment, data sharing, payment, online shopping, social media, etc.) over the Internet in a vehicle. The Internet of Vehicles (IoV) structure was proposed to revolutionize existing research fields (wireless sensor, VANET, infrastructure, and mobile device) by connecting them with smart transportation using different communication technologies (i.e., DSRC, wireless access points (WAP), and 4G/5G). It is designed with five diverse communications, i.e., V2V, V2I, V2R (vehicle-to-RSU), V2M (vehicle-to-mobile device), and V2S (vehicle-to-wireless sensor). This architecture has different features for on the fly data transmissions, i.e., direct connection with the end-user, different communication types, extended communication range, advanced applications, and network/data awareness [4], [5]. All these IoV communications happen publicly, and therefore, security comes into the picture to preserve data and user security in terms of data verification, user authentication, message confidentiality, on-time data access, and non-repudiation. [6]. Further, data is transmitted between two entities in the IoV architecture, and it is not saved anywhere for future usage. Consequentially, this data is useful for only two objects temporary. In other words, this data has limited usage for a specific time and two users only.

In the fast-growing world, the VCC architecture was proposed to fulfill storage requirement on-demand on the road. In the VCC structure, three components (vehicular cloud (VC), OBU, and RSU) are connected to enhance the vehicular communication system. Here, we have primarily three communications (vehicle-to-RSU, vehicle-to-vehicle, and RSU-to-VC) to transfer data over an insecure channel [7], [8], [9]. Accordingly, vehicle users have transportation-related services using the VCC architecture. After studying different VCC structures as discussed in [7], [8], [9], [10], [11], and [12], we understand that these architectures have limited scope in communication. Besides, the VCC framework has different security and performance challenges [13].

Therefore, vehicle users should have an extensive system to communicate with the VC systematically anytime around the world for a better society. Hence, we suggest with a comprehensive vehicular cloud computing (CVCC) system, which is responsible for exchanging data between different devices (OBU, RSU, VC, and government). Communications are carried out using DSRC, 4G/5G, and WAP technologies in the CVCC framework (see Figure 1). The VC is practiced to execute large-scale operations and to save meaningful data securely. Then, this data can be referred as an input for multiple purposes (e.g., road safety, emergency message transmission, optimization of traffic signals, toll plaza payment, future city development, tax payment, etc.). Therefore, the suggested VC architecture is a knowledge city for the society by connecting the automotive industry, ubiquitous technological systems, and smart governance system.

Figure 1: The proposed CVCC architecture.

2 Literature Survey

In the last two decades, researchers have focused more on VANET due to different real-world applications. Further, there are many research and developments projects, which are already implemented in the EU, Japan, the United States, and other countries in the world but there are vital challenges (large-level data transmission and security) [3], [14]. Therefore, the communication scope of VANET is limited. Next, an adversary has an opportunity to perform various security attacks (e.g., impersonation, modification, replay, man-in-the-middle, plain-text, password guessing, session key disclosure, etc.) in VANETs.

To deal with multiple security problems, Zhang et al. [15] came up with a new communication system through an RSU, but this method failed to achieve security for attacks (man-in-the-middle and replay). Further, the protocol [15] expects a high amount of memory to save essential parameters, and the execution of this scheme is time-consuming. Similarly, researchers proposed different communication methods to deal with various problems in VANETs [16]. Accordingly, a good number of communication/authentication schemes are proposed for VANETs with distinct advantages and drawbacks. However, most of the systems are vulnerable to different attacks, and they need improvements in different performance measure.

Researchers ( [7], [8], [9], [10], [11], and [12]) suggested different VCC architectures to enhance the VANET system. Authors ( [7], [9], and [12]) came up with a new VCC structure with different communications (three - V2V, V2R, and RSU2VC; two - V2R and RSU2VC; two - V2R and RSU2VC;) respectively. Next, other researchers ( [8], [10], and [11]) suggested a VCC framework and did security analysis on them. Three communications (V2V, V2R, and RSU2VC) are available in [8] and [10]. Four communications (V2V, V2R, V2M, and RSU2VC) are present in [11]. Moreover, the performance measure (i.e., implementation time, communication overhead, storage cost, and energy consumption) of the VCC architecture is not discussed in [7], [9], [10], and [12]. Next, other researchers ( [8], [11], and [13]) have discussed on the performance measure but they expect more resources to put into the practice. Further, Yan et al. [13] only discussed on security by considering the VCC framework (of three communications - V2V, V2R, and RSU2VC).

According to [5], five communications are available in the IoV framework, and they are some data transmission schemes ( [17], [18], [19], [20]) in which they have referred the IoV concept, but they have not designed data transmission protocols for all five communications. In [17], they proposed data transmission schemes for V2V, V2R, and vehicle-to-home. In [18], Liu et al. suggested a communication method for V2V only using different high-computational cryptographic techniques. As a result, this scheme [18] is highly time-consuming, and thus, it is not appropriate in real-life applications. Ruan et al. [19] came up with an authentication protocol using wireless sensors, and data is transmitted to the server through a cluster head from a wireless sensor. Then, the server sends data to RSUs and OBUs. Hence, vehicle users cannot communicate directly with other IoV components. Further, this scheme [19] provides two communications, and it is insecure to multiple security attacks. In [20], they proposed a data transmission system for two communications (V2R and V2V). In V2V communication, a vehicle sends data to an RSU, and then, it transfers messages to nearby vehicles. Hence, the scheme [20] does not provide a facility to exchange messages between vehicles directly. Further, this protocol does not resist to basic attacks (i.e., concatenation, modification, replay, and impersonation). After doing analysis on these schemes ( [17], [18], [19], [20]), we understand that all these methods are not effective in security and performance.

3 Problem Statement and Objectives

From the literature survey, we understand that many of the communication schemes (of VANET, IoV, VCC) are inefficient for data transmissions due to its poor performance results. Further, these protocols cannot withstand against various security attacks, e.g., man-in-the-middle, replay, password guessing, session key disclosure, impersonation, chosen cipher-text, Sybil, modification, insider, etc.

Next, data transmissions (in mobile computing) happen using cellular technology at 900/1800 MHz band with individual the capacity of 200 kHz, the data rate up to 2 Mbps and latency of 1.5 to 3.5 seconds. Further, a mobile device firstly sends data to a base station, and then, this base station transfers data to the receiver. Hence, there is no direct communication between (sender and receiver) in mobile computing. Thus, data transmissions are generally less efficient through mobile cellular technology in VANET. Moreover, wireless fidelity (Wi-Fi) is practiced for vehicular communications. In this, IEEE 802.11a provides a data rate of 54 Mbps at 5 GHz; IEEE 802.11b works at 2.4 GHz by delivering a data rate up to 11 Mbps, and IEEE 802.11g achieves 54 Mbps data rate at 2.4 GHz. However, Wi-Fi should be used in a limited manner because it has a communication range of 140 meters, which is not entirely suitable for the VANET structure. Vehicular communications are accurately carried out using DSRC with a range of 75 MHz of the spectrum (5.850-5.925 GHz) directly. The 75 MHz spectrum is divided into seven channels, and each channel has the capacity of 10 MHz. Further, DSRC supports a data rate of 27 Mbps, and latency is 200 microseconds. Hence, DSRC can be used to transmit messages efficiently on the road.

Further, data has limited usage for two entities temporary in VANETs and IoV. Next, the VCC provides a storage facility for OBU or RSU, but not both vehicular components (RSU and OBU) in the same architecture in the fast-growing world. It is essential to provide VC resources to both (OBU and RSU) because OBUs are installed in an individual vehicle and hence, vehicle users may have an opportunity to bogus data to the VC. Consequently, future operations might be misled using stored false data in the VC.

Generally, vehicular data transmissions happen over an insecure channel, and hence, it is also essential to achieve significant security level of the communication method. Thus, we need reliable communication protocols for the CVCC system. To deal with security and performance, we formulate our research and development objectives as follows.

  • Propose secure and cost-effective vehicular communication schemes (V2R, V2VC, V2V, and R2VC).

  • Do security evaluations and performance analysis (execution time, communication and storage cost) on the proposed data transmission protocols.

4 Research Methodology and Approach

To overcome different performance and security drawbacks, we propose a reliable data transmission system for smart city applications by covering four different communications (V2V, V2R, RSU2VC, and V2VC). To design and develop these communications, we use cryptographic operations, i.e., one-way hash function (), bit-wise XOR (), and concatenation (), symmetric/asymmetric cryptography, bi-linear pairing, and elliptic curve cryptography (ECC). The VC data transmission system mainly consists of three phases as (1) initialization (2) registration and (3) message communication. Some existing data transmission protocols in VANETs are discussed in [15], [18], [21], [22], [23].

  1. Initially, the registration authority (RA) generates and computes basic parameters to deploy RSUs on the road.

  2. In the registration process, different users enroll with the RA for future communications. Then, the RA puts an OBU and a tamper-proof-device (TPD) in a user’s vehicle during the registration phase. An OBU consists of public parameters (of the RA), and a TPD includes a vehicle user’s some secret computed parameters.

  3. The message communication phase includes three steps namely, (a) login and authentication at the sender side (b) message/request generation by the sender and (c) verification by the receiver and key-agreement at both sides (receiver and sender).

    1. A vehicle user inserts his/her identity and password in an OBU. Next, the system confirms the correctness of these credentials, and if valid, then it proceeds to the next step. Otherwise, it ends the session directly.

    2. The system generates a message request using a time-stamp and sends it to the receiver.

    3. The receiver (e.g., RSU/vehicle/VC) confirms the received message request and its sender. If valid then only, both (sender and receiver) generates a temporary session key using confidential credential(s), random nonce (agreed mutually), and time-stamp to start a communication with each other.

Our work plan is divided into four phases. The first phase is to design communication protocols for V2R, V2VC, V2V, and R2VC. In the second phase, the security analysis is done on these data transmission schemes using the random oracle model and security tools (AVISPA [24] and ProVerif [25]). In the third phase, the proposed protocols are implemented on the test-bed set-up to check their execution time, communication overhead, storage cost, and energy consumption. An efficient data searching algorithm is designed to retrieve vital information from the VC (for a requested query), and this algorithm is verified for its efficiency to implement for vehicle users in the fourth phase.

We have proposed an efficient and secure communication scheme for V2R communication, as discussed in [26], and this protocol work resists to various cyber-attacks, i.e., plain-text, man-in-the-middle, impersonation, modification, and replay. Further, the suggested protocol [26] is also feasible to verify a massive number of messages at a time precisely, and it performs excellently in the implementation cost, energy consumption, communication overhead, and storage cost compared to other relevant data transmission mechanisms.

According to the work plan, we have proposed a communication protocol [27] for vehicle users using the batch verification concept, in which a vehicle user can share vital information to nearby RSUs and other OBUs on the road. Further, this proposed scheme resists to impersonation, modification, replay, man-in-the-middle, password guessing, and stolen device attacks without using a TPD. Besides, the method [27] requires less computational resources, i.e., execution cost, communication overhead, storage cost, and energy consumption compared to relevant data transmission methods.

We came up with an effective V2V communication scheme [28] using a one-way hash function, in which a vehicle user sends meaningful information to nearby OBUs over a common channel. Moreover, this scheme is designed to preserve security requirements (i.e., authentication and integrity) in the communication system, and we have discussed the security proof of the proposed scheme. Thus, it is resistant to different security attacks, e.g., modification, replay, concatenation, impersonation, password guessing, man-in-the-middle, and stolen OBU attacks. Besides, it can be implemented without using a TPD with less computational resources for V2V communications. Hence, the protocol [28] is highly useful on the highway to transfer important messages to other vehicles.

We have proposed a V2R data transmission protocol [29] using the EC concept and one-way hash function to exchange road-side and other relevant data between a vehicle user and an RSU. Moreover, it can withstand different security attacks, e.g., session key disclosure, replay, man-in-the-middle, impersonation, and modification. Further, it takes less computational resources for the implementation compared to other relevant communication protocols. Therefore, the scheme [29] can be used for efficient and secure communications in smart transportation applications for a sustainable environment.

References

  • [1] Kenney, J. B. (2011). Dedicated short-range communications (DSRC) standards in the United States. Proceedings of the IEEE, 99(7), 1162-1182.
  • [2] Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., & Weil, T. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE communications surveys & tutorials, 13(4), 584-616.
  • [3] Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2014). A comprehensive survey on vehicular ad hoc network. Journal of network and computer applications, 37, 380-392.
  • [4] Gerla, M., Lee, E. K., Pau, G., & Lee, U. (2014). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In 2014 IEEE world forum on internet of things (WF-IoT) (pp. 241-246). IEEE.
  • [5] Kaiwartya, O., Abdullah, A. H., Cao, Y., Altameem, A., Prasad, M., Lin, C. T., & Liu, X. (2016). Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects. IEEE Access, 4, 5356-5373.
  • [6] Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Xu, J., Yongping, X., & Cui, X. (2017). Attacks and countermeasures in the internet of vehicles. Annals of Telecommunications, 72(5-6), 283-295.
  • [7] Lee, E., Lee, E. K., Gerla, M., & Oh, S. Y. (2014). Vehicular cloud networking: architecture and design principles. IEEE Communications Magazine, 52(2), 148-155.
  • [8] Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer applications, 40, 325-344.
  • [9] He, W., Yan, G., & Da Xu, L. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), 1587-1595.
  • [10] Mekki, T., Jabri, I., Rachedi, A., & ben Jemaa, M. (2017). Vehicular cloud networks: Challenges, architectures, and future directions. Vehicular Communications, 9, 268-280.
  • [11] Fan, K., Wang, X., Suto, K., Li, H., & Yang, Y. (2018). Secure and efficient privacy-preserving ciphertext retrieval in connected vehicular cloud computing. IEEE Network, 32(3), 52-57.
  • [12] Jiang, Z., Zhou, S., Guo, X., & Niu, Z. (2018). Task replication for deadline-constrained vehicular cloud computing: Optimal policy, performance analysis, and implications on road traffic. IEEE Internet of Things Journal, 5(1), 93-107.
  • [13] Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284-294.
  • [14] Hartenstein, H., & Laberteaux, L. P. (2008). A tutorial survey on vehicular ad hoc networks. IEEE Communications magazine, 46(6), 164-171.
  • [15] Zhang, C., Lin, X., Lu, R., & Ho, P. H. (2008). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In 2008 IEEE international conference on communications (pp. 1451-1457). IEEE.
  • [16] Manvi, S. S., & Tangade, S. (2017). A survey on authentication schemes in VANETs for secured communication. Vehicular Communications, 9, 19-30.
  • [17] Alam, K. M., Saini, M., & El Saddik, A. (2015). Toward social internet of vehicles: Concept, architecture, and applications. IEEE access, 3, 343-357.
  • [18] Liu, Y., Wang, Y., & Chang, G. (2017). Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Transactions on Intelligent Transportation Systems, 18(10), 2740-2749.
  • [19] Ruan, N., Li, M., & Li, J. (2017). A novel broadcast authentication protocol for internet of vehicles. Peer-to-Peer Networking and Applications, 10(6), 1331-1343.
  • [20] Wu, H. T., & Horng, G. J. (2017). Establishing an intelligent transportation system with a network security mechanism in an Internet of vehicle environment. IEEE Access, 5, 19239-19247.
  • [21] He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681-2691.
  • [22] Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896-911.
  • [23] Cui, J., Wei, L., Zhang, J., Xu, Y., & Zhong, H. (2018). An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, (99), 1-12.
  • [24] Vigano, L. (2006). Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science, 155, 61-86.
  • [25] Blanchet, B., Smyth, B., Cheval, V., & Sylvestre, M. (2018). ProVerif 2.00: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial, 1-129.
  • [26] Limbasiya, T., & Das, D. (2019). Secure message confirmation scheme based on batch verification in vehicular cloud computing. Physical Communication, 34, 310-320.
  • [27] Limbasiya, T., & Das, D. (2019). ESCBV: energy-efficient and secure communication using batch verification scheme for vehicle users. Wireless Networks, 1-12.
  • [28] Limbasiya, T., & Das, D. (2019). Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication. IEEE Systems Journal, 1-10.
  • [29] Limbasiya, T., & Das, D. (2019). Identity Based Proficient Message Verification Scheme for Vehicle Users. Pervasive and Mobile Computing.