Internet of Vehicles Environment Verification of Authentication Protocols using Formal Analysis: A Survey
Abstract
The Internet of Vehicles (IoV) is becoming an interesting topic among researchers and it has emerged as a rapidly advancing field within Vehicular Ad-hoc Networks, facilitating intelligent communication between vehicles and the cloud through the integration of Internet of Things (IoT) technologies. The IoV surroundings face serious challenges due to the highly interrelated nature of vehicles and infrastructure in certifying privacy and security. Traditional approaches to authentication lack the strength required to protect against developing fears, leaving systems vulnerable to attacks. This survey addresses the gap by employing formal analysis approaches to prove authentication protocols, targeting to reinforce safety and confidentiality in IoV systems. The IoV communication model consists of Vehicle-to-Vehicle, Vehicle-to-Infrastructure, Vehicle-to-Personal Devices, and Vehicle-to-Cloud. Smart automobiles are equipped with cameras, radars, on-board units, and sensors to help reduce the number of accidents by giving drivers or autonomous vehicles up-to-date information on roads, traffic signals, and other pertinent entities. As human lives are at risk, security and privacy in the IoV communication paradigm are critical and cannot neglected. Security and privacy breaches may cause accidents because the attacker can inject false information into the system as the communication channel is open and unsecured. The researchers proposed many authentication protocols to provide secure communication between IoV entities. Although surveys on IoV security and privacy issues deal with communication and computation costs, they lack formal analysis of the authentication protocols. This survey reviews the informal analysis and formal analysis methods used by various authentication protocols. Furthermore, the challenges and future work are also included in this survey.
References
J. Contreras-Castillo, S. Zeadally, and J. A. Guerrero-Ibañez, "Internet of vehicles: architecture, protocols, and security," IEEE internet of things Journal, vol. 5, no. 5, pp. 3701-3709, 2017.
M. Abdelsalam and T. Bonny, "IoV road safety: Vehicle speed limiting system," in 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), IEEE, pp. 1-6. 2019:
D. Oladimeji, K. Gupta, N. A. Kose, K. Gundogan, L. Ge, and F. Liang, "Smart transportation: an overview of technologies and applications," Sensors, vol. 23, no. 8, p. 3880, 2023.
M. Humayun, S. Afsar, M. F. Almufareh, N. Jhanjhi, and M. AlSuwailem, "Smart traffic management system for metropolitan cities of kingdom using cutting edge technologies," Journal of Advanced Transportation, vol. 2022, no. 1, p. 4687319, 2022.
P. Mell and T. Grance, "The NIST definition of cloud computing," 2011.
S. M. Karim, A. Habbal, S. A. Chaudhry, and A. Irshad, "Architecture, protocols, and security in IoV: Taxonomy, analysis, challenges, and solutions," Security and Communication Networks, vol. 2022, no. 1, p. 1131479, 2022.
R. Shrestha, R. Bajracharya, and S. Y. Nam, "Challenges of future VANET and cloud‐based approaches," Wireless Communications and Mobile Computing, vol. 2018, no. 1, p. 5603518, 2018.
S. Sharma and B. Kaushik, "A survey on internet of vehicles: Applications, security issues & solutions," Vehicular Communications, vol. 20, p. 100182, 2019.
P. Sharma, M. Patel, and A. Prasad, "A systematic literature review on IoVSecurity," arXiv preprint arXiv:2212.08754, 2022.
S. S. Sepasgozar and S. Pierre, "Network Traffic Prediction Model Considering Road Traffic Parameters Using Artificial Intelligence Methods in VANET," IEEE Access, vol. 10, pp. 8227-8242, 2022.
P. Sewalkar and J. Seitz, "Vehicle-to-Pedestrian Communication for Vulnerable Road Users: Survey, Design Considerations, and Challenges," Sensors (Basel, Switzerland), vol. 19, 2019.
M. Elassy, M. Al-Hattab, M. Takruri, and S. Badawi, "Intelligent transportation systems for sustainable smart cities," Transportation Engineering, p. 100252, 2024.
S. Zeadally, J. A. G. Ibáñez, and J. Contreras-Castillo, "A tutorial survey on vehicle-to-vehicle communications," Telecommunication Systems, vol. 73, pp. 469 - 489, 2019.
H. Goumidi, Z. Aliouat, and S. Harous, "Vehicular cloud computing security: A survey," Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2473-2499, 2020.
M. S. Sheikh, J. Liang, and W. Wang, "Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey," Wireless Communications and Mobile Computing, vol. 2020, no. 1, p. 5129620, 2020.
N. Tabassum and C. Reddyy, "Review on QoS and security challenges associated with the IoVin cloud computing," Measurement: Sensors, vol. 27, p. 100562, 2023.
A. Verma, R. Saha, G. Kumar, and T.-h. Kim, "The security perspectives of vehicular networks: a taxonomical analysis of attacks and solutions," Applied Sciences, vol. 11, no. 10, p. 4682, 2021.
P. Bagga, A. K. Das, M. Wazid, J. J. Rodrigues, and Y. Park, "Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges," Ieee Access, vol. 8, pp. 54314-54344, 2020.
Z. Ma et al., "A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles," IEEE Access, 2024.
K. Park, M. Kim, and Y. Park, "On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles," Electronics, vol. 13, no. 16, p. 3136, 2024.
H. Vasudev, M. Shariq, S. K. Dwivedi, and M. Conti, "LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles," in Proceedings of the 25th International Conference on Distributed Computing and Networking, pp. 209-216, 2024.
J. Li, Y. Lin, Y. Li, Y. Zhuang, and Y. Cao, "BPA: A Novel Blockchain-Based Privacy-Preserving Authentication Scheme for the Internet of Vehicles," Electronics, vol. 13, no. 10, p. 1901, 2024.
Q. Xie and J. Huang, "Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV," Applied Sciences, vol. 14, no. 6, p. 2451, 2024.
E. H. Nurkifli and T. Hwang, "Provably secure authentication for the internet of vehicles," Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 8, p. 101721, 2023.
Y. Gong et al., "VASERP: an adaptive, lightweight, secure, and efficient RFID-based authentication scheme for IoV," Sensors, vol. 23, no. 11, p. 5198, 2023.
Q. Yang, X. Zhu, X. Wang, J. Fu, J. Zheng, and Y. Liu, "A novel authentication and key agreement scheme for Internet of Vehicles," Future Generation Computer Systems, vol. 145, pp. 415-428, 2023.
P. Bagga, A. K. Das, and J. J. Rodrigues, "Bilinear pairing-based access control and key agreement scheme for smart transportation," Cyber Security and Applications, vol. 1, p. 100001, 2023.
S. A. Chaudhry, "Designing an efficient and secure message exchange protocol for internet of vehicles," Security and Communication Networks, vol. 2021, pp. 1-9, 2021.
P. Bagga, A. K. Das, M. Wazid, J. J. Rodrigues, K.-K. R. Choo, and Y. Park, "On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system," IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 1736-1751, 2021.
S. Yu, J. Lee, K. Park, A. K. Das, and Y. Park, "IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment," IEEE access, vol. 8, pp. 167875-167886, 2020.
H. Vasudev, D. Das, and A. V. Vasilakos, "Secure message propagation protocols for IoVs communication components," Computers & Electrical Engineering, vol. 82, p. 106555, 2020.
A. Aljumaili, H. Trabelsi, and W. Jerbi, "A Review on Secure Authentication Protocols in IOV: Algorithms, Protocols, and Comparisons," 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1-11, 2023.
H. W. Haiyan Wang and H. M. Haiyan Wang, "A Lightweight V2R Authentication Protocol Based on PUF and Chebyshev Chaotic Map," 電腦學刊, 2023.
S. Roy, S. Nandi, R. Maheshwari, S. Shetty, A. K. Das, and P. Lorenz, "Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System," IEEE Transactions on Vehicular Technology, vol. 73, pp. 3009-3024, 2024.
B.D. Manh, C.-H. Nguyen, D. T. Hoang, and D. N. Nguyen, "Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks," ArXiv, vol. abs/2407.18503, 2024.
J. Deng et al., "A Survey on Vehicular Cloud Network Security," IEEE Access, vol. 11, pp. 136741-136757, 2023.
C. Bernardini, M. R. Asghar, and B. Crispo, "Security and privacy in vehicular communications: Challenges and opportunities," Vehicular Communications, vol. 10, pp. 13-28, 2017.
Q. Xie, Z. Sun, Q. Xie, and Z. Ding, "A Cross-Trusted Authority Authentication Protocol for IoVBased on Blockchain," IEEE Access, vol. 11, pp. 97840-97851, 2023.
P. Zhao, Y. Huang, J. Gao, L. Xing, H. Wu, and H. Ma, "Federated Learning-Based Collaborative Authentication Protocol for Shared Data in Social IoV," IEEE Sensors Journal, vol. 22, pp. 7385-7398, 2022.
H. Han, S. Chen, Z. Xu, X. Dong, and J. Zeng, "Trust Management Scheme of IoV Based on Dynamic Sharding Blockchain," Electronics, 2024.
S. A. Chaudhry, "Designing an efficient and secure message exchange protocol for internet of vehicles," Security and Communication Networks, vol. 2021, no. 1, p. 5554318, 2021.
T. Lauser and C. Krauß, "Formal Security Analysis of Vehicle Diagnostic Protocols," Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023.
H. Sikarwar and D. Das, "A Novel MAC-Based Authentication Scheme (NoMAS) for IoV(IoV)," IEEE Transactions on Intelligent Transportation Systems, vol. 24, pp. 4904-4916, 2023.
J. Zhang, T. Li, M. S. Obaidat, C. Lin, and J. Ma, "Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems," IEEE Systems Journal, vol. 16, pp. 1355-1366, 2022.
C. Jacomme and S. Kremer, "An Extensive Formal Analysis of Multi-factor Authentication Protocols," 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 1-15, 2018.
L. Li, J. Sun, Y. Liu, M. Sun, and J. S. Dong, "A Formal Specification and Verification Framework for Timed Security Protocols," IEEE Transactions on Software Engineering, vol. 44, pp. 725-746, 2018.
U. Bodkhe and S. Tanwar, "BiOIoV: Biometric-based Secure Data Dissemination for IoV Ecosystem," 2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 677-682, 2023.
C. J. Cremers, "The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols: Tool Paper," in International conference on computer aided verification,Springer, pp. 414-418, 2008.
B. Blanchet, V. Cheval, X. Allamigeon, and B. Smyth, "ProVerif: Cryptographic protocol verifier in the formal model," ed, 2010.
A. Armando, D. Basin, J. Cuellar, M. Rusinowitch, and L. Viganò, "Avispa: automated validation of internet security protocols and applications," ERCIM News, vol. 64, no. January, pp. 66-69, 2006.
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems (TOCS), vol. 8, no. 1, pp. 18-36, 1990.
M. Abdalla, P.-A. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting," in Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, Proceedings 8, Springer, pp. 65-84, 2005.
M. Georgiades and M. S. Poullas, "Emerging Technologies for V2X Communication and Vehicular Edge Computing in the 6G era: Challenges and Opportunities for Sustainable IoV," 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), pp. 684-693, 2023.
Y. Salami, V. Khajehvand, and E. Zeinali, "SAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation," Security and Communication Networks, 2023.
S. G. Aarella, S. P. Mohanty, E. Kougianos, and D. Puthal, "Fortified-Edge: Secure PUF Certificate Authentication Mechanism for Edge Data Centers in Collaborative Edge Computing," Proceedings of the Great Lakes Symposium on VLSI, 2023.
J. Bi, X. Xue, H. Yuan, and J. Zhang, "Latency-Minimized Computation Offloading in Vehicle Fog Computing with Improved Whale Optimization Algorithm," 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 5003-5008, 2023.
E. Khezri, H. Hassanzadeh, R. O. Yahya, and M. Mir, "Security challenges in IoV(IoV) for ITS: A survey," Tsinghua Science and Technology, 2024.
Z. Yang, K. Zhang, L. Lei, and K. Zheng, “A novel classifier exploiting mobility behaviors for sybil detection in connected vehicle systems,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2626–2636, 2019.
M. Tabany and M. Syed, "A Lightweight Mutual Authentication Protocol for Internet of Vehicles," J. Adv. Inf. Technol, vol. 15, pp. 155-163, 2024.
Q. Xie, Z. Ding, and P. Zheng, "Provably secure and anonymous V2I and V2V authentication protocol for VANETs," IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 7, pp. 7318-7327, 2023.
M. Ehtisham et al., "IoV(IoV)-Based Task Scheduling Approach Using Fuzzy Logic Technique in Fog Computing Enables Vehicular Ad Hoc Network (VANET)," Sensors, vol. 24, no. 3, p. 874, 2024.
R. Sohail et al., "A machine learning-based intelligent vehicular system (IVS) for driver’s diabetes monitoring in vehicular ad-hoc networks (VANETs)," Applied Sciences, vol. 13, no. 5, p. 3326, 2023.
K. Rashid, Y. Saeed, A. Ali, F. Jamil, R. Alkanhel, and A. Muthanna, "An adaptive real-time malicious node detection framework using machine learning in vehicular ad-hoc networks (VANETs)," Sensors, vol. 23, no. 5, p. 2594, 2023.
S. Masood et al., "Detecting and preventing false nodes and messages in vehicular ad-hoc networking (VANET)," IEEE Access, 2023.
Z. Liang, P. Yang, C. Zhang, and X. Lyu, "Secure and efficient hierarchical Decentralized learning for Internet of Vehicles," IEEE Open Journal of the Communications Society, 2023.
P. Surapaneni, S. Bojjagani, and A. K. Maurya, "Handover-Authentication Scheme for IoV(IoV) Using Blockchain and Hybrid Computing," IEEE Access, 2024.