The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Ne...
Saved in:
Published in | IEEE open journal of vehicular technology Vol. 4; pp. 1 - 13 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.01.2023
|
Subjects | |
Online Access | Get full text |
ISSN | 2644-1330 2644-1330 |
DOI | 10.1109/OJVT.2022.3217552 |
Cover
Loading…
Abstract | Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure system-key update protocol to restore the whole system when necessary and further that this resists an adversary obtaining any information about the updated system-key. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes. |
---|---|
AbstractList | Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure system-key update protocol to restore the whole system when necessary and further that this resists an adversary obtaining any information about the updated system-key. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes. Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber-attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure systemkey update protocol to restore the whole system when necessary. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes. |
Author | Simpson, Leonie Pieprzyk, Josef Rezazadeh Baee, Mir Ali Foo, Ernest |
Author_xml | – sequence: 1 givenname: Mir Ali orcidid: 0000-0003-1575-7287 surname: Rezazadeh Baee fullname: Rezazadeh Baee, Mir Ali organization: School of Computer Science, Queensland University of Technology, QLD, Australia – sequence: 2 givenname: Leonie orcidid: 0000-0001-8434-9741 surname: Simpson fullname: Simpson, Leonie organization: School of Computer Science, Queensland University of Technology, QLD, Australia – sequence: 3 givenname: Ernest orcidid: 0000-0002-3971-6415 surname: Foo fullname: Foo, Ernest organization: School of Information and Communication Technology, Griffith University, QLD, Australia – sequence: 4 givenname: Josef orcidid: 0000-0002-1917-6466 surname: Pieprzyk fullname: Pieprzyk, Josef organization: Commonwealth Scientific and Industrial Research Organization, Data61, NSW, Australia |
BookMark | eNp9kE1LAzEQhoMoWKs_QLwE76353Ox6K-JHpajo6jXMZic2te5KNh76793aIuLB0wzDPO8wzwHZbdoGCTnmbMw5K87ub1_KsWBCjKXgRmuxQwYiU2rEpWS7v_p9ctR1C8aY0JxzaQakLOdIn9B9xpBWtPX0VFzNpg-ndPKZ5tik4CCFtqFPbo7vSH0b6cvk7rLszukkJXBvHYWmpo_oUvDb5e6Q7HlYdni0rUPyfHVZXtyMZvfX04vJbOSkUWkkc4dVJXhR5IKZrGICZIYGuK5qrwvo5zJTTKPJwTPQWpvaAVe1dIBZZeSQTDe5dQsL-xHDO8SVbSHY70EbXy3E_oUlWicUmAJznXujjFdVbyoTUjsQBrD2fRbfZLnYdl1E_5PHmV1btmvLdm3Zbi33jPnDuJC-FaQIYfkvebIhAyL-XCoKyZXQ8gu5Goo0 |
CODEN | IOJVAO |
CitedBy_id | crossref_primary_10_1007_s12083_024_01726_7 crossref_primary_10_1109_TITS_2023_3306547 crossref_primary_10_3390_cryptography8010005 crossref_primary_10_1002_dac_6125 crossref_primary_10_1109_TVT_2024_3452513 |
Cites_doi | 10.1109/CSCloud.2015.32 10.1007/978-3-642-14623-7_34 10.1109/CCCI52664.2021.9583219 10.1017/CBO9781107360211 10.1109/TVT.2021.3097088 10.1109/TIFS.2021.3087359 10.17487/rfc2898 10.1007/3-540-44448-3_41 10.1016/j.vehcom.2020.100255 10.1109/MCOM.2009.4939288 10.1109/TVT.2015.2402166 10.1186/s13638-015-0353-y 10.17487/rfc7366 10.1007/978-3-319-61273-7_5 10.1109/JSYST.2020.2991168 10.1007/s00521-021-06152-x 10.1109/TVT.2019.2945339 10.1109/TVT.2007.906878 10.1109/MCOM.2009.5307471 10.1109/JIOT.2021.3068268 10.17487/rfc5869 10.1109/JCN.2009.6388411 10.1080/01611194.2012.687431 10.1007/s00145-014-9185-x 10.1109/TDSC.2022.3164436 10.1145/1102219.1102223 10.1109/TIT.2009.2034881 10.1112/plms/s2-42.1.230 10.1109/TWC.2014.010214.122008 10.1109/EuroSP48549.2020.00033 10.1109/TVT.2020.2996574 10.1007/s10586-017-0848-x 10.1007/11693383_22 |
ContentType | Journal Article |
DBID | 97E ESBDL RIA RIE AAYXX CITATION DOA |
DOI | 10.1109/OJVT.2022.3217552 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2644-1330 |
EndPage | 13 |
ExternalDocumentID | oai_doaj_org_article_c24a79e858f747f4b3216235ca27aedf 10_1109_OJVT_2022_3217552 9931425 |
Genre | orig-research |
GrantInformation_xml | – fundername: Queensland University of Technology Postgraduate Research Award – fundername: Australian Research Council grantid: DP180102199 – fundername: Polish National Science Center (Narodowe Centrum Nauki) grantid: 2018/31/B/ST6/03003 |
GroupedDBID | 0R~ 97E AAJGR ABAZT ABVLG ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ EBS ESBDL GROUPED_DOAJ JAVBF M~E OCL OK1 RIA RIE AAYXX CITATION |
ID | FETCH-LOGICAL-c374t-38cebb219982076b02a36e7a15bdf59a99836405e78af0a5557dca14d3cae6b73 |
IEDL.DBID | DOA |
ISSN | 2644-1330 |
IngestDate | Wed Aug 27 01:30:33 EDT 2025 Thu Apr 24 23:03:27 EDT 2025 Tue Jul 01 01:47:50 EDT 2025 Wed Aug 27 02:18:25 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c374t-38cebb219982076b02a36e7a15bdf59a99836405e78af0a5557dca14d3cae6b73 |
ORCID | 0000-0002-3971-6415 0000-0003-1575-7287 0000-0001-8434-9741 0000-0002-1917-6466 |
OpenAccessLink | https://doaj.org/article/c24a79e858f747f4b3216235ca27aedf |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1109_OJVT_2022_3217552 crossref_citationtrail_10_1109_OJVT_2022_3217552 ieee_primary_9931425 doaj_primary_oai_doaj_org_article_c24a79e858f747f4b3216235ca27aedf |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-01-01 |
PublicationDateYYYYMMDD | 2023-01-01 |
PublicationDate_xml | – month: 01 year: 2023 text: 2023-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | IEEE open journal of vehicular technology |
PublicationTitleAbbrev | OJVT |
PublicationYear | 2023 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | ref13 ref12 ref15 ref14 ref11 ref17 ref16 baee (ref7) 2021; 70 ref19 ref18 dworkin (ref29) 2001 (ref41) 0 ref46 ref45 ref48 baee (ref44) 2014 ref42 ref43 goldreich (ref38) 2007 ref49 baee (ref24) 2021; 2021 ref3 ref6 baee (ref8) 2021 ref5 ref35 ref34 washington (ref37) 2008 ref36 goudarzi (ref10) 0 ref30 ref33 ref32 ref2 ref1 just (ref28) 2005 (ref40) 2017; 1609 2a 2017 ref23 menezes (ref9) 1996 ref26 ref25 ref20 ref22 ref21 abdalla (ref27) 1999; 1999 (ref39) 2003 sakemi (ref47) 2019 bond (ref31) 2002; 198 (ref4) 2005 |
References_xml | – ident: ref15 doi: 10.1109/CSCloud.2015.32 – ident: ref33 doi: 10.1007/978-3-642-14623-7_34 – ident: ref21 doi: 10.1109/CCCI52664.2021.9583219 – ident: ref43 doi: 10.1017/CBO9781107360211 – volume: 1999 year: 1999 ident: ref27 article-title: DHAES: An encryption scheme based on the diffie-hellman problem publication-title: IACR Cryptol ePrint Arch – volume: 70 start-page: 9306 year: 2021 ident: ref7 article-title: A model to evaluate reliability of authentication protocols in C-ITS safety-critical applications publication-title: IEEE Trans Veh Technol doi: 10.1109/TVT.2021.3097088 – year: 2005 ident: ref4 article-title: Vehicle safety communications project: Task 3 final report - identify intelligent vehicle safety applications enabled by DSRC publication-title: Tech Rep – ident: ref42 doi: 10.1109/TIFS.2021.3087359 – ident: ref36 doi: 10.17487/rfc2898 – ident: ref30 doi: 10.1007/3-540-44448-3_41 – start-page: 1 year: 0 ident: ref10 article-title: A systematic review of security in vehicular ad hoc network publication-title: Proc 2nd Symp Wireless Sensors Cellular Netw – year: 2007 ident: ref38 publication-title: Foundations of Cryptography Volume 1 Basic Tools – year: 0 ident: ref41 publication-title: NXP Semiconductors RoadLINK SAF5400 Single Chip Modem – start-page: 154 year: 2005 ident: ref28 publication-title: Diffie-Hellman Key Agreement – ident: ref19 doi: 10.1016/j.vehcom.2020.100255 – ident: ref6 doi: 10.1109/MCOM.2009.4939288 – volume: 1609 2a 2017 start-page: 1 year: 2017 ident: ref40 article-title: IEEE standard for wireless access in vehicular environments-security services for applications and management messages - Amendment 1 – ident: ref1 doi: 10.1109/TVT.2015.2402166 – volume: 198 start-page: 1 year: 2002 ident: ref31 article-title: The keyed-hash message authentication code (HMAC publication-title: Fed Inf Process Stand Publ – ident: ref11 doi: 10.1186/s13638-015-0353-y – volume: 2021 start-page: 1 year: 2021 ident: ref24 article-title: Authentication strategies in vehicular communications: A taxonomy and framework publication-title: EURASIP J Wireless Commun Netw – ident: ref49 doi: 10.17487/rfc7366 – ident: ref48 doi: 10.1007/978-3-319-61273-7_5 – ident: ref20 doi: 10.1109/JSYST.2020.2991168 – ident: ref22 doi: 10.1007/s00521-021-06152-x – ident: ref5 doi: 10.1109/TVT.2019.2945339 – ident: ref13 doi: 10.1109/TVT.2007.906878 – year: 1996 ident: ref9 publication-title: Handbook of Applied Cryptography – ident: ref3 doi: 10.1109/MCOM.2009.5307471 – year: 2014 ident: ref44 article-title: Implementation and performance analysis of identity-based authentication in wireless sensor networks – ident: ref23 doi: 10.1109/JIOT.2021.3068268 – ident: ref34 doi: 10.17487/rfc5869 – year: 2001 ident: ref29 article-title: Recommendation for block cipher modes of operation. methods and techniques publication-title: Nat Inst of Standards and Technol Gaithersburg MD Comput Secur Div – ident: ref14 doi: 10.1109/JCN.2009.6388411 – ident: ref32 doi: 10.1080/01611194.2012.687431 – ident: ref35 doi: 10.1007/s00145-014-9185-x – ident: ref25 doi: 10.1109/TDSC.2022.3164436 – ident: ref12 doi: 10.1145/1102219.1102223 – ident: ref45 doi: 10.1109/TIT.2009.2034881 – year: 2019 ident: ref47 article-title: Pairing-friendly curves – year: 2021 ident: ref8 article-title: Privacy-preserving authentication and key management for cooperative intelligent transportation systems – year: 2003 ident: ref39 article-title: OpenSSL: The open source toolkit for SSL/TLS publication-title: The Openssl Project – ident: ref26 doi: 10.1112/plms/s2-42.1.230 – ident: ref2 doi: 10.1109/TWC.2014.010214.122008 – ident: ref18 doi: 10.1109/EuroSP48549.2020.00033 – ident: ref17 doi: 10.1109/TVT.2020.2996574 – year: 2008 ident: ref37 publication-title: Elliptic Curves Number Theory and Cryptography – ident: ref16 doi: 10.1007/s10586-017-0848-x – ident: ref46 doi: 10.1007/11693383_22 |
SSID | ssj0002511137 |
Score | 2.2603452 |
Snippet | Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred... |
SourceID | doaj crossref ieee |
SourceType | Open Website Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Australia Authentication Cryptography known-key attack message forgery attack perfect forward secrecy Privacy Protocols Roads Symbols Vehicular ad hoc networks |
SummonAdditionalLinks | – databaseName: IEEE Xplore dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB5WT3rwLa4vgngSuzZJ07TeVnFZBBXcB3srSZpc1F3R7sVf76TtFhURb2VISug3Tb6ZzAPgVDFhhHRJ4KJUBcj_dYDkiAY505aGzoq0zK26u4_7o-h2IiYtOG9yYay1ZfCZ7fjH8i4_n5m5d5Vd4FlKUceWYAkNtypXq_GneKpMuawvLmmYXjzcjodoADLW4ci7hWDfjp6yQv-3lirlidJbh7vFWqpAkqfOvNAd8_GjTON_F7sBazW1JN1KFzahZadbsPql4OA2DFEryKBuWUdmjpywHpr2J8R7ynzcUOXAIwOE8sUSJLRk3L2_Gb5fkm5R-HR8oqY5efS7pFt4-3Zg1LsZXveDuq9CYLiMioAnxmrNfHYdC2WsQ6Z4bKWiQudOpArlPEYiZ2WiXKiEEDI3ikY5N8rGWvJdWJ7OpnYPCO4INE4V11zrKPHpmJomoTAyNUo4p9oQLj55Zuqi4773xXNWGh9hmnmUMo9SVqPUhrNmymtVceOvwVcex2agL5ZdChCKrP73MsMiJVObiMSh8eQijZOR9QmjmFQ2d23Y9vA1L6mR2_9dfAArvuV85YY5hOXibW6PkJgU-rjUyE9J_d4l priority: 102 providerName: IEEE |
Title | The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications |
URI | https://ieeexplore.ieee.org/document/9931425 https://doaj.org/article/c24a79e858f747f4b3216235ca27aedf |
Volume | 4 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT8MwDI4QJzggYCDGY4omTkhlTdI0LbeBNk2TNiT20G5VkiYn2BCUK78du-2m7QIXLj1EqVXZrv3ZiW1CbjWXViqfBD5KdQD43wQAjliQc-NY6J1My9qq0TgezKLhQi62Rn3hnbCqPXDFuI7lkVapS2TiAfn6yAjOwGVLq7nSLvdofcHnbQVTaIMRODOh6mNMFqad5-F8CuEg5_dAQEnJdxxR2a9_Z8BK6V_6x-SoBoa0W33QCdlzy1NyuNUusEGmIFM6qQfO0ZWnbd6HwLxNMc-Ft36q9BudgCDeHAU4SufdcW_6-UC7RYHF9FQvc_qCNs6vc3VnZNbvTZ8GQT0VIbBCRUUgEuuM4Vgbx0MVm5BrETulmTS5l6mGdREDDHMq0T7UUkqVW82iXFjtYqPEOdlfrpbuglD4n1mcamGEMVGCxZSGJaG0KrVaeq-bJFyzKLN1y3CcXPGalaFDmGbI1Qy5mtVcbZK7zSvvVb-M3zY_It83G7HVdbkACpDVCpD9pQBN0kCpbYgA4GJgiC7_g_YVOcDx8lXK5ZrsFx9f7gZASGFapb7Bc_Tda5VVgz-oNtb_ |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB1Remg5tKWAuv20UE-I7MZ2HCe9bStWC2W3UgmIW2Q79oWyi2j20l_fmSQbFYRQb5FlR1bexH4z9psB-GyEckqHLApJbiLk_zZCcsSjSljP4-BV3mirZvN0ep6cXKrLDTjstTDe--bymR_SY3OWXy3dikJlI9xLOdrYE3iqSIzbqrX6iAqRZS51d3TJ43z04-SiQBdQiKFE5q2UuLP5NDn67xRVafaUyUuYrWfTXiW5Gq5qO3R_7iVq_N_pvoIXHblk49YatmHDL17D1j8pB3egQLtgZ13ROrYMbF9M0LnfZxQro5tDbQiPnSGY154hpWUX4_lR8fsLG9c1CfKZWVTsJ62TYR3v24XzyVHxbRp1lRUiJ3VSRzJz3lpB-joR69TGwsjUa8OVrYLKDbbLFKmc15kJsVFK6coZnlTSGZ9aLfdgc7Fc-DfAcE3gaW6kldYmGQkyLc9i5XTujArBDCBef_LSdWnHqfrFr7JxP-K8JJRKQqnsUBrAQT_kps258Vjnr4Rj35HSZTcNCEXZ_X2lE4nRuc9UFtB9ConFwcj7lDNCG1-FAewQfP1LOuTePtz8CZ5Ni9lpeXo8__4OnlMB-jYo8x4269uV_4A0pbYfG-v8CweY4W0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Security+of+%222FLIP%22+Authentication+Scheme+for+VANETs%3A+Attacks+and+Rectifications&rft.jtitle=IEEE+open+journal+of+vehicular+technology&rft.au=Mir+Ali+Rezazadeh+Baee&rft.au=Leonie+Simpson&rft.au=Ernest+Foo&rft.au=Josef+Pieprzyk&rft.date=2023-01-01&rft.pub=IEEE&rft.eissn=2644-1330&rft.volume=4&rft.spage=101&rft.epage=113&rft_id=info:doi/10.1109%2FOJVT.2022.3217552&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_c24a79e858f747f4b3216235ca27aedf |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2644-1330&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2644-1330&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2644-1330&client=summon |