A Study of Authentication Protocols in Internet of Things

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

An Introduction to Network Authentication Protocols

What are network authentication protocols.

Network authentication protocols are well defined, industry standard ways of confirming the identity of a user when accessing network resources. As a network administrator, you need to log into your network devices. To do this, of course, you need a login ID and a password. How does the network device know the login ID and password you provided are correct? In short, it checks the login ID and password you provided against existing user account records.

But how are these existing account records stored? The simplest option is storing the account information locally on each device, but that’s hard to manage if you have a lot of devices. A better alternative is to use a protocol to allow devices to get the account information from a central server.

The most commonly used authorization and authentication protocols are Oauth 2, TACACS+, RADIUS, Kerberos, SAML, and LDAP/Active Directory. It’s important to understand these are not competing protocols. I’ve seen many environments that use all of them simultaneously—they’re just used for different things.

In this article, we discuss most commonly used protocols, and where best to use each one. Before we start, you should know there are three key tasks to worry about, which is why different protocols are used for different situations. We summarize them with the acronym AAA for authentication, authorization, and accounting. Sometimes there’s a fourth A, for auditing.

A note about local accounts

With local accounts, you simply store the administrative user IDs and passwords directly on each network device. This has some serious drawbacks. First, if you have a lot of devices, then making changes like adding or deleting a user across the network or changing passwords becomes a massive undertaking.

Second, if somebody gets physical access to one of these devices or even to its configuration file, they can quietly crack passwords, perhaps by brute force. Then, if the passwords are the same across many devices, your network security is at risk.

And third, it becomes extremely difficult to do central logging and auditing of things like failed login attempts, or to lock out an account you think is compromised.

Your Guide to Selling Managed Network Services

Get templates for network assessment reports, presentations, pricing & more—designed just for MSPs.

Having said all that, local accounts are essential in one key situation: When there’s a problem that prevents a device from accessing the central authentication server, you need to have at least one local account, so you can still get in. (And, of course, when there’s an underlying problem to fix is when you’ll most desperately need to log into the device).

The solution is to configure a privileged account of last resort on each device. It’s an account that’s never used if the authentication service is available. If you try to enter the local administrative credentials during normal operation, they’ll fail because the central server doesn’t recognize them.

Now, let’s move on to our discussion of different network authentication protocols and their pros and cons.

Terminal Access Controller Access Control System (TACACS) is the somewhat redundant name of a proprietary Cisco protocol for handling authentication and authorization. The plus sign distinguishes the modern version of the authentication protocol from a very old one that nobody uses anymore.

TACACS+ has a couple of key distinguishing characteristics. It allows full encryption of authentication packets as they cross the network between the server and the network device. This prevents an attacker from stealing your logon credentials as they cross the network.

The most important and useful feature of TACACS+ is its ability to do granular command authorization. When you use command authorization with TACACS+ on a Cisco device, you can restrict exactly what commands different administrative users can type on the device.

For example, you could allow a help-desk user to look at the output of the “show interface brief” command, but not at any other “show” commands, or even at other “show interface” command options.

Command authorization is sometimes used at large organizations that have many people accessing devices for different reasons. But the feature isn’t very meaningful in an organization where the network admins do everything on the network devices. Due to the granular nature of authorization, management of permissions on TACACS+ can become cumbersome if a lot of customization is done.

Remote Authentication Dial-In User Service (RADIUS) is rarely used for authenticating dial-up users anymore, but that’s why it was originally developed. It’s now a general-purpose protocol for user authentication.

Unlike TACACS+, RADIUS doesn’t encrypt the whole packet. Instead, it only encrypts the part of the packet that contains the user authentication credentials. This level of security is generally considered good enough, although I wouldn’t recommend passing it through the public Internet without additional encryption such as a VPN.

While RADIUS can be used for authenticating administrative users as they access network devices, it’s more typically used for general authentication of users accessing the network. For example, RADIUS is the underlying protocol used by 802.1X authentication to authenticate wired or wireless users accessing a network.

A very common technique is to use RADIUS as the authentication protocol for things like 802.1X, and have the RADIUS server talk to an Active Directory or LDAP server on the backend. The Active Directory or LDAP system then handles the user IDs and passwords. Such a setup allows centralized control over which devices and systems different users can access.

If you need network authentication protocols to allow non-secure points to communicate with each other securely, you may want to implement Kerberos. This protocol uses a system of tickets to provide mutual authentication between a client and a server. It is named for the three-headed guard dog of Greek mythology, and the metaphor extends: a Kerberos protocol has three core components, a client, a server, and a Key Distribution Center (KDC).

Centralized network authentication protocols improve both the manageability and security of your network.

The obvious benefit of Kerberos is that a device can be unsecured and still communicate secure information. Microsoft programs after Windows 2000 use Kerberos as their main authentication protocol. There are a few drawbacks though, including the fact that devices using the protocol must have relatively well-synced clocks, because the process is time-sensitive. It is also not advised to use this protocol for networks heavy on virtual hosting, because every host requires its own set of Kerberos keys.

LDAP and Active Directory

Lightweight Directory Access Protocol (LDAP) and Active Directory are pretty much the same thing. Active Directory is essentially Microsoft’s proprietary implementation of LDAP—although it’s LDAP with a lot of extra features added on top.

Some network devices, particularly wireless devices, can talk directly to LDAP or Active Directory for authentication. But Cisco switches and routers don’t speak LDAP and Active Directory natively. If you’ve got Cisco gear, you’ll need to use something else, typically RADIUS, as an intermediate step.

There are two common ways to link RADIUS and Active Directory or LDAP. The first is to use a Cisco Access Control Server (ACS) and configure it to use Active Directory for its name store. The second is to run the native Microsoft RADIUS service on the Active Directory domain controllers.

In the ancient past, the all-Microsoft solution had scaling problems, so people tended to avoid it in larger deployments. However, this is no longer true. Now both options are excellent.

As with most things these days, Active Directory has also moved to the cloud—Azure Active Directory, while not exactly the same as Active Directory, brings together most of the benefits of traditional on-premise Active Directory and cloud-based authentication protocols like Oauth and SAML in a cloud-based platform.

Oauth 2 is the second iteration of the protocol Oauth (short for Open Authentication), an open standard authorization protocol used on the internet as a way for users to allow websites and mobile apps to access their credentials without giving them the passwords. It is employed by many popular sites and apps, including Amazon, Google, Facebook, Twitter, and more.

Because this protocol is designed to work with HTTP, it essentially permits “access tokens” to be applied to a third-party with the permission of the resource owner. Think of it like granting someone a separate “valet key” to your home.

Why use Oauth 2? The main benefit of this protocol is its ease of use for end users. They receive access to a site or service without having to create an additional, specific account for that purpose.

However, there are drawbacks, chiefly the security risks. By using one account for many services, if that main account is ever compromised, users risk compromising many more instances. Additionally, Oauth 2 is a protocol for authorization, but it’s not a true authentication protocol. It does’t validate ownership like OpenID, it relies on third-party APIs.

SAML stands for Security Assertion Markup Language. It’s an open standard for exchanging authorization and authentication data. It also has an associated protocol with the same name. The protocol is a package of queries that request the authentication, attribute, and authorization for a user (yes, another AAA).

Typically, SAML is used to adapt multi-factor authentication or single sign-on options. Its strength lies in the security of its multiple queries. The downside to SAML is that it’s complex and requires multiple points of communication with service providers.

Conclusion: Centralized is best

Centralized network authentication protocols improve both the manageability and security of your network. The ability to quickly and easily add a new users and update passwords everywhere throughout your network at one time greatly simplifies management. The ability to change passwords, or lock out users on all devices at once, provides better security. And with central logging, you have improved network visibility —you can immediately tell if somebody is repeatedly attacking a particular user’s credentials, even if they’re doing so across a range of network devices to hide their tracks.

All in, centralized authentication is something you’ll want to seriously consider for your network.

What do you think?

Share your thoughts and read what others have to say

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Share your thoughts here *

Enter your name *

Enter your email address *

Save my name, email, and website in this browser for the next time I comment.

How to Create a Network Assessment Report with This Template

Your guide to network capacity planning: definitions, benefits & best practices, what is a subnet mask examples, uses and benefits, what’s your shadow it risk factor.

  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems

Networking: Implementation of Authentication Process Case Study

School wlan, user groups and their security requirements, protocol and application permissions, data classification plan.

Deploying a wireless local area network (WLAN) in a school environment can be an enormous asset in the learning process. However, such an environment presents unique challenges in ensuring the network’s security. This report will examine the probable user groups, their security requirements, and potential risks associated with a classroom WLAN, and propose security and authentication measures necessary to make the network secure.

Users in a school WLAN can be divided into three broad categories:

  • Students. Generally do not require external access or access to restricted materials. Require very limited modification of resources on the network.
  • Faculty members/teachers. May require external access or access to confidential internal materials, as well as modified access to resources.
  • Other staff. This includes staff with responsibilities not necessarily involved in the teaching process, including those administrating the network. This group requires the most flexible security considerations as their needs can vary significantly, but generally, their requirements lie above those of the previous group.

It should also be noted that most users of a school WLAN can be expected to have limited computer literacy, preventing their use of complicated authentication systems. However, individual students can be capable of bypassing simpler security measures to engage in malicious activity.

Thus, a school WLAN should implement role-based access control with two primary groups with corresponding levels of access. Under this system, access is granted to users based on their assigned roles (Kizza, 2020). One, general access, for students, read-only permissions on data outside of specific circumstances (e. g. uploading assignments). Considering the ubiquity of Internet-enabled data plans, this group does not require Internet access for any purpose not already achieved by their devices. The second level should allow access to the school’s confidential data and a limited ability to modify it, as well as general access to the Internet. Finally, the requirements of the third group can be achieved by assigning individual roles with permissions elevated from the second level.

The TCP and IP protocols are necessary for the functioning of a network. DHCP is also required to automatically assign IP addresses to devices entering the network. As the network is likely to be used to distribute learning materials, which may include video and audio recordings, whose transmission is achieved by protocols such as UDP and RTSP. Therefore, these protocols may be allowed, depending on the implementation of the school’s distribution system. No additional protocols should be operating within the WLAN. As for applications, unless the school utilizes proprietary software, all necessary interactions within the network can be achieved through a general-purpose Web browser.

Personal Digital Assistants (PDAs) are not a device commonly in personal used today. Most of their functionality has been superseded by smartphones or digital tablets. Thus, resolving any additional security issues associated with them would likely not be cost-effective. Therefore, PDAs should generally not be allowed to access the school’s WLAN. However, it is possible for school-issued PDAs to be used in the education process. If that is the case, only such PDAs should be allowed.

Based on the descriptions above, a context-based data classification would be the most appropriate to this environment. The user accessing or modifying the data is the key attribute determining its sensitivity level, with the interface used to access or modify it as a secondary qualifier. Data can be divided into general (public), internal, and confidential sensitivity levels as follows (Khani, et al., 2018).

It can be safely assumed that students need no modify access to any data except their assignments, and no access to confidential data from within the WLAN. As such, the write and modify access is generally heavily restricted within the network.

Khani, P., Sharbaf, M., Beheshti, M., & Faraji, S. (2018). Campus network security: Threats, analysis and strategies. 2018 International Conference on Computational Science and Computational Intelligence (CSCI). Web.

Kizza, J. M. (2020). Guide to Computer Network Security (5 th ed.). Springer.

  • Detection and Prevention of Wireless Intrusion
  • Strategic review for PDA Sim
  • Wireless Local Area Network and Channel Fading
  • WEP, WPA, and WPA2 Networks Comparison
  • Working in Virtual Worlds
  • Internet Resource Evaluation
  • Bots and Their Role in Internet Regulation
  • The Website Caters to Technology Enthusiasts
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2022, September 27). Networking: Implementation of Authentication Process. https://ivypanda.com/essays/networking-implementation-of-authentication-process/

"Networking: Implementation of Authentication Process." IvyPanda , 27 Sept. 2022, ivypanda.com/essays/networking-implementation-of-authentication-process/.

IvyPanda . (2022) 'Networking: Implementation of Authentication Process'. 27 September.

IvyPanda . 2022. "Networking: Implementation of Authentication Process." September 27, 2022. https://ivypanda.com/essays/networking-implementation-of-authentication-process/.

1. IvyPanda . "Networking: Implementation of Authentication Process." September 27, 2022. https://ivypanda.com/essays/networking-implementation-of-authentication-process/.

Bibliography

IvyPanda . "Networking: Implementation of Authentication Process." September 27, 2022. https://ivypanda.com/essays/networking-implementation-of-authentication-process/.

  • Open access
  • Published: 21 May 2021

Authentication strategies in vehicular communications: a taxonomy and framework

  • Mir Ali Rezazadeh Baee   ORCID: orcid.org/0000-0003-1575-7287 1 ,
  • Leonie Simpson   ORCID: orcid.org/0000-0001-8434-9741 1 ,
  • Xavier Boyen 1 ,
  • Ernest Foo   ORCID: orcid.org/0000-0002-3971-6415 1 , 2 &
  • Josef Pieprzyk   ORCID: orcid.org/0000-0002-1917-6466 1 , 3 , 4  

EURASIP Journal on Wireless Communications and Networking volume  2021 , Article number:  129 ( 2021 ) Cite this article

3890 Accesses

12 Citations

Metrics details

In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems known as Vehicular Communication (VC) systems. Vehicles communicate with other vehicles and with nearby fixed equipment to support different applications, including those which increase driver awareness of the surroundings. This should result in improved safety and may optimize traffic. However, VC systems are vulnerable to cyber attacks involving message manipulation. Research aimed at tackling this problem has resulted in the proposal of multiple authentication protocols. Several existing survey papers have attempted to classify some of these protocols based on a limited set of characteristics. However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation. Most existing classifications either use computation complexity of cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication. This paper provides such a framework, proposing a new taxonomy to enable a consistent means of classifying authentication schemes based upon seven main criteria. The main contribution of this study is a framework to enable protocol designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. Our framework can be applied in design, making choices appropriate for the intended context in both intra-vehicle and inter-vehicle communications. We demonstrate the application of our framework using two different types of case study: individual analysis and hypothetical design. Additionally, this work makes several related contributions. We present the network model, outline the applications, list the communication patterns and the underlying standards, and discuss the necessity of using cryptography and key management in VC systems. We also review the threats, authentication, and privacy requirements in vehicular networks.

1 Introduction

Car accidents kill or injure millions of people every year. The road safety report published by the World Health Organization (WHO) in 2015 [ 1 ], collecting information from 180 countries, shows total fatalities connected with street traffic stabilized at 1.25 million a year. Vehicular communication systems have the potential to improve current vehicular safety services. For example, by using periodic safety message broadcasting, vehicles can be informed about environmental conditions and neighboring vehicles [ 2 ].

Historically, road vehicles were independent and mostly mechanical systems. Current vehicles increasingly use built-in networks of sensors, actuators and electronic control systems. Many of these functions are related to safety. For example, anti-lock braking, sophisticated emergency braking, automated stability control, and adaptive cruise control are vehicle systems that use technology to assist drivers.

To take the vehicular technology a little further, automated highway systems and Intelligent Transportation Systems (ITS) were introduced. The term ITS refers to use of Information and Communication Technologies (ICT) intelligently to increase road safety and reducing the number of accidents. In fact, ITS comprise a wide range of technologies, controls, systems, and applications to save lives, time, and money by preventing crashes [ 3 ]. Current examples of ITS include vehicle safety systems such as collision avoidance systems, roadway safety systems such as intersection collision avoidance systems, and incident response such as automatic crash notification systems. There are additional benefits for ITS, such as allowing drivers to avoid vehicular congestion, finding the optimal path to a destination by processing real-time data, vehicle behavior analysis, examining road capacity, pedestrian flow rate analysis, and so on.

The ITS platforms are now being established globally. The primary advancements come from USA, Europe, and Japan [ 4 ]. Each of these territories has defined a group of new standards that specify different aspects of the C-ITS communications, such as Physical layer (PHY) and Medium Access Control layer (MAC), data structures, and security.

While ITS focus on digital technologies providing intelligence placed at the roadside or in vehicles, Cooperative Intelligent Transportation Systems (C-ITS) focus on the communication between those systems. This includes a vehicle communicating with another vehicle, with the infrastructure, or with other C-ITS systems [ 5 ]. Standards are necessary for the C-ITS elements created by different companies to operate together. The Institute of Electrical and Electronics Engineers (IEEE) in USA, the European Telecommunications Standards Institute (ETSI) in Europe, and Association of Radio Industries and Businesses (ARIB) in Japan are well-known sources with defined C-ITS standards.

The American IEEE 1609, European ETSI ITS-G5, and Japanese ARIB STD-T109 standards aim to establish C-ITS by enabling a self-organizing network called a Vehicular Ad-hoc Network (VANET). The capability of this technology in very low-latency (latency critical) broadcast communications to use in hazardous situations has emerged as a promising approach toward increasing road safety and efficiency, as well as improving driving experience. Latency defines an allowable time frame between when information is generated for transmission and when it is received.

One of the main elements of C-ITS is the capability for heterogeneous vehicles and infrastructure to communicate with one another in an interoperable manner. Car manufacturers embed devices such as IEEE 802.11p, known as Wireless Access in Vehicular Environments (WAVE) in vehicles to enable wireless communication with other vehicles and nearby fixed electronic equipment, such as Road-Side Units (RSUs).

The WAVE enabled vehicles can synchronize and handshake via beacons (beacon messages) which periodically share the vehicle’s mobility characteristics with its neighbors [ 6 ]. The beacon messages are short network packets containing the identification and context information for a vehicle, such as vehicle location, speed, braking status, traffic conditions, and traffic events [ 7 ]. The detected data, such as road conditions, driving status, and traffic info, is processed and shared with vehicles and RSUs using beacons within required latency for different purposes such as collision avoidance.

This system is useful if all messages are legitimate. Safety messages are broadcast to reach all network entities within communication range. However, malicious entities could manipulate messages. Without the use of security mechanisms, activities such as the injection of false messages can be performed without detection. For this reason, mechanisms should be applied to ensure both identification of the data source (entity authentication) and authentication of the message (assurance of data origin and data integrity).

1.1 Authentication between network entities

Authentication is a vital part of trust establishment between network entities. It ensures that received messages come from the legitimate entities. Without this security service, messages transmitted by network entities can be altered by an attacker, or a bogus message can be generated by an impersonator. Also, a sender can later deny the message generation.

A message can be authenticated at two levels, including node level and the message level. Node level authentication refers to entity authentication (identification) and ensures that the message is received from a legitimate source. The message level authentication or data-origin authentication ensures the integrity of a message, and plays an important role in enhancing security [ 8 ]. This section outlines different types of authentication, including entity authentication and message authentication.

Entity authentication or identification is a technique designed to assure one party (the verifier) that the identity of another (the prover or claimant) is as claimed, and as a result, preventing impersonation [ 9 ]. From the verifier’s point of view, the result of an identification protocol is either acceptance of the prover’s identity as authentic, or rejection (termination without acceptance). Entity authentication techniques can be based on something known such as a password, something possessed like a passport, or something inherent (to a human individual) such as a handwritten signature [ 10 ].

Message authentication provides data origin authentication. It ensures the original message source and data integrity. An authentication type is called data origin authentication where a party is verified as the original source of data created at some time in the past. A property in which data has not been altered in an unauthorized manner is called data integrity. This property must be kept since the time data was created, transmitted, or stored by an authorized source. For any received message, it is required to ensure data actually came from its reputed source (data origin authentication), and it is unaltered (data integrity). The above-mentioned issues (data origin authentication, and data integrity) cannot be separated. If data is altered, it effectively has a new source, and if the source is not determined, then the investigation for alteration cannot be settled (data cannot be linked to a source). Thus, integrity mechanisms implicitly provide data origin authentication, and vice versa [ 10 ].

1.2 Research challenge

Many authentication schemes have been proposed to secure VC systems; examples include [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 ]. Existing studies [ 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 ] have attempted to classify some of these schemes based on a limited set of characteristics. However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation.

Most existing classifications either use the computational complexity of the cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication, such as digital signatures. For example, Riley et al. [ 62 ] and Qu et al. [ 63 ] classify authentication protocols based on the computational complexity of cryptographic approaches involved: symmetric or asymmetric. Petit et al. [ 64 ] and Manvi et al. [ 65 ] classify authentication strategies into different categories. However, neither of these classifications includes the Identity-based (ID-based) approach as a subcategory of the asymmetric cryptography category. Similarly, Lu et al. [ 67 ] classify authentication schemes, but include ID-based and certificate-less approaches in different categories, although both are certificate-less strategies.

1.3 Research contribution

This research specifically addresses the development and evaluation of a taxonomy and framework to provide comprehensive guidance on the design, evaluation, and analysis of authentication protocols in the public literature and future proposals. This enables designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. Besides, this work makes several related contributions. We present the network model, outline the applications, list the communication patterns and the underlying standards, and discuss the necessity of using cryptography in vehicular networks. We also review the security standards and analyze multiple well-known authentication schemes. The main contributions are summarized as follows:

A new comprehensive taxonomy for authentication strategies in VC systems is provided. This generic taxonomy will enable identification of the similarities and differences between sets of related protocols. It helps to identify common structural elements for each class aiding both design and analysis. Based on extensive review of the public literature [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 ], this research has identified seven different criteria that form the backbone of many authentication schemes proposed for securing VC systems. The identified criteria used in the taxonomy proposed in this research include: cryptographic method, credential type, verification approach, secure hardware, privacy principle, network domain, and application latency.

Based on the proposed taxonomy, a framework is generated to facilitate comparisons of new and existing protocols, provide guidance for the design, evaluation, and analysis, and highlight common elements that could allow reuse of a given analysis.

A case study approach is employed to demonstrate the usefulness of the proposed taxonomy and framework. Through two types of case study, this research provides individual analysis of seven well-known authentication protocols and presents a hypothetical authentication protocol design.

1.4 Research scope

Please note that this manuscript does have its limitation. This is not a survey paper on this area, and the reader will necessarily have to use other sources to get a ’big picture’ overview. The aim is to systematize the study by grouping different authentication strategies using the proposed taxonomy, while providing related examples for each group. Thus, no attempt is made to write a survey paper covering all emerging authentication methods.

The remainder of this paper is organized as follows. Section   2 reviews different cryptographic techniques for authentication, cryptography for certification of network entities, key-management technique for cryptographic authentication, and outlines some basic definitions. Section  3 provides an overview on the vehicular networks, applications, the key features of European, American, and Japanese C-ITS standards, and the network simulation tools. The IEEE 1609.2 C-ITS security standard is also outlined. Section  4 discusses the threats, and outlines the efficiency and privacy requirements for authentication in vehicular networks. The necessity of using key-management mechanism is also covered. Section  5 reviews previous work on classifying authentication protocols. Section  6 presents our taxonomy for authentication strategies. Section  7 introduces our framework. In Sect.  8 , we illustrate the use of our framework by case studies provided. We discuss our framework in Sect.  9 and conclude the paper in Sect.  10 . Please note that all the abbreviations used throughout the paper are summarized in Table  1 .

2 Preliminaries in cryptography

Before the underlying cryptographic primitives for authentication protocols in VC systems can be discussed, a brief introduction to cryptography is necessary.

The method in which advanced mathematical principles are used to store and transmit data in a secure way is called Cryptography [ 10 ]. A cryptographic algorithm uses a string of bits to transform a plain text into a cipher text (encryption) or vice versa (decryption). This string of bits is called a cryptographic key which remains private to ensure a secure communication. The length of a key is normally expressed in bits. A longer key makes exhaustive key search more difficult to perform (makes an encrypted data more difficult to crack). It may also result in longer time periods to perform encryption and decryption processes. Cryptographic keys can be used for different purposes, such as data encryption, decryption, identification, and message authentication.

Basically, there are two major categories of encryption, called symmetric encryption (also known as secret-key encryption), and asymmetric encryption (also known as public-key encryption) [ 10 ].

Symmetric encryption (also known as symmetric-key cryptography) uses a secret key such as a string of random letters to change the content of a message in a particular way. Both sender and recipient can encrypt and decrypt all messages using the same secret key. It is highly efficient in terms of computational overhead, and offers the benefits of short encryption and decryption time [ 10 ].

One of the main drawbacks of symmetric encryption technique is exchanging secret keys over the network. As any party who knows the secret keys can decrypt the message, it is vital to prevent them from falling into the wrong hands. One solution is asymmetric encryption [ 10 ].

Asymmetric encryption (also known as public-key cryptography) consists of two mathematically related keys (a key pair), including a public key and a private key. Any party or a certificate authority can generate public/private key pairs. A public key is available to anyone who may want to encrypt and send a message to you, while a private key must be kept secret to decrypt the message. In secure systems, computing private key given public key is computationally infeasible. Any encrypted message using a public key can only be decrypted by applying the same algorithm and the matching private key. Using this method, we are not concerned about exchanging public keys over the networks [ 10 ].

One of the main drawbacks of asymmetric encryption technique is high computational overhead. Asymmetric encryption requires far more processing power for both encryption and decryption, and as a result, it is slower than symmetric encryption [ 10 ].

This section briefly reviews different cryptographic techniques for authentication, cryptography for certification of network entities, key management for cryptographic authentication, and outlines some basic definitions.

2.1 Cryptography for authentication

There are three methods to provide data origin authentication, including Message Authentication Codes (MACs), digital signature schemes, and appending (adding a secret authenticator value to an encrypted text).

Unlike digital signatures, other mechanisms for data origin authentication based on shared secret keys such as MACs do not provide non-repudiation of data origin. Non-repudiation ensures that a dishonest party cannot deny its action, such as the time of generating and transmitting a message. The reason is that using the shared key, any party can equally originate a message. In cryptography, a shared secret is a piece of data such as a password, a pass phrase, a big number, or a randomly chosen array of bytes. In a secure communication, a shared secret is known only to the involved parties.

This section reviews some basic cryptographic primitives for authentication, including: hash functions, MACs, hash-based MACs, and digital signatures.

A Cryptographic hash function

A cryptographic hash function is a one-way function (infeasible to invert) that is used for data integrity assurance. It takes a message as input and produces an output referred to as a hash value. A cryptographic hash implies an un-keyed hash function [ 10 ].

B Message authentication code (MAC)

A MAC is a short piece of information used to confirm that a message comes from the stated sender (its authenticity), and has not been changed. Different symmetric cryptographic primitives such as cryptographic hash functions, or block cipher algorithms can be used to construct MAC algorithms [ 10 ].

C Hash-based message authentication code (HMAC)

An HMAC implies a keyed-hash function that takes two functionally distinct inputs, a message and a secret key, and produces a fixed-size output. In practice, it should be infeasible to produce the same output without knowledge of the key. HMACs can be constructed using Secure Hash Algorithms (SHA), such as SHA-256 or SHA3-256 cryptographic hash functions. HMACs can be used to provide both data integrity assurance and symmetric data origin authentication, as well as identification in symmetric-key schemes [ 10 ]. Note that any communicating node with knowledge of shared secret key can be an originator of data.

Hash-based authentication is highly efficient in terms of computational and communication overhead. It offers the benefits of short generation and verification time as well as less communication overhead. The security of HMACs depends on the cryptographic strength of the underlying hash function, and the size and quality of the key used [ 10 ].

D Digital signature

A digital signature is a number generated on the content of a message using a secret that is known only to the signer, and must be verifiable. In information security, digital signatures have many applications. They are used for ensuring authentication, data integrity, and non-repudiation. Also, digital signatures are significantly applied for the certification of public keys in large networks. Certification is a mechanism to bind a user identity to a public key by a trusted party. This public key later can be authenticated by other entities without assistance from a TA. In this regard, many studies propose authentication mechanisms using digital signatures and cryptographic techniques [ 10 ].

Johnson et al. [ 70 ] proposed the Elliptic Curve Digital Signature Algorithm (ECDSA) which is a digital signature scheme based on Elliptic Curve Cryptography (ECC), as described by Koblitz [ 71 ] and Miller [ 72 ]. The ECDSA is one of the most important underlying cryptographic primitives to design authentication schemes. In ECDSA, the message sender generates a signature with its own private key and the receiver verifies the signature with the sender’s public key.

The security of the ECC-based algorithms is dependent on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP), if the elliptic curve group is selected properly. ECC offers similar security with smaller key sizes and memory requirements compared to other traditional DLP-based schemes in use today [ 73 , 74 ].

2.2 Asymmetric public key certification

To benefit from asymmetric encryption, each communication party needs to obtain the recipient’s public key. The most common approach to convey public keys is to use digital certificates (also known as certificates). A certificate consists of information to identify a party (a user or a server). This information might be the certificate owner’s name, the certificate issuer organization, the owner’s e-mail address, country, and public key. An entity’s credential is embedded in a certificate which is either explicitly (signed by a trusted authority or self-signed) or implicitly (without attaching signature) certified. Using a copy of certificate, any party can extract the provided public key which is located in the certificate to uniquely identify the holder.

A Certification authority

The certification authority (CA) or trusted authority (TA) for certification is a managing authority that acts as the root of trust in a networked system [ 54 , 75 ]. The CA can be a single point of trust (centralized), or multiple entities jointly working together (decentralized). For example, the department of motor vehicles or the department of transportation can provide everything related to authentication and key management in VANETs.

B Public-key explicit certificate

The public-key certificate is a data structure composed of two different parts, including a data part and a signature part. They can be used to store, distribute, or forward public keys over unsecured network without worrying about undetectable manipulation. A certificate makes one entity’s authentic copy of public key available to others. Thus, others can verify the true public key of that entity and its validity.

The data part consists at least a public key and a unique string identifying the associated real-world entity. The signature part on the certificate contains a signature belonging to the CA that binds the subject entity’s unique identity to the specified public key. Using this signature, an intended recipient can verify that the public key belongs to the subject entity. The CA is a trusted third party and responsible for signing the data part. During an authorized user registration, the authentic public key of the CA is made available to each party. The CA’s public key enables system users to authenticate the public key in any certificate signed by that CA, and as a result, certificates transfer trust. The certificate’s data part may carry additional information, for example the issuing CA’s name, public key validity period, certificate serial number, the key identifier, subject entity’s address, algorithm or intended use of key, key pair generation policies, signature algorithm identifier, or the status of the public key for revocation purpose [ 10 ].

The overall process in which a party B authenticates the public-key certificate of party A is summarized as follows:

(One-time) receiving the CA’s authentic public key.

Receiving A’s public-key certificate.

Verifying the certificate validity period (if any).

Verifying the current validity of the CA’s public key.

Verifying the signature on A’s certificate, using the CA’s public key.

Verifying that the certificate is not revoked.

Accepting the A’s public key as an authentic key [ 10 ].

C Implicitly certified public key

The implicitly certified public key or implicit certificate is another variation of digital certificates in public-key cryptography in which an explicit user’s public key can be implicitly certified. The main difference is that here a public key must be reconstructed from public data, rather than transported by public-key certificates (explicit certificates) in certificate-based systems [ 76 ].

The Elliptic Curve Qu-Vanstone (ECQV) implicit certificate [ 76 ] is a variation of the digital certificates used with cryptography for which an explicit user’s credential can be implicitly certified. The main difference is that here a credential must be reconstructed from public data, rather than transported within a certificate, as occurs with explicit certificates. An explicit certificate is composed of two different parts: a data part and a signature part. The data part contains a credential and a unique string identifying the associated entity. The signature part of the certificate contains the signature of the certificate owner or a trusted authority and that binds the subject entity’s unique identity to the specified credential. An intended recipient can verify this signature and be assured that the credential belongs to the subject entity. During an authorized system user registration, the authentic public key of the trusted authority is made available to all communicating nodes. This public key enables communicating nodes to verify the certificates signed by that trusted authority, and as a result, transfers trust.

The implicit certificate is still comprised of the three main elements/parts (identifier, public credential, and digital signature), but superimposed into the same space as the size of a public credential, resulting in reduced data transfer. ECQV provides a more efficient alternative to traditional explicit certificates, as described in the document Standards for Efficient Cryptography 4 [ 76 ]. The ECQV implicit certificate scheme is particularly well suited for application environments where resources such as bandwidth, computing power and storage are limited [ 17 ].

D Pseudonym certificate

A pseudonym or alias is an alternative identity that is verified by a third party (e.g., the CA) [ 77 ]. The pseudonym certificate is introduced to ensure that services can be used without disclosing the user’s identity while the user is accountable for that use. For example, a government transportation authority or a vehicle manufacturer in liability-related cases may trace a vehicle that disrupts the network. In this case, a driver profile may be fetched to be used for legitimate reasons, such as providing emergency services or law enforcement with appropriate information. Designing an authentication mechanism that preserves driver privacy and also tracks dishonest vehicles is a major challenge.

E Certificate revocation list

A cryptographic key is compromised if an adversary gains knowledge of secret data. It is important to stop using or trusting the keying material which are no longer secure. The revocation for public-key certificates with long-term validity is a difficult task, as all distributed copies must be effectively retracted. One solution for this is use of Certificate Revocation List (CRL). A CRL is a list of public key entries subject to revoke. Each entry indicates the unique identifier of the associated certificate. The CA’s signature on the CRL guarantees its authenticity. CRLs should be issued at regular intervals even if there are no changes, to prevent new CRLs being maliciously replaced by old CRLs [ 10 ].

2.3 Key management for cryptographic authentication

Any cryptographic technique for authentication requires the use of a cryptographic key. Thus, a key-management mechanism is also required, to allow parties to establish and update the keys for security-sensitive operations [ 10 ]. Key management is very important, and it is necessary to protect keying material against threats in which:

Confidentiality of secret keys is compromised.

Authenticity of secret or public keys is compromised. This authentication mechanism is to verify the identity of a party which a key is associated with.

Authorized use of secret or public keys is compromised. For instance, using a key which is not intended to be used anymore, or no longer valid.

3 Overview of vehicular networks

This section first briefly reviews vehicular communication systems and VANETs. Next, the network model is presented and the VANET applications are outlined. Then, the communication patterns and the underlying C-ITS standards are listed. The C-ITS security standards are also discussed. Finally, the network simulation tools are briefly reviewed.

3.1 Vehicular communication systems and VANETs

Car manufacturers and industries embed devices known as On-Board Units (OBUs) in vehicles to facilitate Vehicular Communication (VC) systems. The VC systems have the potential to improve current vehicular safety services through periodic safety message broadcasting, to let vehicles know about environmental conditions and neighboring vehicles [ 78 ].

By connecting communicating nodes consisting of vehicles and Road-Side Units (RSUs), a self-organized network called Vehicular Ad-hoc Network (VANET) can be formed. A VANET is a type of Mobile Ad-hoc Network (MANET). VANETs have some unique characteristics, as the mobile nodes are vehicles equipped with OBUs. As the vehicles may move at high speeds, the VANET topology may change rapidly. Both the network density and the number of vehicles in one area of the road temporally fluctuate during the day.

Many modern vehicles use services such as localization, route selection, and accident avoidance using VC systems. These rely on inter-vehicle and intra-vehicle VANET communication services. The inter-vehicle transmission ensures Vehicle-to-Vehicle (V2V) and Vehicle-to/from-Infrastructure (V2I/I2V) wireless communications. The V2V communication is among nearby vehicles, and the V2I/I2V communication is between vehicles and infrastructure (e.g., RSU). Intra-vehicle communication consists of different components, such as sensors, actuators, devices, switches, displays, and other electronic components that are interconnected and act as communicating nodes over a serial communication bus called the Controller Area Network (CAN). This communication performs automotive functions inside a vehicle [ 78 ].

3.2 Network model

A potential vehicular network consists of a Trusted Authority (TA), RSUs along the roads, OBUs embedded in vehicles, and communication between these entities. This VANET architecture and communication model is illustrated in Fig.  1 .

The TA is assumed to be always secure, trusted, and online. The TA can be implemented in a multi-layer structure, e.g., root TA and several sub-TAs. For sake of simplicity, here we show the TA as a single entity. The TA is a managing authority that can act as the root of trust to generate, update, and revoke credentials for other network entities, including vehicles. For example, the department of motor vehicles or the Department of Transportation (DOT) can act as the root TA. Further, the TA is the only one entity which can reveal a vehicle’s real identifier in case of dispute.

The RSU is an access point, used along with vehicles, to allow information dissemination for the road user community. The RSUs are located along critical sections of roads, such as at traffic light intersections, or at stop signs. The RSUs are connected to the backbone network via high-speed network connections, and have data storing, computing, and routing capabilities for supporting the V2I communication [ 79 ] and increasing the V2V communication connectivity [ 80 ]. The distributed RSUs are equipped with a higher computational capability and transmission power than OBUs. The TA and RSUs can be connected to each other through wired connections or the Internet. The RSUs work as gateways to deliver data from the TA to roadside vehicles, and vice versa. The range of an RSU-to-vehicle communication can be larger than that of the V2V and vehicle-to-RSU communications to improve the network availability and performance [ 81 ].

Smart vehicles equipped with OBU, sensors, and Global Positioning System (GPS) move along the roads and communicate with other vehicles and RSUs according to a defined Intelligent Transportation Systems Radio Service (ITS-RS) standard, such as the Dedicated Short-Range Communications (DSRC) protocol [ 81 ]. A Tamper Proof Device (TPD) is embedded in each OBU to store the user inaccessible cryptographic keying materials involved in cryptographic operations. Moreover, each vehicle has a unique barcode/identifier that can be known to the DOT. Figure  2 illustrates an envisioned smart vehicle prototype.

figure 1

Vehicular network model

figure 2

Envisioned smart vehicle prototype

3.3 VANETs applications

Communications in VANETs aim to exchange information, such as traffic issues and road conditions. Thus, a wide range of applications can be deployed in VANETs. A potential classification of applications for VANET based on the safety objectives has classes, including: safety-critical, safety-related, and non-safety applications.

A Safety-critical application

Safety-critical applications (also known as latency critical) are the most important applications for hazardous situations, where the danger is high or imminent (e.g., intersection collision warning). Vehicles periodically (automatically at regular intervals) broadcast messages about events in their vicinity, such as collisions, road conditions, and emergency braking. The receiver vehicle can collect relevant information and inform the human driver about relevant events, depending on the context and situation. For this case, the communication requires high reliability and low latency to realize the safety function. The communication technology used in these applications can be V2V, V2I, and I2V. The latency required for most safety-critical applications is 100 ms (minimum update rate of 10 Hz) in a communication range of 150 to 500 m [ 7 ]. The system utility requires vehicles to receive updated information from surrounding vehicles within the required time frame before sending out a new safety message.

B Safety-related applications

Safety-related applications are event-driven (the transmission is triggered by an event) and are used in cases where the latency requirements are not as stringent as for safety-critical applications, and the danger is low, but still foreseeable (e.g., post-crash warning). The communication technology used in these applications can be V2V, V2I, and I2V. The latency required for most safety-related applications is between 500 and 1000 ms (update rate of 1 Hz) in a communication range of 250 to 1000 m [ 7 ]. The mechanisms to generate safety-related messages are quite different than the other two classes. First, a vehicle’s sensor detects an event, and local sensor information is aggregated. Then, in the case of a dangerous event, a message will be generated and broadcast by the vehicle. Also, a single car may not able to detect events such as traffic jam, which needs multiple cars location information to conclude that it is in or before a traffic jam. This example makes it easy to understand that matching the information received from different vehicles is critical for reliability.

C Non-safety applications

Non-safety applications provide periodic or event-driven traffic information and enhance driving comfort, such as traffic updates, electronic toll collection, and infotainment (the Internet, media, and entertainment). For example, information download at service stations or public hotspots, which can be served freely, or require a service subscription or a one-time payment. The latency required for most non-safety applications is 1000 ms (update rate of 1 Hz) in a communication range of 100 to 400 m [ 7 ]. The communication technology used in these applications can be V2V, V2I, and I2V. These services access the channels in the communication system in a low priority mode compared to safety-critical and safety-related applications [ 7 ]. A high priority message may contain crucial information regarding a crash that is about to occur.

In a VANET system, each safety message can carry information such as location, current time, direction of travel, speed, braking status, steering angle, turning signal, acceleration/deceleration, traffic conditions, and traffic events. RSUs can assist drivers in finding service centers, for example restaurants or gas stations, and broadcast traffic-related messages through V2I communications. For instance, a traffic light can remotely inform a vehicle about how many seconds are left before it turns to yellow or red. These advance-warning signs may be helpful to those drivers who are driving in bad weather conditions or unfamiliar areas.

However, when a vehicle’s status and location information is linked to an identifiable individual, the data becomes personal information that may affect privacy. Thus, it is important to protect personal information during information exchange in the VANET applications. This issue is explained in detail in Sect.   4.4 .

3.4 C-ITS standards

A standard is a document that provides specifications, requirements, guidelines or characteristics that may be used to make sure that materials, processes, products and services are fit for their purpose. The C-ITS standards are required for infrastructure and are intended to enable vehicles to talk to one another in an interoperable way [ 82 ]. The C-ITS criteria are required to specify general components such as:

Which entities communicate, and to whom (e.g., vehicle, pedestrian, roadside infrastructure, central servers)

What message set is used inside the communication

What media and channel allocation (if applicable) is utilized (e.g., 5.9 GHz and the applicable station allocation)

Which protocol is used (e.g., IPv6)

What software is used, and how it is implemented.

Due to the VANETs highly dynamic topology and high data rate requirements, designing a proper protocol and application to use for message exchange in such environments is a challenging task. The Institute of Electrical and Electronics Engineers (IEEE) in USA, the European Telecommunications Standards Institute (ETSI) in Europe, and Association of Radio Industries and Businesses (ARIB) in Japan are the most well-known sources for defining C-ITS standards. The standards establish communication rules which assure transportation agencies that components from different manufacturers will work together. Results include efficiency, compatibility and interoperability, security, and mobility within the industry [ 82 ]. Some ITS standards are adopted around the world. Numerous countries and areas (e.g., European Union) are now developing the C-ITS platforms for deployment. The developments are emerging in Europe [ 83 ], the USA [ 3 ], and Japan [ 84 ].

Standards published by technical groups such as IEEE 802.11p, IEEE 1609, ETSI, and ARIB STD-T109 are intended to help VANETs to reduce transportation problems such as traffic congestion and traffic accidents. This section reviews the standards to understand the current state and progress of the development technologies behind the research problem.

A IEEE 802.11p

One of the most important standards is IEEE 802.11p [ 85 ] which is an amendment of IEEE 802.11 Wireless Local Area Network (WLAN) standard to support vehicular communications. It has different characteristics than usual wireless communications, for example short connection times. It uses IEEE 802.11a conventional Orthogonal Frequency Division Multiplexing-based (OFDM-based) physical layer and high quality of service improvements of IEEE 802.11e to work in high-performance systems. The Physical layer (PHY) and wireless LAN Medium Access Control layer (MAC) specifications are defined in the original IEEE 802.11p standard, published in 1997. The fundamental access method for the MAC realization is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Three different propagation modes are defined in IEEE 802.11 standard, including 2.4 GHz Frequency-Hopping Spread Spectrum (FHSS), the 2.4 GHz Direct Sequence Spread Spectrum (DSSS) and the infrared system [ 86 ]. The IEEE 802.11p utilizes an Enhanced Distributed Channel Access (EDCA) MAC sublayer protocol built into IEEE 802.11e, with a few modifications to the transmission parameters.

B C-ITS standard in the U.S.

IEEE 1609 standard has defined the first version of WAVE protocol stack using IEEE 802.11p. The WAVE protocol [ 81 ] reserves bandwidth of 75 MegaHertz (MHz) (in frequency range 5.850 to 5.925 GHz) to use in the U.S. DSRC spectrum band, known as Intelligent Transportation Systems Radio Service (ITS-RS). The 75 MHz band includes one central Control Channel (CCH) and Six Service Channels (SCH).

C C-ITS standard in Europe

IEEE 802.11p as an access layer is used in the European ETSI ITS-G5 family of standards [ 87 , 88 ] to provide V2V and V2I communications. It describes the PHY and MAC sub-layer of ITS stations operating in the 5.9 GHz frequency band, covering the G5A in frequency range 5.875 GHz to 5.905 GHz (dedicated for safety and safety-related applications), the G5B in frequency range 5.855 GHz to 5.875 GHz, and the G5C in frequency range 5.470 GHz to 5.725 GHz (for other applications). The PHY layer of G5A defines three 10 MHz channels including CCH, SCH1 and SCH2. Unlike IEEE 1609, ITS G5 uses a model including state machines and different tunable parameters to control MAC.

D C-ITS standard in Japan

In parallel to the American and European C-ITS standards, the Japanese ARIB STD-T109 [ 89 ] mandates operating of ITS in the 700 MHz frequency band to inform vehicles and drivers about traffic status in order to reduce the number of traffic accidents. ARIB STD-T109 specifies a PHY similar to IEEE 802.11p, but operating on a center frequency of 760 MHz. The MAC layer described in this standard employs Time Division Multiple Access (TDMA) protocol to ensure that all the vehicles have enough time to send safety messages without collision and delay.

E C-ITS security standards

The IEEE 1609.2 security standard [ 90 ] describes security services for applications and messages in the vehicular environments. It specifies use of the MACs [ 91 ] and ECDSA [ 70 ], as specified in the (U.S.) Federal Information Processing Standard (FIPS) 186-4 [ 92 ] to authenticate messages. IEEE 1609.2 also specifies use of ECDSA or ECQV [ 76 ] to ensure that a legitimate entity of VANET is the source of data communicated. Both the ECDSA and ECQV algorithms rely on ECC, as described by Koblitz [ 71 ] and Miller [ 72 ]. For any offered data, the Secure Hash Algorithms (SHA) approved to use in this standard are SHA-256 and SHA-384, as specified in the FIPS 180-4 [ 93 ]. However, the issues related to authentication, such as defining driver identification, and privacy protection are not addressed in the current IEEE 1609.2 standard, and left many open problems.

There are several different standards covering selection of curves to use in ECC, such as the National Institute of Standards and Technology (NIST) and the Brainpool Standard Curves and Curve Generation (Brainpool). These standards define three elliptic curves for the cryptographic processes, including: NIST P-256, BrainpoolP256r1, and BrainpoolP384r1 [ 94 , 95 ].

The IEEE 1609.2 recommends these curves to use in the vehicular environments, and restricts the secret key size to become 256 bits (for NIST P-256 and BrainpoolP256r1) and 384 bits for (BrainpoolP384r1). Many security standards such as European ETSI TS 103 097 reference IEEE 1609.2 to ensure that the connected vehicles will operate safely, securely and efficiently.

3.5 Vehicular network simulation tools

Experimental studies on VANETs require the use of a mobility modeling tool to simulate vehicle movement patterns. For example, the commercial simulation software VISSIM [ 96 ] can be used together with a network simulator, such as the network simulator 3 (ns-3) [ 97 ] to model VANET communications. The purpose for using simulation tools is to evaluate communication performance in situations very similar to real-world scenarios, and to highlight existing issues.

Veins Vehicles in Network Simulation [ 98 ] is an open source vehicular network simulation framework. The Veins contains a fully functioning implementation of IEEE 802.11p [ 99 ]. It relies on fully detailed models of IEEE 1609.4 DSRC/WAVE network layers, including noise and interference effects, and is frequently used in academic research. As of today, over 1100 publications relied on the Veins, such as the simulation study presented by Baee et al. [ 17 ]. The Veins utilizes the models provided in the OMNeT++ discrete event simulator [ 100 ] and SUMO Simulation of Urban Mobility [ 101 ] for network simulation and vehicular movement, respectively.

By contrast with ns-3, OMNeT++ has very good visualization support. It also provides high level architecture, and allows the interaction between SUMO and other network simulators.

Unlike the VISSIM, SUMO is free and open source software. It is highly portable, and allows simulations of multi-modal traffic in city-scale networks efficiently [ 102 ].

4 Authentication in VANETs

One of the main security requirements for VANETs is message authentication. This ensures that the received safety messages were generated by a trusted source, and have not been tampered with or altered after generation. In a VANET system, each vehicle broadcasts periodic safety messages to let other vehicles know about environmental conditions and their neighboring vehicles. Each safety message can carry critical information such as location, speed, braking status, traffic conditions, and traffic events. Any malicious activity, such as alteration and replaying of the disseminated messages, can be disastrous to drivers. Thus, it is necessary to ensure that the received safety messages come from legitimate vehicles, and are not altered by attackers. Also, a sender can later deny the message generation.

In this section, the security attacks on authentication and the related security requirements are discussed. The section also looks into efficient authentication requirements of VANETs, because cryptographic operations are compute-intensive and do have an impact on overall application performance. Most of the VANET safety applications are low latency (100 ms). Thus, an efficient mechanism required to authenticate received messages in a short period (100 ms), before broadcasting a new safety message.

4.1 Threats and attacks in VANETs

Threats exist for communication necessary for the VANETs operation. Malicious vehicles can make use of VANET to broadcast fraudulent messages to other vehicles in the vicinity for their own profit, or just to jeopardize the traffic system. Hence, the system must be designed to ensure that the transmission comes from a trusted source and has not been tampered with since transmission. We define a node to be adversary if it captures, injects, or deliberately alters any messages [ 103 ]. The most often encountered attacks concerning authentication are outlined as follows [ 13 ]:

GPS spoofing attack: A location table containing the geographic location information about all the vehicles in the VANETs is saved in the GPS satellite. A GPS satellite simulator may be used by an attacker to generate false GPS signals, which are stronger than those generated by the actual satellite system. The attacker deceives the nodes by giving falsified GPS coordinates. Thus, the nodes position themselves in wrong locations.

Replay attack: This attack is known as a play back attack (also known as re-transmitted or postponed attack) where a message is captured, and is replayed at a later time or in a different location. The VANET requires resources such as memory and time to compare and verify new and previously received messages.

Free-riding attack: This attack is created through a malicious user who pretends to participate in cooperative authentication by incorporating neighbor users authentication attempts into its own integrated message authentication tag. By utilizing this attack, the forged authentication tag is verifiable by others while the malicious user does not actually contribute in the authentication of any original message [ 22 , 104 ].

Impersonation attack: By utilizing a fake or stolen identity of a valid user, an attacker gets the privilege of an authenticated user inside the VANET and can perform many malicious activities. For example, an attacker cheats the valid nodes to reduce their speed by pretending to be an emergency vehicle.

Computational Denial of Service (DoS) attack: Where a receiver is flooded with invalid authentication requests (e.g., digital signatures) designed to consume the vehicles computing resources.

Message tampering attack: The attacker sends fake response or counterfeit requests by altering exchanged messages in the VANET communications [ 105 ].

4.2 Authentication requirements in VANETs

A safety message has to be authenticated at two levels, including node level, and the message level. Node level authentication refers to entity authentication (identification), and ensures that the safety message is received from a legitimate vehicle. The message level authentication or data-origin authentication ensures the integrity of a message, and plays an important role in enhancing security in VANET [ 8 ]. For the interested reader, additional information related to message authentication is presented in Sect.  2.1 .

In summary, to ensure security against those threats and attacks, the following requirements must be satisfied [ 14 , 106 ]:

Entity authentication, to verify legitimacy of sender vehicle.

Message authentication, to detect message tampering and ensure data consistency.

Non-repudiation, to ensure the sender of a message cannot deny the message transmission.

4.3 Efficiency requirements for VANETs authentication

The embedded OBUs in vehicles use processors with limited computation ability to make VANETs economically viable. Therefore, the cryptographic operations used in VANETs should perform limited computational overhead (should be lightweight) [ 54 ]. The most important requirements for supplying efficient and dependable authentication [ 105 ] are listed below:

Overhead: For verifying an authentication request, the number of cryptographic operations to be performed by RSU or from an automobile node or TA should be minimized.

Bandwidth utilization: The bandwidth needs to be effectively used by vehicles (in bytes per second) for an authentication request, in the case of exchanging cryptographic keys and credentials.

Response time: The time taken to respond to an authentication request must be reduced.

Reliability: Authentication methods need to be stiff enough against attackers.

Scalability: Authentication mechanism should be scalable.

4.4 Privacy-preserving authentication in VANETs

This section outlines the information privacy and its importance in VC systems and VANETs.

A Information privacy

Westin [ 107 ] explains “privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” . Schoeman [ 108 ] explains privacy as “control we have over information about ourselves” .

Information privacy refers to control of personal information. For systems containing private information, it is important to assess the risks associated with collection, use and disclosure of that information. Personal information refers to information which is directly linked to an identifiable individual.

Private information can be a name, address, driver’s license, or license plate and registration [ 109 ]. Personal information can also lead to an identifiable individual when combined.

B The importance of privacy in VANETs

In VANETs, vehicles broadcast unencrypted messages on a regular basis, containing a Vehicle Identifier Number (VIN) along with the vehicle’s location information (using GPS), speed, and direction of traveling [ 110 ].

In a VANET system, protection of driver’s identity should be guaranteed [ 111 , 112 ]. Identity Privacy in VANETs refers to the ability to prevent others from learning and linking an identifier to a driver/vehicle. An adversary can capture communications and link the identifiers to specific vehicles, and consequently to the drivers (ID disclosure), providing a means for surveillance. The vehicle size attribute, acceleration, speed, steering angle, and position within a beacon message helps an observer to decide which beacon to link to a single vehicle. For example, in areas where a specific size vehicle is not frequent, two beacons can be linked to a single vehicle with high confidence [ 113 ].

From a legal perspective, it can be assumed that information privacy will not be harmed if there is no personally identifiable information [ 114 ]. However, many proposals for securing VANETs demonstrated that in some circumstances, non-personally identifiable information can be linked to individuals and transformed into personally identifiable information.

It is possible for an adversary to track a vehicle by installing cameras or physical tracking equipment on the road. Also, it is possible for an adversary to follow a vehicle using another vehicle to discover the driver’s location. Such physical attacks may only trace specific targets, and are much more expensive than capturing the communications in VANETs [ 115 ]. This research addresses the issue associated with malicious capturing of wireless traffic in the VANET communications. The knowledge of a driver’s route, or tracking a vehicle based on Radio Frequency Fingerprinting (RF Fingerprinting) [ 116 ] are outside the scope of this research.

C Privacy issues in VANETs

Privacy can often conflict with authentication requirements. A unique identifier (e.g., the VIN) is provided to a vehicle for authentication purposes. The fact is that sensitive personal information, such as the locations of our home, office, and other places can be revealed by tracking our vehicles using the shared critical information and the unique identifiers for authentication.

This vehicle unique identifier can be associated with an identifiable individual (e.g., driver or vehicle owner). In this case, the data becomes personal information whose protection and confidentiality would fall under stringent requirements. This is important in terms of information privacy. An adversary can capture the communications and link the identifiers to the vehicles, and consequently to the drivers (ID disclosure).

To avoid this, protection of the driver’s identity during authentication must be guaranteed. A mechanism is required to provide message anonymity while also enabling identification by a trusted party (e.g., the department of motor vehicles or the department of transportation). For example, a government transportation authority or a vehicle manufacturer in liability-related cases may trace a vehicle that disrupts the network. In this case, a driver profile may be fetched to be used for legitimate reasons, such as providing emergency services or law enforcement with appropriate information. Designing an authentication mechanism that preserves driver privacy and also tracks dishonest vehicles is a major challenge.

The beacon content confidentiality is another concern. The vehicle size attribute, acceleration, speed, steering angle, and position within a beacon message helps an observer to decide which beacon to link to a single vehicle. For example, in areas where a specific size vehicle is not frequent, two beacons can be linked to a single vehicle with high confidence [ 113 ].

4.5 Key management in VANETs

A cryptographic system requires key-management techniques to control the distribution, use, update, and revocation of cryptographic keys, as well as protocols to manage certificates in certificate-based systems. The embedded OBU in a vehicle requires a key-management mechanism in which a number of properties should be fulfilled [ 54 ]. Ideally, an OBU key-management mechanism should provide the following desirable properties:

Long-term Unlinkability: A basic privacy requirement is that it should be impossible for any observer to learn if a specific vehicle has transmitted or will transmit a message (more generally, take an action according to a VC protocol), and it should be impossible to link any two or more messages sent from the same vehicle [ 117 ]. If an observer tried to guess which vehicle transmitted a particular message, there should be only a low probability of linking a vehicle’s actions or identifying it among the set of all vehicles. Messages contain parameters for identification of their senders (authentication), and messages generated by the same vehicle should be difficult to link to each other [ 118 ]. The digital certificates used for authentication purpose can lack identifying information. Regarding this important issue, public keys should change in such a way that an eavesdropper cannot link an old key with a new key.

Traceability and Revocation: In VC systems, each vehicle relies on messages received from other vehicles. To satisfy the aforementioned requirements in authentication, a mechanism should be designed that keeps messages to be anonymous to other vehicles, while enables identification by CA in liability-related cases to trace an OBU that abuses the VANET. In addition, once a malicious OBU has been detected, the authority should efficiently notify the VANET to revoke the misbehaving OBU’s identifier (to prevent any further damage).

Efficiency: The embedded OBUs in vehicles use processors with limited computation ability to make VANETs economically viable. Therefore, the cryptographic operations used in VANETs should perform limited computational overhead (should be lightweight) [ 54 ].

Perfect Forward Secrecy: If a cryptographic secret key for current session is revealed, an adversary must be unable to use this to recover past and future ciphertexts [ 10 , §12.16]. An authentication protocol needs a mechanism to automatically and frequently regenerate the keys it uses, such that if the latest key is compromised, it exposes only a small portion of sensitive data. A protocol is vulnerable to a known-key attack if perfect forward secrecy is not provided. Hence, compromise of past session keys allows an adversary to compromise future session keys [ 10 , §12.17]. The more frequently the keys are updated, the less data is processed with any given key, and as a result, the less impact the leak will have. This is regardless of the purpose of the key (e.g., authentication, or encryption).

5 Existing classifications for authentication in VANETs

Several existing studies [ 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 ] attempt to classify existing authentication schemes in vehicular networks. These works are reviewed in this section.

Hasrouny et al. [ 66 ] present an extensive overview of the most of VANET security challenges and their causes as well as the existing solutions in a comprehensive manner. They review the recent security architectures, the security standards, and multiple security protocols in detail. However, they focus on the classification of the different attacks on vehicular communications and their corresponding solutions.

Singh et al. [ 68 ] survey the state of the art architecture, applications, emerging radio access technologies, standardization, and project activities, as well as reviewing the protocol stacks of the ITS in the USA, Japan, and Europe. Their work is presented as a tutorial in the emerging radio access technologies for connected and autonomous vehicles and their associated challenges.

Manivannan et al. [ 69 ] classify multiple authentication schemes into two categories based on the problems addressed and the techniques used to solve these problems, and discuss their strengths and weaknesses.

Riley et al. [ 62 ] examine several proposed authentication schemes and classify them using two criteria. Firstly, they note the type of cryptographic algorithm the schemes use: symmetric or asymmetric. Then, each of these categories is divided into two subcategories: group-based schemes and non-group-based schemes (refer to Fig.   3 ).

Qu et al. [ 63 ] survey authentication protocols and also classify the schemes according to the type of cryptographic algorithms involved: symmetric or asymmetric (refer to Fig. 4 ). However, both of the classification schemes Riley et al. [ 62 ] and Qu et al. [ 63 ] rely on the computational complexity of cryptographic approaches.

figure 3

Classification based on Riley et al. [ 62 ]

figure 4

Classification based on Qu et al. [ 63 ]

Petit et al. [ 64 ] classify authentication schemes into one of four categories: asymmetric, symmetric, group signature, and identity-based. However, this single layer structure fails connect the identity-based and group signature approaches to asymmetric cryptography, which is the underlying primitive in both cases (refer to Fig.  5 ).

Manvi et al. [ 65 ] classify authentication strategies into three main categories: cryptography, signature, and verification. Each of these categories is further divided into several different subcategories such as asymmetric, group signature, and batch verification. Similar to [ 64 ], this structure does not include the identity-based approach as a subcategory of the asymmetric cryptography category (refer to Fig. 6 ).

figure 5

Classification based on Petit et al. [ 64 ]

figure 6

Classification based on Manvi et al. [ 65 ]

Lu et al. [ 67 ] classify authentication schemes into five categories based on the mechanism used: symmetric cryptography, Public-Key Infrastructure (PKI), identity-based signature, certificate-less signature, and group signature. This single layer structure does not group identity-based and certificate-less approaches in the same category, although both are certificate-less strategies (refer to Fig. 7 ).

The classification schemes reviewed in this section categorize authentication protocols based on just a few criteria. They are mainly based on the underlying cryptographic technique used, or they fail to make connections between different important aspects of authentication, such as digital signatures. These gaps are filled in this research by providing a generic and comprehensive taxonomy that enables identifying common structural elements for each class. Based on this taxonomy, a framework is generated to facilitate design, analysis, and comparisons of new and existing protocols.

6 The proposed taxonomy of authentication strategies in VC systems

This section presents a comprehensive taxonomy, based on seven criteria (as shown in Fig. 8 ): cryptographic method, credential type, verification approach, secure hardware, privacy principle, network domain, and application latency (see Fig. 10 ). These criteria are derived from observations of many authentication protocols. The following structures are used to describe the taxonomy. Each criterion is a class comprising at least a subclass, and group (or main group with subgroup), as shown in Fig.  9 .

figure 7

Classification based on Lu et al. [ 67 ]

figure 8

Classification based on this paper

figure 9

The structures used in our taxonomy

figure 10

The seven criteria, which are the bases for our taxonomy

The first criterion of this taxonomy recognizes the cryptographic method used for authentication. In VC systems, cryptographic primitives can be applied to solve many authentication issues, such as message manipulation. Cryptographic algorithms can be used for different purposes, such as identification and message authentication. For the interested reader, additional information related to cryptography and authentication is presented in Sect.   2 . There are three cryptographic method subclasses: symmetric, asymmetric, and non-cryptography.

The second criterion is based on the credential type used for authentication. A credential is a unique possession provided to a communicating node to be used as a proof of identity to identify the node as authentic with high confidence. There are two subclasses: tag-based and context-based.

The third criterion is based on the verification approach used to verify (or reject) an authentication request in the network. Vehicles can authenticate each authentication request independently, or rely on information from other communicating nodes to make an authentication decision. There are two subclasses: autonomous and cooperative.

The fourth criterion of this taxonomy is based on the hardware requirements for authentication. Some schemes rely on a Tamper Proof Device (TPD) to store and protect cryptographic keying materials, while others do not. Based on that, protocols can be classified into two subclasses: TPD-based and Non-TPD-based.

The fifth criterion of this taxonomy is the privacy principle. Authentication protocols use different approaches to provide conditional privacy for vehicles/drivers in VC systems. For both identification and message authentication, protection of the driver’s identity during authentication should be guaranteed. Identity privacy refers to the ability to prevent others from learning and linking a VC system identifier to a driver/vehicle. When a unique identifier is provided to a vehicle and its embedded communicating nodes for authentication purpose, this information can be associated with an identifiable individual. In this case, the data becomes personal information. An adversary can capture the communications and link the identifiers to the vehicles, and consequently to the drivers (ID disclosure), providing a means for surveillance. Based on the principle used, the class categorizes authentication strategies into one of three subclasses: anonymity, unlinkability, and non-privacy.

The sixth criterion is based on the network domain. The domains may be either intra-vehicle, inter-vehicle, or vehicle-RSU. A protocol is designed to provide authentication in a specific network domain, and may not be applicable to other domains. For example, an intra-vehicle protocol authenticates different communicating parts within a vehicle, but may not be applied for inter-vehicle authentication. There are two subclasses: vehicle-centric and roadside-centric.

The seventh criterion is based on the application latency for which the scheme can be used. Latency defines the time frame from when information is generated for transmission and when it is received. Different applications have different latency requirements. Examples include safety-critical, safety-related, or non-safety applications. Some protocols may satisfy the latency required by a non-safety application, but may not be fast enough to be used in safety-critical applications. Authentication protocols can be classified into three subclasses: low-latency, mid-latency, and high-latency, based on application time.

There may be other criteria in the literature for classification of authentication strategies in VC systems. The taxonomy includes the most important authentication criteria, and will enable classification of a variety of protocols in the public literature and future proposals.

6.1 Cryptographic method class

This class recognizes the cryptographic method used for authentication. There are three subclasses: symmetric, asymmetric, and non-cryptography. Figure  11 shows the cryptographic method class in expanded form.

A Symmetric subclass

The first subclass is those authentication schemes relying on symmetric cryptographic primitives. Symmetric algorithms make use of a secret key, and both sender and recipient perform message encryption and message decryption operations using the same secret key. One of the main drawbacks of the application of symmetric techniques is the secure distribution of secret keys to nodes in vehicular networks. As any communicating node with knowledge of the secret keys can decrypt the message, it is vital to prevent keys from falling into the wrong hands. The symmetric subclass can be further classified into two groups: Hash-based and MAC-based.

A.1 Hash-based group

This group of protocols perform authentication using hash functions. A cryptographic hash function is a one-way function (infeasible to invert) that is used for data integrity assurance. It takes a message as input and produces an output referred to as a hash value. A cryptographic hash implies an unkeyed hash function. The study presented by Han et al. [ 36 ] proposes a three-step authentication protocol using cryptographic hash value to provide data integrity assurance between the intra-vehicle network and an external network (mobile device).

A.2 MAC-based group

This group of protocols under symmetric subclass perform authentication using a distinct class of cryptographic primitives called Message Authentication Codes (MACs). The output of a MAC algorithm is referred to as a MAC, and is a short piece of information used to confirm that a message comes from the stated sender (its authenticity), and has not been changed [ 10 ] (refer to Sect.  2.1 ).

Different symmetric cryptographic primitives such as cryptographic hash functions, or block cipher algorithms can be used to construct MAC algorithms. An HMAC implies a keyed-hash function that takes two functionally distinct inputs, a message and a secret key, and produces a fixed-size output. In practice, it should be infeasible to produce the same output without knowledge of the key [ 10 ].

HMACs can be constructed from dedicated cryptographic hash functions, such as SHA-256 or SHA3-256 secure hash algorithms. In VANETs, HMACs can provide both data integrity assurance and symmetric data origin authentication, as well as identification in symmetric-key schemes. Note that any communicating node with knowledge of shared secret key can be an originator of data (refer to Sect.  2.1 ). Hence, it does not offer non-repudiation.

Hash-based authentication is highly efficient in terms of computational and communication overhead. It offers the benefits of short generation and verification time as well as less communication overhead. The security of HMACs depends on the cryptographic strength of the underlying hash function, and the size and quality of the key used [ 10 ]. An example of this is the authentication protocol proposed by Choi et al. [ 37 ] that enables vehicles and RSUs to generate/verify MACs in V2I/I2V communications, resulting in less reliance on availability of bandwidth, and high degree of efficiency.

Wang et al. [ 31 ] propose A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET , named 2FLIP. In 2FLIP, all vehicles are equipped with a same copy of system key to generate MACs on the broadcast messages. Recipient TPDs can verify the messages by creating MACs of the received messages with the same system key. This only requires one hash computation and one MAC operation to accomplish the message verification. Hence, the protocol is very efficient in terms of computation. However, the same copy of system key must be stored in all TPDs. This viewed as a single point of failure [ 34 ]. If a single vehicle’s system key is compromised, all vehicles in the network will be affected, and all will need to be updated with a new system key. However, a CA encrypts a new system key under the previous system key. In case of compromise of past system key, the new system key is very easily compromised (see [ 10 , §12.2.3] regarding perfect forward secrecy and known-key attacks).

Huang et al. [ 34 ] propose a similar efficient scheme to address the system-key problem in the scheme presented by Wang et al. [ 31 ]. However, the scheme is not scalable. For a new vehicle that joins into the network, the TA generates a list of pseudo identifiers along with a list of hashed values of the pseudo identifiers, and sends to the vehicle. Then, the TA updates all other vehicles with the hash of pseudo identifiers that are generated for the new vehicle. This means that all vehicles must store each other’s hashed values of pseudo identifiers. In case of a revocation, all vehicles must be updated with a new list of pseudo identifiers and hashed values.

Recently, Camenisch et al. [ 35 ] introduce the novel concept of zone encryption as a practical means to authentically and confidentially transmit data in vehicular communications. The zone encryption idea relies on symmetric authenticated encryption using temporary keys that are exchanged among vehicles. However, the scheme does not provide non-repudiation in V2V communication, and as a result, no proper traceability and revocation could be performed in case of malicious activity.

B Asymmetric subclass

The second subclass relies on asymmetric cryptographic primitives. Asymmetric algorithms make use of two mathematically related keys (a key pair), referred as a public key, and a private key. Any sender node can encrypt a message using the receiver’s public key. The corresponding private key must be kept secret, only known by the receiver. Any message encrypted using a public key can only be decrypted by applying the same algorithm and the matching private key. This method can be used to provide confidentiality, and thus securely distribute symmetric secret keys over vehicular networks. Asymmetric techniques can also be used for authentication [ 10 ]. Asymmetric cryptographic primitives require far more processing power for both encryption and decryption, and as a result, they are slower than symmetric techniques. The asymmetric subclass can be further divided into signature-based Group.

B.1 Signature-based group

This group of protocols provides authentication using digital signatures. In cryptography, a digital signature is a number generated from the content of a message using an algorithm and a private key that is known only to the signer. The signature must be verifiable using the corresponding public key [ 10 ]. In VC systems, digital signatures are used to ensure authentication, data integrity, non-repudiation, and for certification of public keys. In this regard, many studies propose authentication mechanisms using digital signature schemes.

Johnson et al. [ 70 ] proposed the ECDSA scheme which is a digital signature algorithm based on ECC. Gollan and Meinel [ 11 ] propose the use of digital signatures for authentication in vehicular environments. To use in vehicular communications, each message broadcast/sent is signed. Recipients must verify the signatures before accepting the messages. Raya and Hubaux [ 14 ] show that in terms of speed and compactness, ECDSA is fit for message authentication in V2V communications.

However, Baee et al. [ 17 ] demonstrate that care is needed when using the ECDSA for authentication of a high volume of received messages and credentials in V2V communication. The verification results in a delay in driver notification and allows insufficient driver reaction time, resulting in potential collisions and serious injuries (assuming the driver does not react independently).

There are other types of signature schemes used for authentication in VC systems. The group signature scheme applied by Calandriello et al. [ 25 ], ring signature scheme applied by Xiong et al. [ 38 ], and blind signature scheme applied by Fischer et al. [ 39 ] are other examples that fall into signature-based subclass.

C Non-cryptography subclass

Protocols in this subclass do not employ any cryptographic mechanism to provide authentication, and the network nodes do not perform basic input validation, which raises the possibility of remote spoofing of the messages transmitted. The study presented by Rouf et al. [ 40 ] experimentally validated that several protocols for state-of-the-art commercial tire pressure monitoring systems do not employ cryptographic authentication. Authors showed that using a customized software radio attack platform located in a nearby vehicle they can easily trigger the tire pressure warning messages in a moving vehicle.

6.2 Credential type class

This class recognizes the type of credential used for authentication. There are two subclasses: tag-based and context-based. Figure  12 shows the credential type class in expanded form.

figure 11

Cryptographic method class in expanded form

figure 12

Credential type class in expanded form

A Tag-based subclass

In this subclass, the credential can take the form of a key (for example, a public key) that is known to be unique to a network communicating node, and used for establishing its identity when communicating with other nodes. Any node holding a credential is usually given secret knowledge (e.g., a private or secret key) as proof of owning that credential. A node that wishes to communicate to the other nodes in the network is referred to as a supplicant . A node that receives and responds to the authentication requests is referred to as an authenticator . The supplicant can assure the authenticator about its credential (identity) if it is certain that the supplicant possesses a cryptographic private/secret key corresponding to that credential. Four main groups are defined under this subclass based on the process applied: credential generation, credential issuance, credential distribution, and credential revocation. Each main group can be further classified into different groups as follows.

A.1 Generation main group

This main group categorizes authentication protocols based on the approach used to generate credentials for the communicating nodes in the network, with respect to the authentication operation. This main group can be further classified into two groups based on the party that generates the credentials (the communicating node itself or a trusted party): these are autonomous and dependent.

A.1.1 Autonomous group

In this group of authentication protocols, a node generates credentials autonomously, removing the need for recurring communication with a trusted party. The scheme presented by Calandriello et al. [ 25 ] is an example where vehicles generate certified credentials autonomously which significantly reduces the communication overhead.

A.1.2 Dependent group

Authentication protocols in this group rely on a trusted party to generate credentials. It can be a single point of trust (centralized authority), or consist of multiple entities jointly working together (decentralized authorities) [ 75 ]. In this case, the dependent group of credential generation can be further classified into two subgroups: centralized and decentralized.

A.1.2.1 Centralized subgroup

Under this group of authentication protocols, a centralized trusted authority with full knowledge of system parameters is responsible for generating credentials. Communicating nodes send their credential requests and receive the corresponding credentials. The scheme presented by Raya and Hubaux [ 13 ] is an example where vehicles receive certified credentials from a centralized trust; a governmental transportation authority or a vehicle manufacturer. This makes management and handling of credentials easier in terms of installation, deployment, and monitoring within the network.

A.1.2.2 Decentralized subgroup

The underlying service for credential generation in this group of protocols has no central authority, and distributed trusted parties such as RSUs act as credential generators in the network. Park et al. [ 41 ] propose delegating responsibility of credential generation to the RSUs in order to reduce the communication and storage overhead on the centralized authority.

A.2 Issuance main group

This subclass categorizes authentication protocols based on the approach used to issue credentials, with respect to the authentication operation. Communicating parties can exchange their credentials for the purpose of identification. The credentials can be transferred either using certificates or without certificates. A digital certificate (also known as certificate) is an electronic document that is used to bind a credential to an entity. Credential issuance can be further classified into two groups: certificate-based, and certificate-less.

A.2.1 Certificate-based group

In this group of protocols, most common approach to convey credentials (e.g., public keys) is to use digital certificates. A certificate consists of information to identify an entity. Each entity’s credential is embedded in a certificate which is either explicitly (signed by a trusted authority or self-signed) or implicitly (without attaching signature) certified. Any party can use a copy of the certificate to extract the provided credential and use it to uniquely identify the holder [ 10 ]. To provide a more accurate discrimination, certificate-based credentials can be further classified into two subgroups: explicit and implicit.

A.2.1.1 Explicit subgroup

Protocols in this subgroup rely on explicit certificates to exchange credentials. An explicit certificate is a data structure used to store, distribute, or forward credentials (e.g., public keys) over unsecured networks without fear of undetectable manipulation. It is composed of two different parts: a data part and a signature part. The data part contains a credential and a unique string identifying the associated entity. The signature part of the certificate contains the signature of the certificate owner or a trusted authority. This binds the subject entity’s unique identity to the specified credential. An intended recipient can verify this signature and be assured that the credential belongs to the subject entity. During an authorized system user registration, the authentic public key of the trusted authority is made available to all communicating nodes. This public key enables communicating nodes to verify the certificates signed by that trusted authority, and as a result, transfers trust. The scheme presented by Jung et al. [ 42 ] is an example where RSUs issue multiple explicit certificates to vehicles for authentication purposes.

A.2.1.2 Implicit subgroup

Protocols in this subgroup rely on implicit certificates to exchange credentials. An implicit certificate is a variation of the digital certificates used with cryptography for which an explicit user’s credential can be implicitly certified. The main difference here is that a credential must be reconstructed from public data, rather than transported within a certificate, as occurs with explicit certificates. The implicit certificate is still comprised of the three main elements/parts (identifier, public credential, and digital signature), but superimposed into the same space as the size of a public credential, resulting in reduced data transfer. The ECQV implicit certificate is an example that falls into this subgroup. The IEEE 1609.2 security standard [ 90 ] recommends use of ECQV as a more efficient alternative to traditional certificates, as described in the document Standards for Efficient Cryptography 4 [ 76 ].

A.2.2 Certificate-less group

The second group of authentication protocols under this subclass is for schemes where credentials are not presented in certificates. Unlike the certificate-based group of protocols, these have no dependence on signed certificates. The application of identity-based cryptography and signature schemes [ 119 , 120 ] is common among protocols in this group. The study presented by Kamat et al. [ 43 ] is an example of schemes that fall into this group, where vehicles implicitly validate the identity-based signatures on the messages by verifying that the vehicle using the credential actually has the private key corresponding to it. This eliminates the need for certificate exchange between vehicles, resulting in reduced communication overhead.

A.3 Distribution main group

This main group categorizes authentication protocols based on the approach used to distribute credentials to the network communicating nodes. Regardless of which party generates the credentials (communicating node or trusted party), the distribution can be further classified into two groups: pre-deployment, and post-deployment.

A.3.1 Pre-deployment group

The first group of authentication protocols under this subclass assumes that credentials are distributed to the nodes during an offline phase, before deployment. The scheme presented by Papadimitratos et al. [ 44 ] is an example that assumes authentication using a large set of pre-loaded credentials, installed in the vehicle’s on-board credential pool by the transportation authority or the manufacturer, resulting in reduced V2I communication to receive new credentials and less reliance on availability of infrastructure in all regions.

A.3.2 Post-deployment group

The second group of authentication protocols under this subclass assumes that credentials are distributed to the network nodes during an online phase, after deployment. Different parties may be involved in this group of credential deployment. For example, network nodes may form a group in which a unique node is responsible for distributing the credentials to other nodes. The work presented by Sampigethaya et al. [ 45 ] is an example that enables a group manager to derive credentials by interacting with a trusted party and distribute them to new group members, resulting in reduced unnecessary overhead and redundancy in neighbors broadcast. The scheme presented by Calandriello et al. [ 25 ] is another example where vehicles issue certified credentials by themselves which significantly reduces the communication overhead.

A.4 Revocation main group

This main group categorizes authentication protocols based on the approach taken to revoke credentials, with respect to the authentication operation. Credential revocation is an essential feature of authentication protocols. It is needed because authentication information changes over time. Revocation may minimize threats associated with a compromised secret key related to a credential. It is important to stop using or trusting keying material which is no longer secure. A key is compromised if an adversary gains access to it. The revocation of credentials with long-term validity is a difficult task, as all distributed copies of the credentials must be effectively retracted. One solution for this is use of a Revocation List (RL). A RL is a list of credentials which have been revoked, provided by a trusted party. Credential revocation can be further classified into two groups: RL-based, and non-RL-based.

A.4.1 RL-based group

The first group of authentication protocols under this subclass assumes distribution of credential revocation information using RL. The RLs should be issued at regular intervals even if there are no changes, to prevent new RLs being maliciously replaced by old RLs. The scheme presented by Papadimitratos et al. [ 46 ] is an example where all vehicles can obtain the latest RL with very low bandwidth used for transmissions.

A.4.2 Non-RL-based group

An alternative approach is to issue credentials with very short lifetimes, and require frequent installation of new credentials by the credential provider. In the case of revocation, further credential certification requests are denied. The work presented by Fischer et al. [ 39 ] uses a blind signature scheme to eliminate the need for RLs, and as a result, reduces the overall memory and bandwidth consumption.

B Context-based subclass

This subclass categorizes the authentication protocols based on the contextual attribute of the supplicant. This unique attribute can be used as a credential to authenticate an entity with high confidence. Two groups are defined under this subclass: physical, and behavioral.

B.1 Physical-based group

Authentication protocols under this group try to authenticate a communicating node based on a physical characteristic that uniquely identifies it. Physical attributes, such as GPS location, Received Signal Strength Indication (RSSI), or Signal to Noise Ratio (SNR) may be needed. For example, Li and Chigan [ 47 ] assume verification based on physical distance between vehicles, to efficiently and securely verify the massive messages in VC systems.

B.2 Behavioral-based group

Authentication protocols under this group of contextual credentials attempt to authenticate a communicating node based on its behavioral pattern. A supplicant may be monitored by the authenticator based on its pattern of behavior with respect to certain functionality and performance. For example, Golle et al. [ 48 ] rely on the vehicle sensor capabilities to distinguish the nodes in the network; hence identifying malicious nodes.

6.3 Verification approach class

This class aims to recognize the nature and behavior of different authentication schemes based on the approach used to verify an authentication request. There are two subclasses: autonomous and cooperative.

A Autonomous subclass

The first subclass under the verification-approach class of authentication protocols uses an approach that enables authenticators to verify each authentication request independently, with respect to the authentication operation. This reduces dependency on other parties, but requires more computation power to verify received messages in short time frames independently. In V2V communication, Raya and Hubaux [ 14 ] assume that each vehicle needs to verify the periodically received safety messages within intervals of 100 milliseconds. Vijayakumar et al. [ 24 ] propose a batch verification method to reduce the message verification delay. However, in case of receiving an altered or modified message, an additional operation is required to find the invalid signature in the batch.

B Cooperative subclass

The second subclass of authentication protocols assumes that authenticators rely on information from other entities to make an authentication decision. This reduces the time required to authenticate a message, and as a result, increases authentication speed. The network nodes cooperatively work with each other and simultaneously authenticate transmitted messages to share their results with each other. Different parties may be involved in this group of credential deployment. For example, Zhang et al. [ 49 ] assume that vehicles work cooperatively to verify authentication requests according to their computing capacity, resulting in lower computation and communication overheads.

The schemes presented by Zhang et al. [ 20 ] and Shim [ 50 ] are another examples that assume infrastructures such as RSUs are delegated by vehicles to authenticate the received messages, and report the authentication results to the vehicles. This approach can simultaneously verify multiple authentication requests, and hence, considerably reducing the total verification time.

However, these schemes need RSUs to be pervasive, otherwise, the scheme is ineffective. Moreover, in heavy traffic conditions, the performance significantly degrades, as the RSUs need to perform authentication for a high number of messages in a short time period, and send the results back to the vehicles.

In addition, cooperative authentication protocols proposed in the studies presented by Hao et al. [ 21 ], Lin and Li [ 22 ], and Zhu et al. [ 23 ] are inefficient for broadcast authentication in the latency-critical applications. Each vehicle needs to cooperate in the message verification processes, and report its own verification results to neighboring vehicles. In heavy traffic conditions, the computational and communication delay associated with cooperative authentication could result in insufficient time for a driver to receive an alert and react, resulting in a crash. Moreover, this approach requires availability of a reasonable number of honest vehicles to cooperate in authentication. In the case of low vehicle density, these protocols may not be reliable for authentication purposes. These protocols can also be exploited by modification attacks on location information, as they select messages for verification based on location information (refer to Sect. 4.1 ).

6.4 Secure hardware class

This class recognizes the secure hardware requirements used to store and protect cryptographic keying material or other important cryptographic elements for providing authentication. There are two subclasses: TPD-based and Non-TPD-based.

A TPD-based subclass

This subclass of authentication protocols proposes the integration of TPDs within network nodes. Thus, cryptographic keying material can securely be stored or managed inside the nodes, and cannot easily be extracted or transferred. Trusted device-based authentication protocols have been proposed by Vijayakumar et al. [ 51 ] and Wang et al. [ 31 ], to reduce the overhead caused by authentication and revocation management.

B Non-TPD-based subclass

In contrast to the TPD-based, authentication protocols in this subclass do not rely on secure hardware for authentication purposes. The RSU-aided authentication protocols have been proposed to perform message authentication without using a trusted device [ 20 , 52 , 53 ]. This eliminates the costs for embedding TPDs in vehicles, and reduces the risks associated with unauthorized access to the TPDs.

6.5 Privacy principle class

Parno and Perrig [ 12 ], and Raya and Hubaux [ 13 ] identify topics associated with privacy and authentication. Through this context, many protocols have been proposed to address privacy-preserving message authentication in VC systems.

This class recognizes the principles used to mask identity to provide for driver privacy during authentication. There are three subclasses: anonymity, unlinkability, and non-privacy. Figure   13 shows the privacy principle class in expanded form.

A Anonymity subclass

This subclass contains authentication protocols used to provide anonymity for communicating nodes. Ideally, to mitigate the surveillance risk, it should be impossible for any observer to learn if a specific node has transmitted or will transmit a message. In VC systems, each node relies on messages received from other nodes. To preserve a driver’s privacy during authentication, a mechanism should be employed to keep messages anonymous to other nodes. This subclass can be further categorized into two groups: pseudonym-based and group signature-based.

A.1 Pseudonym-based group

Protocols under this group rely on pseudonymous tag-based credentials. A pseudonym or alias is an alternative identity that is verified by the node itself or a trusted party. This ensures that services can be used without disclosing the driver’s identity. Examples of schemes that fall into the pseudonym-based group are the studies presented by Fischer et al. [ 39 ], Calandriello et al. [ 25 ], and Jung et al. [ 42 ] that enable a vehicle to avoid being tracked by periodically creating new pseudonym certificates.

The schemes based on pseudonymous credentials achieve conditional anonymity by using pseudonym identifiers. In V2V communication, vehicles periodically sign messages using the currently active credential and broadcast them. Each broadcast message contains the resulting signature, as well as the corresponding pseudonym identifier. Once a vehicle receives the message, it can authenticate the message originator using the pseudonym identifier, without knowledge of the sender’s real world identifier. This demands the use of CRLs, to manage revoked identifiers and present a protected and secured communication in VANETs. However, for anonymous communication, a static identifier is not sufficient: a vehicle using a single identifier can be very easily tracked during broadcast authentication. Thus, vehicles continuously need to be equipped with new pseudonyms to maintain anonymity.

Raya and Hubaux [ 14 ] propose a Baseline Pseudonymous (BP) authentication scheme that requires a large number of short-lived pseudonym certificates that are pre-loaded in a vehicle OBU by CA. Each broadcast message needs to be signed using a certificate from the vehicle certificate pool. A vehicle should change its anonymous certificate and private key only after having used it for a certain number of messages.

This pseudonym changing strategy alone is not sufficient for confusing an observer to link the new pseudonym to the vehicle [ 15 ]. Furthermore, the pseudonym refill frequency depends on pseudonym validity periods and pseudonym change rate. In case of a revocation, most of the pseudonyms need to be revoked. A revocation checking against CRLs needs to be performed before verification, when a vehicle receives a message from an unknown entity. The delay produced by revocation checking increases when the size of CRLs grows exponentially with the number of revoked vehicles. The delay caused by CRL transmission becomes longer as the size of CRLs becomes larger, which allows misbehaving vehicles to continuously compromise the network during this period. Besides, the CRLs should be issued at regular intervals even if there are no changes, to prevent new CRLs being maliciously replaced by old CRLs. The large communication overhead caused by broadcasting CRLs to vehicles may have negative impact on the availability of the network. Thus, most of the existing pseudonym-based authentication schemes are not scalable. A collection of schemes based on pseudonymous certificate along with their analysis concerning communication overheads is presented by Kortesniemi and Särelä [ 16 ]. For the interested reader, additional information related to the pseudonym changing strategies is presented by Boualouache et al. [ 121 ].

A.2 Group signature-based group

This group of protocols under anonymity subclass assumes that the network nodes form a group, and utilize a group-oriented signature scheme (e.g., group signature [ 122 ] or ring signature [ 123 ]) to provide anonymous authentication, while eliminating the issuance of certificates. On behalf of a group, any member of the group can sign a message using its private key, and the signature can be verified with a group-wide public key. Group-oriented signature schemes provide non-traceability, unlinkability, and unforgeability. That is computationally infeasible for an adversary to learn whether two signatures on the message have been signed by the same group member, as only one public key is used for a group. The study presented by Studer et al. [ 54 ] is an example that uses a group signature scheme for anonymous authentication in vehicular communications.

However, in some schemes [ 18 , 19 ], the CRL size of group signature is linear with the number of revoked vehicles. This would cause long authentication delays. At least two cryptographic pairing operations [ 124 ] are involved with the revocation checking. Furthermore, VANETs are highly dynamic environments and vehicles periodically join and leave highways using enter and exit ways. The distance between vehicles continuously changes and they join different groups unpredictably [ 17 ]. That is, a group leader has to continuously generate a new group public key which makes this type of schemes ineffective. In addition, the cryptographic pairing calculations used in group signature schemes are not computationally efficient for the VANETs latency-critical applications.

B Unlinkability subclass

The credentials are stripped of any identifying information. It should be impossible to link any two or more messages sent from the same node. The unlinkability property of pseudonyms prevents any observer from learning that the messages originated from a specific node. If an observer tried to guess which node transmitted a particular message, there should be only a low probability of linking a node’s actions or identifying it among the set of all nodes. For example, Vijayakumar et al. [ 30 ] propose that a trusted authority generates a unique dummy identifier for each vehicle to use for authentication purposes. However, the scheme cannot satisfy the unlinkability requirement, as it allocates a single unique identifier for each vehicle.

Unlike the group signature-based protocols which provide unlinkability, protocols in this subclass utilize pseudonym-based credentials that need a strategy provide unlinkability. Based on the strategy providing unlinkable pseudonym, this subclass can be further categorized into two groups: group-based and pseudonym-change.

B.1 Group-based group

This group of protocols assumes that the network nodes form a group in which a unique node is responsible for distributing the credentials to other nodes. The scheme presented by Sampigethaya et al. [ 45 ] is an example that enables a group manager to derive credentials by interacting with a trusted party and distributing credentials to the new group members, resulting in increased driver privacy by mitigating the location tracking of vehicles.

B.2 Pseudonym-change group

Protocols under this group assume providing pseudonym unlinkability using a set or different sets of pseudonyms, where the credential holder can change pseudonyms over time or different contexts to break linkability. Examples of schemes that fall into the pseudonym-change group are the studies presented by Li et al. [ 55 ] and Lu et al. [ 56 ] that enable a vehicle to change pseudonyms with different strategies to break linkability between messages.

C Hybrid schemes

Multiple hybrid privacy-preserving authentication schemes have been proposed to secure VC systems. Hybrid schemes combine different authentication approaches, such as pseudonymous authentication protocols, digital signatures, Hashes, MACs, and other techniques to balance computational efficiency, CRL size, bandwidth consumption, and verification delay. This section briefly reviews the most relevant state-of-the-art research into hybrid authentication schemes for use in V2V communication.

A hybrid scheme is proposed by Calandriello et al. [ 25 ] that combines a pseudonym scheme with group signature. A vehicle can issue a self-signed certificate using its group private key, and then sign each message using a private key corresponding to the self-signed public-key certificate. This could reduce the average overhead of message authentication, but the expensive pairing calculations and group signature CRL checking still remains a problem.

Studer et al. [ 26 ] propose a new hybrid authentication mechanism, VANET Authentication using Signatures and TESLA++ (VAST), which is based on ECDSA and a modified version of the Timed Efficient Stream Loss-tolerant Authentication (TESLA) [ 27 ]. The TESLA protocol uses symmetric cryptography with delayed key disclosure to prove the sender was the source of a message. Since symmetric cryptography has a faster computational speed compared to asymmetric cryptography, TESLA is resilient to computational DoS attacks. However, TESLA is vulnerable to memory-based DoS attacks, as receivers store data until the corresponding key is disclosed. Receivers can be flooded by malicious parties with invalid messages without a corresponding key disclosure which filled receiver’s memory with junk data. Moreover, TESLA cannot provide non-repudiation, as no recipient vehicle can convince a third party that the sender indeed broadcast the message [ 26 ]. VAST is flexible, extensible, and efficient, but it does not provide privacy preservation and conditional traceability.

Lin et al. [ 28 ] suggest a pseudonymous authentication scheme named Timed Efficient and Secure Vehicular Communication (TSVC), which is based on TESLA [ 27 ]. In TSVC, each vehicle has to generate a hash chain and shares it with its neighboring vehicles. Then, it uses the elements of the hash chain as shared secret keys to generate MACs on the broadcast messages. The fast speed of MAC verification in TSVC can reduce the message loss ratio. However, TSVC is not robust in large traffic scenarios, because a vehicle should broadcast its key chain commitment much more frequently, which results increased packet loss ratio [ 20 ]. Moreover, each vehicle is pre-loaded with a list of anonymous public-key certificates at the initialization stage, which makes revocation of compromised vehicles in TSVC problematic. In addition, the TESLA is directly used in TSVC, which makes the scheme vulnerable to memory-based DoS attacks, and increased verification delay. Also, message authentication starts after a period of waiting time, when the second packet is released. This makes the TSVC inefficient to be used in the VANETs latency-critical applications which require timely authentication [ 29 ].

Rajput et al. [ 32 ] propose a hybrid approach which caters to the individual flaws of pseudonym-based and group-signature based approaches, but still fails to provide privacy.

A two-layered pseudonym generation method based on a keyed hash chain is introduced by Jo et al. [ 33 ] for efficient revocation and the distribution and renewal of RL. This protocol eliminates the authentication mode synchronization between non-cooperative and cooperative authentication. The proposed cooperative message authentication protocol requires each vehicle to share its verification result by reporting it. To verify a beacon message, each vehicle uses two processes: a beacon verification process and a report verification process. However, these are not applicable in broadcast authentication of low-latency safety applications of VANETs, as they are too time consuming.

D Non-privacy subclass

Protocols in this subclass do not employ any mechanism to provide anonymity for drivers/vehicles, and transmit a fixed node identifier in each data transmission, which raises the possibility of tracking vehicles through these identifiers. Rouf et al. [ 40 ] present security and privacy analysis of state-of-the-art commercial tire pressure monitoring systems. Authors showed that message eavesdropping was easily possible at a distance of approximately 40 meters from a passing vehicle, and that messages could be easily triggered remotely, resulting in raised privacy concerns as vehicles could be tracked through the communicating node’s identifier.

6.6 Network domain class

This class recognizes the vehicular network domain that authentication protocol functions in. There are two subclasses: vehicle-centric and roadside-centric. Figure  14 shows the network domain class in expanded form.

figure 13

Privacy principle class in expanded form

figure 14

Network domain class in expanded form

A Vehicle-centric subclass

The first subclass categorizes authentication protocols specifically in two groups of network domains: intra-vehicle, and inter-vehicle.

A.1 Intra-vehicle group

Protocols under this group assume authentication for the intra-vehicle network. By attaching a gateway to the intra-vehicle network, information exchange between external parties and internal vehicle nodes become possible. This communication allows for remote diagnostics and firmware updates. However, allowing external parties to access the intra-vehicle network creates a potential entry-point for cyber attacks. Han et al. [ 36 ] propose a three-step authentication protocol that secures the communication between the intra-vehicle network and an external network (mobile device).

A.2 Inter-vehicle group

This group categorizes protocols which are supposed to provide authentication in a data exchange platform that shares information and warning messages between vehicles communicating in a VC system. It is imperative that safety-critical information is not inserted or modified by a malicious user or and adversary. Petit et al. [ 64 ] survey a range of authentication protocols under this group.

B Roadside-centric subclass

Information is also available from roadside sources. Protocols in this subclass provide authentication between the communicating nodes and infrastructure in vehicular networks. In this regard, the subclass can be further categorized in the vehicle-RSU group of protocols.

B.1 Vehicle-RSU group

Schemes in this group deal with the authentication portion of vehicle-to-RSU communication separated from vehicle-to-vehicle communication. For example, V2I authentication presented by Lin et al. [ 18 ] is a separate protocol that falls into this group.

6.7 Application latency class

This class recognizes the nature and behavior of different authentication schemes based on the speed with which a protocol can be deployed. A wide range of applications can be deployed in vehicular networks. From a safety point of view, applications can be classified as either safety-critical, safety-related, or non-safety-related. Each classification has latency requirements for the data transmissions. Safety-critical information should have lower latency than non-safety-related. There are three subclasses: low-latency, mid-latency, and high-latency.

A Low-latency subclass

The first subclass recognizes authentication protocols suitable for low-latency applications, such as safety critical. These are used in the case of hazardous situations, such as collisions, or any situations where the danger is high or imminent [ 17 ]. In this case, V2V and V2I communications require high reliability and low latency in realizing the safety function. Authentication protocols in such applications must satisfy the aforementioned requirements. The scheme presented by Lin et al. [ 58 ] falls into this subclass of authentication protocols.

B Mid-latency subclass

The second subclass recognizes authentication protocols that can be deployed in mid latency applications, such as safety-related. These are used in the cases where the latency requirements are not as stringent as safety-critical applications, and the danger is low, but still foreseeable. The communication technology used in these applications can be V2V or V2I/I2V. Authentication protocols that do not fit in the first subclass may satisfy the requirements for this category.

C High-latency subclass

The third subclass recognizes authentication protocols that can be deployed in high-latency applications, such as non-safety applications. These are used in applications providing traffic information and enhance driving comfort, such as traffic updates, electronic toll collection, and infotainment. They mostly involve in V2I/I2V communications. These services access the channels in the communication system in a low priority mode compared to safety-critical/safety-related applications. Authentication protocols that do not fit in the last two subclasses, may satisfy the requirements of this category.

7 The proposed framework for authentication in VC systems

This section introduces a framework that summarizes relations among different classes of the taxonomy. This can be used to provide guidance in selecting or designing an authentication scheme to use for a particular purpose.

The design and implementation of an authentication protocol is not a simple and straightforward process. Figure  15 shows the proposed framework for authentication in VC systems. For a particular situation the answers to a series of questions (shown by dashed links) identifies an appropriate authentication scheme. The framework presents possible stages of an authentication protocol’s design. The framework uses this order, because each stage needs to be defined with respect to the previous stages requirements. Note that one can apply this framework to either intra-vehicle or inter-vehicle communications.

figure 15

Authentication framework based on our taxonomy

The first stage selects the network domain. In this stage, the authentication scheme is defined within a possible subclass of network domains to function in. This could be vehicle-centric or roadside-centric (refer to Sect.  6.6 ). Once a domain is selected, the next stage is to determine the application latency. In this stage, a protocol is defined within an appropriate class of application in terms of latency: low-latency, mid-latency, or high-latency (refer to Sect.  6.7 ). Following this stage is the selection of credential type, which defines a strategy for identification of communicating nodes. There are two subclasses: tag-based and context-based (refer to Sect.   6.2 ). Selecting the context-based subclass goes to the last stage. However, the tag-based subclass leads to three more stages before reaching the final stage. For the context-based subclass, the authentication scheme could be defined within physical or behavioral groups. For the tag-based subclass, strategies have to be defined for generation, issuance, distribution, and revocation of credentials. Following the tag-based stage, the privacy principle needs to be defined. Credentials contain identifiers of vehicles, and if these are captured, can possibly permit vehicle tracking and compromise the privacy of drivers. The privacy principle stage presents strategies to provide anonymity and unlinkability (refer to Sect.  6.5 ). The cryptographic method stage comes next. In this stage, an appropriate cryptographic method needs to be selected for the authentication scheme, with respect to the previous stages requirements. For example, a computationally heavy cryptographic technique may exceed the latency requirements selected in the second stage. The cryptographic method could be symmetric or asymmetric (refer to Sect.  6.1 ). The next stage is secure hardware. It indicates whether a secure device for storing cryptographic keying materials must be provided or not (refer to Sect.  6.4 ). In the last stage, the authentication scheme is provided an appropriate verification approach. This verification approach could be autonomous or cooperative (refer to Sect.  6.3 ). Once a verification approach is selected, the design phase concludes.

8 Case studies

A case study approach is employed to demonstrate the usefulness of the proposed taxonomy and framework. The research contribution is demonstrated using two different types of case study. The first type is based on analysis of seven well-known authentication protocols in public literature. The second type presents a hypothetical authentication protocol design.

8.1 Case study type 1: individual analysis

The proposed framework is applied for analysis of seven well-known authentication protocols. These are Calandriello et al. [ 25 ], Lin et al. [ 18 ], Zhang et al. [ 49 ], Shim [ 50 ], Horng et al. [ 59 ], Han et al. [ 36 ], and Wang et al. [ 31 ]. Please note that the aim is to systematize the study by grouping different authentication strategies using the proposed taxonomy, while providing related examples for each group. Thus, no attempt is made to survey all emerging authentication methods.

Calandriello et al. [ 25 ] combined multiple concepts to provide an authentication scheme for inter-vehicle domain (vehicle-centric). Vehicles transmit low-latency periodic messages (up to 10 messages per second) that enable safety applications. Authentication is provided using tag-based credentials. Vehicles generate their own credentials autonomously and issue their own explicit certificates during an online phase after deployment. This reduces the unnecessary communication overhead and redundancy in the neighbors broadcast message. The scheme relies on revocation lists requirements for distribution of credential revocation information. The scheme enables vehicles to avoid being tracked by periodically creating new pseudonym certificates, and as a result, vehicle/driver’s privacy is preserved. Also, it uses a pseudonym change strategy to provide unlinkability that prevents any observer from learning that the messages originated from a specific vehicle. The underlying cryptographic primitive of this scheme is based on asymmetric cryptography, resulting in a higher computational overhead. It uses group signatures to support the issuance of explicit public key certificates. In a group signature scheme, an individual private key is provided for each vehicle to self-sign public key pairs to be used as pseudonyms for message authentication. The resulting message signature can be verified with one common group public key that is publicly known in the group. The scheme requires a TPD device to securely store cryptographic keying materials. The verification approach used in this study is autonomous to reduce dependency on other parties, but it requires more computation power to independently verify received messages within intervals of 100 milliseconds.

To summarize, Calandriello et al. [ 25 ] can be identified as: vehicle-centric, applicable in low-latency applications, uses tag-based credentials (autonomous credential issuance, certificate-based, post-deployment credential distribution, and RL-based), provides anonymity (using pseudonym-based credentials) and unlinkability (using a pseudonym-change strategy), applies asymmetric cryptography signature-based, is TPD-based, and performs an autonomous verification approach.

The stages represented in the framework (refer to Fig.   15 ) are repeated to analyze the next six authentication protocols: Lin et al. [ 18 ], Zhang et al. [ 49 ], Shim [ 50 ], Horng et al. [ 59 ], Han et al. [ 36 ], and Wang et al. [ 31 ]. The output of this analysis is shown in Table   2 .

8.2 Case study type 2: hypothetical design

The protocol proposed for this hypothetical design is that of a low-latency safety application, considered for an inter-vehicle domain. The following stage is the selection of credential type. It defines a strategy for the identification of communicating nodes. There are three options. First, we can choose tag-based credentials and move to the next stage. Second, we can select context-based credentials, and move straight to the verification approach stage. Third, we can consider a hybrid strategy. Using hybrid strategy we only accept messages for verification which are relevant to a specific context (physical or behavioral). For example, we may just accept those messages for verification which are transmitted from within 50 meters of a vehicle. This is good in an extreme scenario with a high number of vehicles. Thus, after choosing a physical context-based credential, we need to properly design the next part which is the tag-based credential. Strategies have to be defined for generation, issuance, distribution, and revocation of credentials. These strategies have to be defined carefully with respect to the speed and time delay, as the protocol is considered for low-latency applications. Let’s generate credentials using a centralized approach of dependent group. Issuance is certificate-based and explicit, while distribution is pre-deployed in the vehicle’s on-board credential pool by the transportation authority or the manufacturer. This results in a reduced V2I communication to receive new credentials and less reliance on availability of infrastructure in all regions. We use a RL-based approach to revoke certificates, when needed. Following the tag-based stage, the privacy principle needs to be defined. To provide anonymity, vehicles are provided pseudonym explicit certificates, with a changes strategy for unlinkability. The cryptographic method stage comes next, in which the authentication scheme needs to select an appropriate cryptographic strategy. We consider digital signatures in our protocol (asymmetric class). The next stage is secure hardware. We need to defines a TPD for storing pre-deployed certificates for our protocol. In the last stage, the authentication scheme is provided an appropriate verification approach. We choose autonomous which reduces dependency on other parties, but requires more computation power.

To summarize, the hypothetical protocol can be identified as: vehicle-centric, applicable in low-latency applications, uses tag-based credential along with context-based credential (dependent credential issuance, certificate-based, pre-deployment credential distribution, and RL-based), provides anonymity (using pseudonym-based credentials) and unlinkability (using a pseudonym-change strategy), applies asymmetric cryptography signature-based, is TPD-based, and performs autonomous verification approach.

9 Discussion and recommendation

There exists a rich variety of authentication protocols proposed for securing VC systems. The taxonomy developed in this research allows their grouping into categories for comparison and analysis. There is a great need, in the field of vehicular communications, for an authentication framework. A framework is necessary to structure future research, and provide direction to researchers and academia in the design of secure and efficient authentication protocols. The framework presented here can help in designing such effective protocols. The proposed framework classifies characteristics of authentication strategies into seven criteria: cryptographic method, credential type, verification approach, secure hardware, privacy principle, network domain, and application latency. It offers guidance to adapt each criterion to the appropriate design goals and objectives.

The framework also reveals stages for which no appropriate techniques have been developed yet. For example, Table  2 shows that the Revocation stage for both Zhang et al. [ 49 ] and Shim [ 50 ] is as “-not provided”. That is, there is no Revocation technique provided in their schemes. Not providing an appropriate technique in a given category could stem from the fact that, inherently, the provided authentication mechanism is not attractive. Similarly, other shortcomings for authentication could be explored based on the proposed taxonomy and framework elements.

The framework also provides insights on unexplored avenues of research. It allows one to select and compare a set of possible techniques for a given application. For example, a researcher could identify viable techniques from the proposed framework in the context of Fig.  15 and Table  2 , and consider a protocol for a low-latency application where a vehicle has to be authenticated using both tag-based and context-based credential types within custom setups. Another example is the ECQV implicit certificate. There have been no research efforts that use ECQV implicit certificate in the design of authentication protocols for vehicular communications. This could be a potential avenue for future research.

Based on our extensive review of public literature, the communication overhead, security, and privacy aspects of authentication protocols in vehicular communications are widely addressed. However, the availability of a realistic testbed to evaluate the real computational overhead of authentication protocols on a large-scale network is a missing component. There is a great need for a model to evaluate impact of the delay on driver safety and discover any possible crash caused by the authentication delay in a large-scale VANET. There are many scenarios where a driver is relying completely on the safety messages to react on time, examples include: aggressive driver, distracted/inattentive driver, poor driver decision, impaired/drowsy driver, and rough/slick road. In such scenarios, the verification time must be less than driver reaction time, otherwise the system reliability is questionable.

10 Conclusion

Many authentication schemes have been proposed to secure VC systems; examples include [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 ]. Existing studies [ 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 ] have attempted to classify some of these schemes based on a limited set of characteristics. However, to date there is no generic framework to enable the comparison of these protocols and provide guidance for design and evaluation. Most existing classifications either use the computational complexity of the cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication, such as digital signatures.

This paper specifically addressed the development and evaluation of a taxonomy and framework, to provide comprehensive guidance on the design, evaluation, and analysis of authentication protocols in the public literature and future proposals. The authentication framework was explicitly presented with clearly defined parameters. The application of the proposed taxonomy and framework was demonstrated through two different types of case study, for analysis and design, respectively. Seven different authentication protocols from the existing public literature were analyzed using the framework. This allows comparison between them. Similarly, the framework can be applied in design, making choices appropriate for the intended context.

We believe this taxonomy will be useful for researchers and designers to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. It is our hope that the taxonomy is broadly adopted.

Availability of data and materials

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

A. Paul, N. Chilamkurti, A. Daniel, S. Rho, Intelligent Vehicular Networks and Communications: Fundamentals, Architectures and Solutions, 1st edn. (Elsevier Science Publishers B. V, NLD, 2016)

B. Hassanabadi, S. Valaee, Reliable periodic safety message broadcasting in VANETs using network coding. IEEE Trans. Wirel. Commun. 13 (3), 1284–1297 (2014). https://doi.org/10.1109/TWC.2014.010214.122008

Article   Google Scholar  

U.S.DOT: United States Department of Transportation: Intelligent Transportation Systems Safety Solutions: Preventing Crashes and Saving Lives, 1200 New Jersey Avenue, SE \(\bullet\) Washington, DC 20590 \(\bullet\) 800.853.1351 (2017). https://www.its.dot.gov/factsheets/jpo_safety_solutions.htm Accessed 2018-01-22

M. Annoni, B. Williams, in: Campolo, C., Molinaro, A., Scopigno, R. (eds.) The History of Vehicular Networks, pp. 3–21. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15497-8_1

ETSC.Europa: European Transport Safety Council (ETSC): Briefing: Cooperative Intelligent Transport Systems (C-ITS). http://etsc.eu/wp-content/uploads/ETSC-Briefing-on-Cooperative-Intelligent-Transport-Systems-C-ITS.pdf , 20 Avenue des Celtes, Brussels B-1040, Belgium (2018). http://etsc.eu/briefing-cooperative-intelligent-transport-systems-c-its/ Accessed 2018-01-22

K.Z. Ghafoor, J. Lloret, K.A. Bakar, A.S. Sadiq, S.A.B. Mussa, Beaconing approaches in vehicular ad hoc networks: a survey. Wirel. Pers. Commun. 73 (3), 885–912 (2013). https://doi.org/10.1007/s11277-013-1222-9

CAMP: Vehicle Safety Communications Project: Task 3 Final Report - Identify Intelligent Vehicle Safety Applications Enabled by DSRC. Technical Report DOT HS 809 859, National Highway Traffic Safety Administration - U. S. Department of Transportation (USDOT) (March 2005). https://one.nhtsa.gov/DOT/NHTSA/NRD/Multimedia/PDFs/CrashAvoidance/2005/CAMP3scr.pdf

M. Bellare, P. Rogaway, Message authentication. M. Bellare, Introduction to Modern Cryptography, 155–175 (2005). cited By 1

D. Gollmann, What do we mean by entity authentication? In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 46–54 (1996). https://doi.org/10.1109/SECPRI.1996.502668

A.J. Menezes, S.A. Vanstone, P.C.V. Oorschot, Handbook of Applied Cryptography , 1st edn. (CRC Press Inc, Boca Raton, 1996).

MATH   Google Scholar  

L. Gollan, C. Meinel, Digital signatures for automobiles?! in: Systemics, Cybernetics and Informatics (SCI) (2002). Citeseer

B. Parno, A. Perrig, Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005). Maryland, USA

M. Raya, J.-P. Hubaux, Securing vehicular ad hoc networks. J. Comput. Secur. 15 (1), 39–68 (2007)

M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. SASN ’05, pp. 11–21. ACM, New York, NY, USA (2005). https://doi.org/10.1145/1102219.1102223

L. Buttyán, T. Holczer, I. Vajda, On the effectiveness of changing pseudonyms to provide location privacy in VANETs, in Security and Privacy in Ad-hoc and Sensor Networks . ed. by F. Stajano, C. Meadows, S. Capkun, T. Moore (Springer, Berlin, 2007), pp. 129–141

Chapter   Google Scholar  

Y. Kortesniemi, M. Särelä, Survey of certificate usage in distributed access control. Comput. Secur. 44 , 16–32 (2014). https://doi.org/10.1016/j.cose.2014.03.013

M.A.R. Baee, L. Simpson, E. Foo, J. Pieprzyk, Broadcast authentication in latency-critical applications: on the efficiency of IEEE. IEEE Trans. Veh. Technol. 68 (12), 11577–11587 (2019). https://doi.org/10.1109/TVT.2019.2945339

X. Lin, X. Sun, P. Ho, X. Shen, GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56 (6), 3442–3456 (2007). https://doi.org/10.1109/TVT.2007.906878

L. Zhang, Q. Wu, A. Solanas, J. Domingo-Ferrer, A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59 (4), 1606–1617 (2010). https://doi.org/10.1109/TVT.2009.2038222

C. Zhang, X. Lin, R. Lu, P.-Ho, RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In: 2008 IEEE International Conference on Communications, pp. 1451–1457 (2008). https://doi.org/10.1109/ICC.2008.281

Y. Hao, Y. Cheng, C. Zhou, W. Song, A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29 (3), 616–629 (2011). https://doi.org/10.1109/JSAC.2011.110311

X. Lin, X. Li, Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62 (7), 3339–3348 (2013). https://doi.org/10.1109/TVT.2013.2257188

X. Zhu, S. Jiang, L. Wang, H. Li, Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 63 (2), 907–919 (2014). https://doi.org/10.1109/TVT.2013.2294032

P. Vijayakumar, S. Bose, A. Kannan, Improved harn batch digital signature algorithm for multicast authentication. J. Discrete Math. Sci. Cryptogr. 17 (5–6), 435–442 (2014). https://doi.org/10.1080/09720529.2013.858481

Article   MathSciNet   Google Scholar  

G. Calandriello, P. Papadimitratos, J.-P. Hubaux, A. Lioy, Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks. VANET ’07, pp. 19–28. ACM, New York, NY, USA (2007). https://doi.org/10.1145/1287748.1287752

A. Studer, F. Bai, B. Bellur, A. Perrig, Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11 (6), 574–588 (2009). https://doi.org/10.1109/JCN.2009.6388411

A. Perrig, R. Canetti, J.D. Tygar, D. Song, The TESLA broadcast authentication protocol. RSA Cryptobytes 5 (2), 2–13 (2002)

Google Scholar  

X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, X. Shen, TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7 (12), 4987–4998 (2008)

J. Zhou, Z. Cao, Z. Qin, X. Dong, K. Ren, LPPA: lightweight privacy-preserving authentication from efficient multi-key secure outsourced computation for location-based services in VANETs. IEEE Trans. Inf. Forensics Secur. 15 , 420–434 (2019)

P. Vijayakumar, M. Azees, A. Kannan, L.J. Deborah, Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17 (4), 1015–1028 (2016). https://doi.org/10.1109/TITS.2015.2492981

F. Wang, Y. Xu, H. Zhang, Y. Zhang, L. Zhu, 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65 (2), 896–911 (2016). https://doi.org/10.1109/TVT.2015.2402166

U. Rajput, F. Abbas, H. Eun, H. Oh, A hybrid approach for efficient privacy-preserving authentication in VANET. IEEE Access 5 , 12014–12030 (2017). https://doi.org/10.1109/ACCESS.2017.2717999

H.J. Jo, I.S. Kim, D.H. Lee, Reliable cooperative authentication for vehicular networks. IEEE Trans. Intell. Transp. Syst. 19 (4), 1065–1079 (2018). https://doi.org/10.1109/TITS.2017.2712772

J. Huang, Y. Qian, R.Q. Hu, Secure and efficient privacy-preserving authentication scheme for 5G software defined vehicular networks. IEEE Trans. Veh. Technol. (2020)

J. Camenisch, M. Drijvers, A. Lehmann, G. Neven, P. Towa, Zone encryption with anonymous authentication for V2V communication. In: 2020 IEEE European Symposium on Security and Privacy (EuroS P), pp. 405–424 (2020). https://doi.org/10.1109/EuroSP48549.2020.00033

K. Han, S.D. Potluri, K.G. Shin, On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks. In: Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems. ICCPS ’13, pp. 160–169. ACM, New York, NY, USA (2013). https://doi.org/10.1145/2502524.2502546 . http://doi.acm.org.ezp01.library.qut.edu.au/10.1145/2502524.2502546

Choi, J.Y., Jakobsson, M., Wetzel, S.: Balancing auditability and privacy in vehicular networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service&Amp; Security in Wireless and Mobile Networks. Q2SWinet ’05, pp. 79–87. ACM, New York, NY, USA (2005). https://doi.org/10.1145/1089761.1089775

H. Xiong, K. Beznosov, Z. Qin, M. Ripeanu, Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In: 2010 IEEE International Conference on Communications, pp. 1–6 (2010). https://doi.org/10.1109/ICC.2010.5502673

L. Fischer, A. Aijaz, C. Eckert, D. Vogt, Secure revocable anonymous authenticated inter-vehicle communication (SRAAC). In: 4th Conference on Embedded Security in Cars (ESCAR 2006), Berlin, Germany, pp. 1–9 (2006). Citeseer

I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, I. Seskar, Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: Proceedings of the 19th USENIX Conference on Security. USENIX Security’10, pp. 21–21. USENIX Association, Berkeley, CA, USA (2010). http://dl.acm.org/citation.cfm?id=1929820.1929848

M. Park, G. Gwon, S. Seo, H. Jeong, RSU-based distributed key management (RDKM) for secure vehicular multicast communications. IEEE J. Sel. Areas Commun. 29 (3), 644–658 (2011). https://doi.org/10.1109/JSAC.2011.110313

C.D. Jung, C. Sur, Y. Park, K.-H. Rhee, A robust conditional privacy-preserving authentication protocol in VANET, in Security and Privacy in Mobile Information and Communication Systems . ed. by A.U. Schmidt, S. Lian (Springer, Berlin, 2009), pp. 35–45

P. Kamat, A. Baliga, W. Trappe, An identity-based security framework for VANETs. in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. VANET ’06, pp. 94–95. ACM, New York, NY, USA (2006). https://doi.org/10.1145/1161064.1161083

P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, J. Hubaux, Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46 (11), 100–109 (2008). https://doi.org/10.1109/MCOM.2008.4689252

K. Sampigethaya, M. Li, L. Huang, R. Poovendran, AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25 (8), 1569–1589 (2007). https://doi.org/10.1109/JSAC.2007.071007

P.P. Papadimitratos, G. Mezzour, J.-P. Hubaux, Certificate revocation list distribution in vehicular communication systems. In: Proceedings of the Fifth ACM International Workshop on Vehicular Inter-networking. VANET ’08, pp. 86–87. ACM, New York, NY, USA (2008). https://doi.org/10.1145/1410043.1410062

Z. Li, C. Chigan, On resource-aware message verification in VANETs. In: 2010 IEEE International Conference on Communications (ICC), pp. 1–6 (2010). https://doi.org/10.1109/ICC.2010.5502129

P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks. VANET ’04, pp. 29–37. ACM, New York, NY, USA (2004). https://doi.org/10.1145/1023875.1023881 . http://doi.acm.org.ezp01.library.qut.edu.au/10.1145/1023875.1023881

C. Zhang, X. Lin, R. Lu, P. Ho, X. Shen, An efficient message authentication scheme for vehicular communications. IEEE Trans. Veh. Technol. 57 (6), 3357–3368 (2008). https://doi.org/10.1109/TVT.2008.928581

K. Shim, CPAS : an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61 (4), 1874–1883 (2012). https://doi.org/10.1109/TVT.2012.2186992

P. Vijayakumar, M. Azees, L.J. Deborah, CPAV: computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks. in: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 62–67 (2015). https://doi.org/10.1109/CSCloud.2015.32

Y. Jiang, M. Shi, X. Shen, C. Lin, BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun. 8 (4), 1974–1983 (2009). https://doi.org/10.1109/T-WC.2008.080280

J. Shao, X. Lin, R. Lu, C. Zuo, A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65 (3), 1711–1720 (2016). https://doi.org/10.1109/TVT.2015.2405853

A. Studer, E. Shi, F. Bai, A. Perrig, TACKing together efficient authentication, revocation, and privacy in VANETs. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9 (2009). https://doi.org/10.1109/SAHCN.2009.5168976

M. Li, K. Sampigethaya, L. Huang, R. Poovendran, Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society. WPES ’06, pp. 19–28. ACM, New York, NY, USA (2006). https://doi.org/10.1145/1179601.1179605

R. Lu, X. Lin, T.H. Luan, X. Liang, X. Shen, Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61 (1), 86–96 (2012). https://doi.org/10.1109/TVT.2011.2162864

P.K. Singh, S.N.S.T. Gowtham, S. Nandi, CPESP: cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs. Veh. Commun. 20 , 100183 (2019). https://doi.org/10.1016/j.vehcom.2019.100183

X. Lin, X. Sun, X. Wang, C. Zhang, P. Ho, X. Shen, TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7 (12), 4987–4998 (2008). https://doi.org/10.1109/T-WC.2008.070773

S. Horng, S. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, M.K. Khan, b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8 (11), 1860–1875 (2013). https://doi.org/10.1109/TIFS.2013.2277471

B. Palaniswamy, S. Camtepe, E. Foo, L. Simpson, M.A. Rezazadeh Baee, J. Pieprzyk, Continuous authentication for VANET. Veh. Commun. 25 , 100255 (2020). https://doi.org/10.1016/j.vehcom.2020.100255

S. Goudarzi, A.H. Abdullah, S. Mandala, S.A. Soleymani, M.A.R. Baee, M.H. Anisi, M.S. Aliyu, A systematic review of security in vehicular ad hoc network. In: Proceedings of 2nd Symposium WSCN, pp. 1–10 (2013)

M. Riley, K. Akkaya, K. Fong, A survey of authentication schemes for vehicular ad hoc networks. Secur. Commun. Netw. 4 , 1137–1152 (2011). https://doi.org/10.1002/sec.239

F. Qu, Z. Wu, F. Wang, W. Cho, A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16 (6), 2985–2996 (2015). https://doi.org/10.1109/TITS.2015.2439292

J. Petit, F. Schaub, M. Feiri, F. Kargl, Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17 (1), 228–255 (2015). https://doi.org/10.1109/COMST.2014.2345420

S.S. Manvi, S. Tangade, A survey on authentication schemes in VANETs for secured communication. Veh. Commun. Supplement C (1), 19–30 (2017). https://doi.org/10.1016/j.vehcom.2017.02.001

H. Hasrouny, A.E. Samhat, C. Bassil, A. Laouiti, VANET security challenges and solutions: a survey. Veh. Commun. 7 , 7–20 (2017). https://doi.org/10.1016/j.vehcom.2017.01.002

Z. Lu, G. Qu, Z. Liu, A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. (2018). https://doi.org/10.1109/TITS.2018.2818888

P.K. Singh, S.K. Nandi, S. Nandi, A tutorial survey on vehicular communication state of the art, and future research directions. Veh. Commun. 18 , 100164 (2019). https://doi.org/10.1016/j.vehcom.2019.100164

D. Manivannan, S.S. Moni, S. Zeadally, Secure authentication and privacy-preserving techniques in vehicular ad-hoc networks (VANETs). Veh. Commun. 25 , 100247 (2020). https://doi.org/10.1016/j.vehcom.2020.100247

D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1 (1), 36–63 (2001)

N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48 , 203–209 (1987)

V.S. Miller, Use of elliptic curves in cryptography, in Advances in Cryptology – CRYPTO ’85 Proceedings . ed. by H.C. Williams (Springer, Berlin, 1986), pp. 417–426

A.K. Lenstra, E.R. Verheul, Selecting cryptographic key sizes. J. Cryptol. 14 (4), 255–293 (2001). https://doi.org/10.1007/s00145-001-0009-4

Article   MathSciNet   MATH   Google Scholar  

S.S. Kumar, Elliptic curve cryptography for constrained devices. Ph.D. dissertation, Ruhr University Bochum (2006)

S.A. Soleymani, A.H. Abdullah, W.H. Hassan, M.H. Anisi, S. Goudarzi, M.A. Rezazadeh Baee, S. Mandala, Trust management in vehicular ad hoc network: a systematic review. EURASIP J. Wirel. Commun. Netw. 2015 (1), 146 (2015). https://doi.org/10.1186/s13638-015-0353-y

M. Campagna, Sec 4: elliptic curve qu-vanstone implicit certificate scheme (ECQV). Standards for Efficient Cryptography, Version 1 (2013)

S.W. Cadzow, Security and Privacy for ITS and C-ITS, pp. 283–306. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15497-8_10

P. Papadimitratos, A.D. La Fortelle, K. Evenssen, R. Brignolo, S. Cosenza, Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 47 (11), 84–95 (2009). https://doi.org/10.1109/MCOM.2009.5307471

S.A. Soleymani, A.H. Abdullah, S. Mandala, M.A.R. Baee, S. Goudarzi, A hierarchical routing protocol for improving the quality of service in wireless sensor network. Life Sci. J. 10 (3) (2013)

L. Xue, Y. Yang, D. Dong, Roadside infrastructure planning scheme for the urban vehicular networks. Transportation Research Procedia 25, 1380–1396 (2017). https://doi.org/10.1016/j.trpro.2017.05.163 . World Conference on Transport Research - WCTR 2016 Shanghai. 10–15 July 2016

R.A. Uzcategui, A.J.D. Sucre, G. Acosta-Marum, Wave: a tutorial. IEEE Commun. Mag. 47 (5), 126–133 (2009). https://doi.org/10.1109/MCOM.2009.4939288

EC.Europa: The European Commission’s Directorate-General for Mobility and Transport: C-ITS Platform Final Report, January 2016. https://ec.europa.eu/transport/sites/transport/files/themes/its/doc/c-its-platform-final-report-january-2016.pdf , European Commission DG Mobility and Transport B – 1049 Brussels (2016). https://ec.europa.eu/transport/themes/its_en Accessed 2018-01-22

ETSI.Europa: European Telecommunications Standards Institute: Intelligent transport systems standards. http://www.etsi.org/standards , ETSI 650, Route des Lucioles Sophia Antipolis 06560 Valbonne FRANCE (2018). http://www.etsi.org/standards Accessed 2018-01-22

ITS.Japan: Japanese Ministry of Land, Infrastructure, Transport and Tourism, Road Bureau, ITS: Intelligent Transport Systems. http://www.mlit.go.jp/road/ITS/ , Ministry of Land, Infrastructure, Transport and Tourism, Japan (2018). http://www.mlit.go.jp/road/ITS/ Accessed 2018-01-22

IEEE: IEEE standard for information technology– local and metropolitan area networks– specific requirements– part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications amendment 6: Wireless access in vehicular environments. IEEE Std 802.11p-2010 (Amendment to IEEE Std 802.11-2007), 1–51 (2010). https://doi.org/10.1109/IEEESTD.2010.5514475

G.R. Hiertz, D. Denteneer, L. Stibor, Y. Zang, X.P. Costa, B. Walke, The IEEE 802.11 universe. IEEE Commun. Mag. 48 (1), 62–70 (2010). https://doi.org/10.1109/MCOM.2010.5394032

ITS.Europa: Intelligent Transport Systems (ITS); European profile standard for the physical and medium access control layer of Intelligent Transport Systems operating in the 5 GHz frequency band. Standard ETSI - ES 202 663, European Telecommunications Standards Institute (November 2009). https://standards.globalspec.com/std/1210175/etsi-es-202-663

ITS.Europa: Intelligent Transport Systems (ITS); European profile standard for the physical and medium access control layer of Intelligent Transport Systems operating in the 5 GHz frequency band. Standard ETSI - ES 202 663, European Telecommunications Standards Institute (January 2010). https://standards.globalspec.com/std/1215738/etsi-es-202-663

ARIB.Japan: 700 MHz Band Intelligent Transport Systems. Standard ARIB STD-T109, Association of Radio Industries and Businesses (July 2017). https://www.arib.or.jp/english/html/overview/doc/5-STD-T109v1_3-E1.pdf

IEEE: IEEE standard for wireless access in vehicular environments–security services for applications and management messages - amendment 1. IEEE Std 1609.2a-2017 (Amendment to IEEE Std 1609.2-2016), 1–123 (2017). https://doi.org/10.1109/IEEESTD.2017.8065169

M. Bellare, C. Namprempre, Authenticated encryption: relations among notions and analysis of the generic composition paradigm, in Advances in Cryptology – ASIACRYPT 2000 . ed. by T. Okamoto (Springer, Berlin, 2000), pp. 531–545

FIPS: Federal Information Processing Standard (FIPS) 186-4. National Institute of Science and Technology (2013)

Q. Dang, Changes in Federal Information Processing Standard (FIPS) 180–4, secure hash standard. Cryptologia 37 (1), 69–73 (2013). https://doi.org/10.1080/01611194.2012.687431

S. Turner, D. Brown, K. Yiu, R Housley, T. Polk, Elliptic Curve Cryptography Subject Public Key Information. RFC 5480, RFC Editor (March 2009). https://www.ietf.org/rfc/rfc5480.txt

M. Lochter, J. Merkle, Elliptic Curve Cryptography ECC Brainpool standard curves and curve generation. RFC 5639, RFC Editor (March 2010). https://tools.ietf.org/html/rfc5639

N.E. Lownes, R.B. Machemehl, VISSIM: a multi-parameter sensitivity analysis. In: Proceedings of the 2006 Winter Simulation Conference, pp. 1406–1413 (2006). IEEE

J.L. Font, P. Iñigo, M. Domínguez, J.L. Sevillano, C. Amaya, Architecture, design and source code comparison of ns-2 and ns-3 network simulators. In: Proceedings of the 2010 Spring Simulation Multiconference, pp. 1–8 (2010)

C. Sommer, Z. Yao, R. German, F. Dressler, Simulating the influence of IVC on road traffic using bidirectionally coupled simulators. IEEE INFOCOM Workshops 2008 , 1–6 (2008). https://doi.org/10.1109/INFOCOM.2008.4544655

D. Eckhoff, C. Sommer, F. Dressler, On the Necessity of Accurate IEEE 802.11p Models for IVC Protocol Simulation. In: 75th IEEE Vehicular Technology Conference (VTC2012-Spring), pp. 1–5. IEEE, Yokohama, Japan (2012). https://doi.org/10.1109/VETECS.2012.6240064

A. Varga, The OMNeT++ discrete event simulation system. In: In ESM’01 (2001)

D. Krajzewicz, J. Erdmann, M. Behrisch, L. Bieker, Recent development and applications of SUMO—simulation of urban mobility. Int. J. Adv. Syst. Meas. 5 (3 & 4), 128–138 (2012)

C. Sommer, J. Härri, F. Hrizi, B. Schünemann, F. Dressler, Simulation tools and techniques for vehicular communications and applications. In: Vehicular Ad Hoc Networks, pp. 365–392. Springer (2015)

X. Lin, R. Lu, C. Zhang, H. Zhu, P. Ho, X. Shen, Security in vehicular ad hoc networks. IEEE Commun. Mag. 46 (4), 88–95 (2008). https://doi.org/10.1109/MCOM.2008.4481346

X. Lin, R. Lu, Distributed Cooperative Message Authentication, pp. 137–151. Wiley-IEEE Press (2015). https://doi.org/10.1002/9781119082163.ch7

M. Azees, P. Vijayakumar, L.J. Deborah, Comprehensive survey on security services in vehicular ad-hoc networks. IET Intell. Transp. Syst. 10 (6), 379–388 (2016). https://doi.org/10.1049/iet-its.2015.0072

V.S. Yadav, S. Misra, M. Afaque, Security of wireless and self-organizing networks: security in vehicular ad hoc networks. Security of Wireless and Self-Organizing Networks: Security in Vehicular Ad Hoc Networks, 227–250 (2010). cited By 1

O.K. Fraenkel, Alan F.W, Privacy and freedom. pp. xvi. new york: Atheneum, 1967. \$10.00. The ANNALS of the American Academy of Political and Social Science 377(1), 196–197 (1968). https://doi.org/10.1177/000271626837700157

F. Schoeman, Privacy: philosophical dimensions. Am. Philos. Q. 21 (3), 199–213 (1984)

R. Akalu, Privacy, consent and vehicular ad hoc networks (VANETs). Comput. Law Secur. Rev. 34 (1), 37–46 (2018). https://doi.org/10.1016/j.clsr.2017.06.006

J.P. Hubaux, S. Capkun, J. Luo, The security and privacy of smart vehicles. IEEE Secur. Privacy 2 (3), 49–55 (2004). https://doi.org/10.1109/MSP.2004.26

F. Dötzer, Privacy issues in vehicular ad hoc networks. In: Proceedings of the 5th International Conference on Privacy Enhancing Technologies. PET’05, pp. 197–209. Springer, Berlin, Heidelberg (2006). https://doi.org/10.1007/11767831_13

P. Papadimitratos, A. Kung, J.-P. Hubaux, F. Kargl, Privacy and identity management for vehicular communication systems: a position paper. In: Workshop on Standards for Privacy in User-centric Identity Management (2006)

L. Reyzin, et al.: RE: Comments on NHTSA notice of proposed rule for FMVSS No. 150. V2V Communications (Docket No. NHTSA-2016-0126) (2017)

P.M. Schwartz, D.J. Solove, The PII problem: privacy and a new concept of personally identifiable information. NYUL Rev. 86 , 1814–1894 (2011)

J. Domingo-Ferrer, Q. Wu, in: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Safety and Privacy in Vehicular Communications, pp. 173–189. Springer, Berlin (2009). https://doi.org/10.1007/978-3-642-03511-1_8

O. Ureten, N. Serinken, Wireless security through RF fingerprinting. Can. J. Electr. Comput. Eng. 32 (1), 27–33 (2007). https://doi.org/10.1109/CJECE.2007.364330

P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, J.P. Hubaux, Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46 (11), 100–109 (2008). https://doi.org/10.1109/MCOM.2008.4689252

A. Weimerskirch, J.J. Haas, Y.-C. Hu, Laberteaux, K.P.: Data Security in Vehicular Communication Networks, pp. 299–363. John Wiley and Sons, Ltd (2009). https://doi.org/10.1002/9780470740637.ch9

A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology . ed. by G.R. Blakley, D. Chaum (Springer, Berlin, 1985), pp. 47–53

M.A.R. Baee, Implementation and performance analysis of identity-based authentication in wireless sensor networks. Master’s thesis, Universiti Teknologi Malaysia (2014)

A. Boualouache, S.-M. Senouci, S. Moussaoui, A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun. Surv. Tutor. 20 (1), 770–790 (2017)

D. Boneh, X. Boyen, H. Shacham, Short group signatures, in Advances in Cryptology - CRYPTO 2004 . ed. by M. Franklin (Springer, Berlin, 2004), pp. 41–55

R.L. Rivest, A. Shamir, Y. Tauman, How to leak a secret, in Advances in Cryptology – ASIACRYPT 2001 . ed. by C. Boyd (Springer, Berlin, 2001), pp. 552–565

V.S. Miller, The Weil Pairing, and Its Efficient Calculation (Springer, Berlin, 2004).

Book   Google Scholar  

Download references

The work of J. Pieprzyk was supported by the Australian Research Council under Grant DP180102199 and the Polish National Science Centre (Narodowe Centrum Nauki) under Grant 2018/31/B/ST6/03003. The work of M. A. R. Baee was supported by the Queensland University of Technology Postgraduate Research Award scholarship....

Author information

Authors and affiliations.

School of Computer Science, Queensland University of Technology, 2 George Street, Brisbane, QLD, 4000, Australia

Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo & Josef Pieprzyk

School of Information and Communication Technology, Griffith University, 170 Kessels Road, Nathan, QLD, 4111, Australia

Commonwealth Scientific and Industrial Research Organization, Data61, Corner Vimiera & Pembroke Road, Marsfield, NSW, 2122, Australia

Josef Pieprzyk

Institute of Computer Science, Polish Academy of Sciences, 5 Jana Kazimierza Street, 01-248, Warsaw, Poland

You can also search for this author in PubMed   Google Scholar

Contributions

M. A. R. Baee is the main author of the current paper. He contributed to the development of the ideas, design of the study, theory, analysis, and article writing. L. Simpson conceptualized the idea and contributed to the writing. X. Boyen supervised the study, and participated in its design. E. Foo supervised the study, and participated in its design. J. Pieprzyk supervised the study, and participated in its design and coordination. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Mir Ali Rezazadeh Baee .

Ethics declarations

Competing interests.

The authors declare that they have no competing interests.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Rezazadeh Baee, M.A., Simpson, L., Boyen, X. et al. Authentication strategies in vehicular communications: a taxonomy and framework. J Wireless Com Network 2021 , 129 (2021). https://doi.org/10.1186/s13638-021-01968-6

Download citation

Received : 01 September 2020

Accepted : 25 March 2021

Published : 21 May 2021

DOI : https://doi.org/10.1186/s13638-021-01968-6

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cryptography
  • Authentication
  • Vehicular communication systems

case study about implementation of authentication protocols in the network

Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: A Case Study

  • Conference paper
  • First Online: 25 August 2021
  • Cite this conference paper

case study about implementation of authentication protocols in the network

  • Mario Barbareschi   ORCID: orcid.org/0000-0002-1417-6328 9 ,
  • Salvatore Barone   ORCID: orcid.org/0000-0003-2007-3744 9 ,
  • Alfonso Fezza 9 &
  • Erasmo La Montagna   ORCID: orcid.org/0000-0003-3548-5856 9  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1439))

Included in the following conference series:

  • International Conference on the Quality of Information and Communications Technology

1280 Accesses

1 Citations

The technological progress we witnessed in recent years has led to a pervasive usage of smart and embedded devices in many application domains. The monitoring of Power Delivery Networks (PDNs) is an example: the use of interconnected sensors makes it possible to detect faults and to dynamically adapt the network topology to isolate and compensate for them. In this paper we discuss how Fault-Detection, Isolation and Service Recovery (FDISR) for PDNs can be modeled according to the fog-computing paradigm, which distributes part of the computation among edge nodes and the cloud. In particular, we consider an FDISR application on Medium-Voltage PDNs (MV-PDNs) based on a Wireless Sensor Network (WSN) whose nodes make use of the Long Range (LoRa) technology to communicate with each other. Security concerns and the attack model of such application are discussed, then the use of a communication protocol based on the Physically Unclonable Functions (PUFs) mechanism is proposed to achieve both mutual authentication and confidentiality. Finally, an implementation of the proposal is presented and evaluated w.r.t. security concerns and communication overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

case study about implementation of authentication protocols in the network

Erasure Codes for Reliable Communication in Internet of Things (IoT) Embedded with Wireless Sensors

Increasing lifetime and fault tolerance capability in wireless sensor networks by providing a novel management framework.

case study about implementation of authentication protocols in the network

Method of Detecting Denial of Service Attacks in WSNs While Optimizing Network Life Span

Barbareschi, M., Bagnasco, P., Amelino, D., Mazzeo, A.: Designing an SRAM PUF-based secret extractor for resource-constrained devices. Int. J. Embedded Syst. 9 , 353–364 (2017)

Article   Google Scholar  

Angrisani, L., Bonavolontà, F., Liccardo, A., Schiano Lo Moriello, R.: On the use of LoRa technology for logic selectivity in MV distribution networks. Energies 11 (11), 3079 (2018)

Google Scholar  

Barbareschi, M., Bagnasco, P., Mazzeo, A.: Authenticating IoT devices with physically unclonable functions models. In: 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 563–567. IEEE (2015)

Barbareschi, M., De Benedictis, A., La Montagna, E., Mazzeo, A., Mazzocca, N.: A PUF-based mutual authentication scheme for cloud-edges IoT systems. Futur. Gener. Comput. Syst. 101 , 246–261 (2019)

Barbareschi, M., De Benedictis, A., Mazzocca, N.: A PUF-based hardware mutual authentication protocol. J. Parallel Distrib. Comput. 119 , 107–120 (2018)

Botton, S., Cavalletto, L., Marmeggi, F.: Schema project-innovative criteria for management and operation of a closed ring mv network. In: 22th International Conference and Exhibition on Electricity Distribution (CIRED 2013). IET (2013)

Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51 (1), 42–49 (2013)

Böhm, C., Hofer, M., Pribyl, W.: A microcontroller SRAM-PUF. In: 2011 5th International Conference on Network and System Security, pp. 269–273 (2011)

Casola, V., Benedictis, A.D., Drago, A., Mazzocca, N.: Analysis and comparison of security protocols in wireless sensor networks. In: 30th IEEE Symposium on Reliable Distributed Systems Workshops, SRDS Workshops 2011, Madrid, Spain, 4–7 October 2011, pp. 52–56. IEEE Computer Society (2011)

Chien, H.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Sec. Comput. 4 , 337–340 (2007)

Cortez, M., Dargar, A., Hamdioui, S., Schrijen, G.J.: Modeling SRAM start-up behavior for physical unclonable functions. In: 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp. 1–6. IEEE (2012)

Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31

Chapter   Google Scholar  

D’Orazio, L., Calone, R.: Innovative protection system on distribution network. In: 22th International Conference and Exhibition on Electricity Distribution (CIRED 2013). IET (2013)

Fouda, M.M., Fadlullah, Z.M., Kato, N., Lu, R., Shen, X.S.: A lightweight message authentication scheme for smart grid communications. IEEE Trans. Smart Grid 2 (4), 675–685 (2011)

Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262–277. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04474-8_22

Hellman, M.E.: An overview of public key cryptography. IEEE Commun. Mag. 40 (5), 42–49 (2002)

Hung, K., et al.: On wireless sensors communication for overhead transmission line monitoring in power delivery systems. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 309–314. IEEE (2010)

Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of Internet of Things. In: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, pp. 61–64 (2013)

Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82 , 395–411 (2018)

Kulkarni, G., Shelke, R., Sutar, R., Mohite, S.: RFID security issues & challenges. In: 2014 International Conference on Electronics and Communication Systems (ICECS), pp. 1–4, February 2014

Li, H., Lu, R., Zhou, L., Yang, B., Shen, X.: An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 8 (2), 655–663 (2013)

Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4 (5), 1125–1142 (2017)

Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81 , 557–565 (2018)

Mahmood, K., Chaudhry, S.A., Naqvi, H., Shon, T., Ahmad, H.F.: A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52 , 114–124 (2016)

Muller, D.E.: Application of Boolean algebra to switching circuit design and to error detection. Trans. IRE Prof. Group Electron. Comput. 3 , 6–12 (1954)

Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20 (1), 601–628 (2018)

Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297 (5589), 2026–2030 (2002)

Raychowdhury, A., Pramanik, A.: Survey on LoRa technology: solution for Internet of Things. In: Thampi, S.M., et al. (eds.) Intelligent Systems, Technologies and Applications. AISC, vol. 1148, pp. 259–271. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-3914-5_20

Reed, I.S.: A class of multiple-error-correcting codes and the decoding scheme. Technical report, Massachusetts Institute of Technology, Lincoln Laboratory, Lexington (1953)

Roel, M.: Physically unclonable functions: constructions, properties and applications. Katholieke Universiteit Leuven, Belgium (2012)

Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78 , 680–698 (2018)

Rostami, M., Majzoobi, M., Koushanfar, F., Wallach, D.S., Devadas, S.: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Trans. Emerg. Top. Comput. 2 (1), 37–49 (2014)

Schrijen, G., van der Leest, V.: Comparative analysis of SRAM memories used as PUF primitives. In: 2012 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1319–1324 (2012)

Spalding, R.A., et al.: Fault location, isolation and service restoration (FLISR) functionalities tests in a smart grids laboratory for evaluation of the quality of service. In: 2016 17th International Conference on Harmonics and Quality of Power (ICHQP), pp. 879–884. IEEE (2016)

Stojmenovic, I., Wen, S.: The Fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1–8, September 2014

Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. Practice Exp. 28 (10), 2991–3005 (2016)

Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM/IEEE Design Automation Conference, pp. 9–14. IEEE (2007)

Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 73 (3), 1085–1102 (2017)

Valdes, M.E., Dougherty, J.J.: Advances in protective device interlocking for improved protection and selectivity. IEEE Trans. Ind. Appl. 50 (3), 1639–1648 (2013)

Xiao, K., Rahman, M.T., Forte, D., Huang, Y., Su, M., Tehranipoor, M.: Bit selection algorithm suitable for high-volume production of SRAM-PUF. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 101–106 (2014)

Download references

Author information

Authors and affiliations.

Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Via Claudio, 21, 80125, Naples, Italy

Mario Barbareschi, Salvatore Barone, Alfonso Fezza & Erasmo La Montagna

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Salvatore Barone .

Editor information

Editors and affiliations.

Faculty of Engineering of the University of Porto, Porto, Portugal

Ana C. R. Paiva

Institut Polytechnique de Paris, Paris, France

Ana Rosa Cavalli

University of Algarve, Faro, Portugal

Paula Ventura Martins

University of Castila-La Mancha, Ciudad Real, Ciudad Real, Spain

Ricardo Pérez-Castillo

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Cite this paper.

Barbareschi, M., Barone, S., Fezza, A., La Montagna, E. (2021). Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: A Case Study. In: Paiva, A.C.R., Cavalli, A.R., Ventura Martins, P., Pérez-Castillo, R. (eds) Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 1439. Springer, Cham. https://doi.org/10.1007/978-3-030-85347-1_22

Download citation

DOI : https://doi.org/10.1007/978-3-030-85347-1_22

Published : 25 August 2021

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-85346-4

Online ISBN : 978-3-030-85347-1

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Library homepage

  • school Campus Bookshelves
  • menu_book Bookshelves
  • perm_media Learning Objects
  • login Login
  • how_to_reg Request Instructor Account
  • hub Instructor Commons

Margin Size

  • Download Page (PDF)
  • Download Full Book (PDF)
  • Periodic Table
  • Physics Constants
  • Scientific Calculator
  • Reference & Cite
  • Tools expand_more
  • Readability

selected template will load here

This action is not available.

Engineering LibreTexts

5.11: Case Study - Transport Layer Security (TLS) for the Web

  • Last updated
  • Save as PDF
  • Page ID 58759

  • Jerome H. Saltzer & M. Frans Kaashoek
  • Massachusetts Institute of Technology via MIT OpenCourseWare

\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

\( \newcommand{\Span}{\mathrm{span}}\)

\( \newcommand{\id}{\mathrm{id}}\)

\( \newcommand{\kernel}{\mathrm{null}\,}\)

\( \newcommand{\range}{\mathrm{range}\,}\)

\( \newcommand{\RealPart}{\mathrm{Re}}\)

\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

\( \newcommand{\Argument}{\mathrm{Arg}}\)

\( \newcommand{\norm}[1]{\| #1 \|}\)

\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

\( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

\( \newcommand{\vectorC}[1]{\textbf{#1}} \)

\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

The Transport Layer Security (TLS) protocol\(^*\) is a widely used security protocol to establish a secure channel (confidential and authenticated) over the Internet. The TLS protocol is at the time of this writing a proposed international standard. TLS is a version of the Socket Security Layer (SSL) protocol, defined by Netscape in 1999, so current literature frequently uses the name "SSL/TLS" protocol. The TLS protocol has some improvements over the last version (3) of the SSL protocol, and this case study describes the TLS protocol, version 1.2.

The TLS protocol allows client/service applications to communicate in the face of eavesdroppers and adversaries who would tamper with and forge messages. In the handshake phase, the TLS protocol negotiates, using public-key cryptography, shared-secret keys for message authentication and confidentiality. After the handshake, messages are encrypted and authenticated using the shared-secret keys. This case study describes how TLS sets up a secure channel, its evolution from SSL, and how it authenticates principals.

\(^*\) Tim Dierks and Eric Rescorla. The Transport Layer Security (TLS) protocol Version 1.2. RFC 4346 . November 2007.

The TLS Handshake

The TSL protocol consists of several protocols, including the record protocol which specifies the format of messages between clients and services, the alert protocol to communicate errors, the change cipher protocol to apply a cipher suite to messages sent using the record layer protocol, and several handshaking protocols. We describe the handshake protocol for the case where an anonymous user is browsing a Web site and requires service authentication and a secure channel to that service.

Figure \(\PageIndex{1}\) shows the handshake protocol for establishing a connection from a client to a server. The CLIENTHELLO message announces to the service the version of the protocol that the client is running (SSL 2.0, SSL 3.0, TLS 1.0, etc.), a random sequence number, and a prioritized set of ciphers and compression methods that the client is willing to use. The session_id in the CLIENTHELLO message is null if the client hasn't connected to the service before.

1. The client sends the server a ClientHello message, which includes the client_version, randomclient, session_id, cipher_suites, and compression_f information. 2. The server sends the client a ServerHello message, which includes the server_version, randomserver, session_id, cipher_suite, and compression_f information. 3. The server sends the client a ServerCertificate message, which contains certificate_list. 4. The server sends the client the message HelloServerDone. 5. The client sends the server a ClientKeyExchange message, which includes ENCRYPT(pre_master_secret, ServerPubKey). 6. The client sends the server a ChangeCipherSpec message, which contains cipher_suite. 7. The client sends the server a FINISHED message, which contains MAC(master_secret, messages 1,2,3,4,5). The entire message is signed with authentication key client_write_MAC_secret and encryption key client_write_key. 8. The server sends the client a ChangeCipherSpec message, which contains cipher_suite. 9. The server sends the client a FINISHED message, which contains MAC(master_secret, messages 1,2,3,4,5,6,7). The entire message is signed with authentication key server_write_MAC_secret and encryption key server_write_key. 10. The client sends the server a Data message containing plaintext, the whole message being signed with client_write_MAC_secret and client_write_key.

Figure \(\PageIndex{1}\): Typical TLS exchange of handshake protocol messages.

The service responds to the CLIENTHELLO message with 3 messages. It first replies with a SERVERHELLO message, announcing the version of the protocol that will be used (the lower of the one suggested by the client and the highest one supported by the service), a random number, a session identifier, and the cipher suite and compression method selected from the ones offered by the client.

To authenticate the service to the client, the service sends a SERVERCERTIFICATE message. This message contains a chain of certificates, ordered with the service's certificate first followed by any certificate authority certificates proceeding sequentially upward. Usually the list contains just two certificates: a certificate for the public key of the service and a certificate for the public key of the certification authority. (We will discuss certificates in more detail in Section 5.11.3 below.)

After the service sends its certificates, it sends a SERVERHELLODONE message to indicate that it is done with the first part of the handshake. After receiving this message and after satisfactorily verifying the authenticity of the service, the client generates a 48-byte   pre_master_secret . TLS supports multiple public-key systems, and depending on the choice of the client and service, the pre_master_secret is communicated to the service in slightly different ways.

In practice, TLS typically uses a public-key system, in which the client encrypts the pre_master_secret with the public key of the service found in the certificate, and sends the result to the service in the CLIENTKEYEXCHANGE message. The pre_master_secret thus can be decrypted by any entity that knows the private key that corresponds to the public key in the certificate that the service presented. The security of this scheme therefore depends on the client carefully verifying that the certificate is valid and that it corresponds to the desired service. This point is explored in more detail in Section 5.11.3, below.

The pre_master_secret is used to compute the master_secret using the service and client nonce (" + " denotes concatenation):

master_secret ← PRF ( pre_master_secret , “master secret”, random client + random server )

PRF is a pseudorandom function, which takes as input a secret, a label, and a seed. As output it generates pseudorandom bytes. TLS assigns the first 48 bytes of the PRF output to the master_secret. The TLS version 1.2 uses a PRF function that is based on the HMAC construction and the SHA-256 hash function (see  Section 5.9  for the HMAC construction and the SHA family of hash functions).

It is important that the master_secret be dependent both on the pre_master_secret and the random values supplied by the service and client. For example, if the random number of the service were omitted from the protocol, an adversary could replay a recorded conversation without the service being able to tell that the conversation was old.

After the master_secret is computed, the pre_master_secret should be deleted from memory, since it is no longer needed and continuing to store it would just create an unnecessary security risk.

After sending the encrypted pre_master_secret , the client sends a CHANGECIPHERSPEC message. This message\(^*\) specifies that all future message from the client will use the ciphers specified as the encrypting and authentication ciphers.

The keys for message encrypting and authentication ciphers are computed using the master_secret , random client , and random server (which both the client and the service now have). Using this information a key block is computed:

key_block ← PRF ( master_secret , “key expansion”, random server + random client )

until enough output has been produced to provide the following keys:

client_write_MAC_secret [CipherSpec.hash_size] server_write_MAC_secret [CipherSpec.hash_size] client_write_key [CipherSpec.key_material] server_write_key [CipherSpec.key_material] client_write_IV [CipherSpec.IV_size] server_write_IV [CipherSpec.IV_size]

The first 4 variables are the keys for authentication and confidentiality, one for each direction. The last 2 variables are the initialization vectors, one for each direction, for ciphers using CBC mode (see Section 5.9 ). These variables together are the state necessary for the client and the service to communicate securely.

Now the client sends a FINISHED message to announce that it is done with the handshake. The FINISHED message contains at least 12\(^{**}\) bytes of the following output:

PRF ( master_secret , finish_label , HASH ( handshake_messages ))

The FINISHED message is a verifier of the protocol sequence so far (the value of all messages starting at the CLIENTHELLO message, but not including the FINISHED message). The client use the value "client finished" for finish_label . HASH is the same hash function used for the PRF , SHA-256. If the service verifies the hash, the service and client agree on the protocol sequence and the master_secret . TLS encrypts and authenticated the FINISHED message using the cipher suite that the client and service agreed on in the HELLO messages.

After the service receives the client's FINISHED message, it sends a CHANGECIPHERSPEC message, informing the client that all subsequent messages from service to client will be encrypted and authenticated with the specified ciphers. (The client and service can use different ciphers for their traffic.) Like the client, the service concludes the handshake with a FINISHED message, but uses the value "server finished" for finish_label . After both finish messages have been received and checked out correctly, the client and service have a secure (that is, encrypted and authenticated) channel over which they can carry on the remainder of their conversation.

\(^*\) The TLS standard considers CHANGECIPHERSPEC not part of the handshake protocol, but part of the Change Cipher Spec protocol, even though the handshake protocol uses it.

\(^{**}\) Clients may specify in the HELLO message that they prefer more bytes.

Evolution of TLS

The TLS handshake protocol is more complicated than some of the other protocols that we described in this chapter. In a large part, this complexity is due to all the options TLS supports. It allows a wide range of ciphers and key sizes. Service and client authentication are optional. Also, it supports different versions of the protocol. To support all these options, the TLS protocol needs a number of additional protocol messages. This makes reasoning about TLS difficult, since depending on the client and service constraints, the protocol has a different set of message exchanges, different ciphers, and different key sizes. Partly because of these features the predecessors of TLS 1.2, the earlier SSL protocols, were vulnerable to new attacks, such as cipher suite substitution and version rollback attacks.

In version 2 of SSL, the adversary could edit the CLIENTHELLO message undetected, convincing the service to use a weak cipher, for example one that is vulnerable to brute-force attacks. SSL Version 3 and TLS protect against this attack because the FINISHED message computes a MAC over all message values.

Version 3 of SSL accepts connection requests from version 2 of SSL. This opens a version-rollback attack, in which an adversary convinces the service to use version 2 of the protocol, which has a number of well-documented vulnerabilities, such as the cipher substitution attack. Version 3 appears to be carefully designed to withstand such attacks, but the specification doesn't forbid implementations of version 2 to resume connections that were started with version 3 of the protocol. The security implications of this design are unclear.

One curious aspect of version 3 of the SSL protocol is that the computation for the MAC of the FINISHED messages does not include the CHANGECIPHER messages. As pointed out by Wagner and Schneier, an adversary can intercept the CHANGECIPHER message and delete it, so that the service and client don't update their current cipher suite. Since messages during the handshake are not encrypted and authenticated, this can open a security hole. Wagner and Schneier describe an attack that exploits this observation [Suggestions for Further Reading  5.5.6 ]. Currently, widely used implementations of SSL 3.0 protect against this attack by accepting a FINISHED message only after receiving a CHANGECIPHER message.

TLS is the international standard version of SSL 3.0, but also improves over SSL 3.0. For example, it mandates that a FINISHED message must follow immediately after a CHANGECIPHER message. It also replaces ad-hoc ways of computing hash functions in various parts of the SSL protocol (e.g., in the FINISHED message and master_secret ) with a single way, using the PRF function. TLS 1.1 has a number of small security improvements over 1.0. TLS 1.2 improves over TLS 1.1 by replacing an MD5/SHA-1 implementation of PRF with one specified in the cipher suite in the HELLO messages, preferable based on SHA-256. This allows TLS to evolve more easily when ciphers are becoming suspect (e.g., SHA-1).

Authenticating Services with TLS

TLS can be used for many client/service applications, but its main use is for secure Web transactions. In this case, a Web browser uses TLS to set up a message-authenticated, confidential communication connection with a Web service. HTTP requests and responses are sent over this secure connection. Since users typically visit Web sites and perform monetary transactions at these sites, it is important for users to authenticate the service. If users don't authenticate the service, the service might be one run by an adversary who can now record private information (e.g., credit card numbers) and supply fake information. Therefore, a key problem TLS addresses is service authentication. 

The main challenge for a client is to convince itself that the service's public key is authentic. If a user visits a Web site, say amazon.com, then a user wants to make sure that the Web site the user connects to is indeed owned by Amazon.com, Inc. The basic idea is for Amazon to sign its name with its private key. Then, the client can verify the signed name using Amazon's public key. This approach reduces the problem to securely distributing the public key for Amazon. If it is done insecurely, an adversary can convince the client that the adversary has the public key of Amazon, but substitute the adversary's own public key and sign Amazon's name with the adversary's private key. This problem is an instance of the key-distribution problem, discussed in  Section 5.6 .

TLS relies on well-known certification authorities for key distribution. An organization owning a Web site buys a certificate from one or more certification authorities. Each authority runs a certification check to validate that the organization is the one it claims to be. For example, a certification authority might ask Amazon, Inc. for articles of incorporation to prove that it is the entity it claims to be. After the certification authority has verified the identity of the organization, it issues a certificate. The certificate contains the public key of the organization and the name of the organization, signed with the private key of the certificate authority. (The service sends the certificates in step 3 of the handshake protocol, described in Section 5.11.1 above.)

The client verifies the certificate as follows. First, it obtains in a secure way the public key of certification authorities that it is willing to trust. Typically a number of public keys come along with the distribution of a Web browser. Second, after receiving the service certificates, it uses the public keys of the authorities to verify one of the certificates. If one of the certificates verifies correctly, the client can be confident about the name of the organization owning the service. Whether a user can trust the organization that goes by that name is a different question and one that the user must resolve using psychological means.

TLS uses certificates that are standardized by the ISO X.509 standard. Some of the fields in Version 3 of X.509 certificates are shown below (the standard specifies them in a different order):

structure certificate      version     serial_number     signature_cipher_identifier     issuer_signature     issuer_name     subject_name     subject_public_key_cipher_identifier     subject_public_key     validity_period

The version field specifies the version of the certificate (it would be 3 in this example). The serial_number field contains a nonce assigned by the issuing certification authority and is different for every certificate. The signature_cipher_identifier field identifies the algorithm used by the authority to sign this certificate. This information allows a client of the certification authority to know which of several standard algorithms to use to verify the issuer_signature field, which contains the value of the certificate's signature. If the signature checks out, the recipient can believe that the information in the certificate is authentic. The issuer_name field specifies the real-world name of the certificate authority. The subject_name field specifies the real-world name for the principal. The two other subject fields specify the public-key cipher the principal wants to use (say RSA), and the principal's public key.

The validity_period field specifies the time for which this signature is valid (the start and expiry dates and times). The validity_period field provides a weak method for key revocation. If Amazon obtains a certificate and the certificate is valid for 12 months (a typical number), and if the next day an adversary compromises the private key of amazon.com, then the adversary can impersonate Amazon for the next 12 months. To counter this problem a certification authority maintains a certification revocation list, which contains compromised certificates (identified by the certificate's serial number). Anyone can download the certificate revocation list to check if a certificate is on this blacklist. Unfortunately, revocation lists are not in widespread use today. Good certificate revocation procedures are an open research problem.

The crucial security step for establishing a principal's identity is the certification process executed by the certification authority. If the authority issues certificates without checking out the identity of the organization owning the service, the certificate doesn't improve security. In that case, Lucifer could ask the certification authority to create a certificate for Amazon.com, Inc. If the authority doesn't check Lucifer's identity, Lucifer will obtain a certificate for Amazon, Inc. that binds the name Amazon, Inc. to Lucifer's public key, allowing Lucifer to impersonate Amazon, Inc. Thus, it is important that the certification authority do a careful job of certifying the principal's identity. A typical certification procedure includes paying money to the authority, and sending by surface mail the articles of incorporation (or equivalent) of the organization. The authority will run a partly manual check to validate the provided information before issuing the certificate.

Certification authorities face an inherent conflict between good security and convenience. The procedure must be thorough enough that the certificate means something. On the other hand, the certification procedure must be convenient enough that organizations are able or willing to obtain a certificate. If it is expensive in time and money to obtain a certificate, organizations might opt to go for an insecure solution (i.e., not authenticating their identity with TLS). In practice, certification authorities have a hard time striking the appropriate balance and therefore specialize for a particular market. For example, Verisign, a well-known certification authority, is mostly used by commercial organizations. Private parties who want to obtain a certificate from Verisign for their personal Web sites are likely to find Verisign's certification procedure impractical.

Ford and Baum provide a nice discussion of the current practice for secure electronic commerce using certificate authorities, certificates, etc., and the legal status of certificates \(^*\).

\(^*\) Warwick Ford and Michael S. Baum. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption . Prentice Hall, second edition, 2000. ISBN: 978–0–13–027276–8. 640 pages.

Although the title implies more generality, this book is about public key infrastructure: certificate authorities, certificates, and their legal status in practice. The authors are a technologist (Ford) and a lawyer (Baum). The book provides thorough coverage and is a good way to learn a lot about the subject. Because the status of this topic changes rapidly, however, it should be considered a snapshot rather than the latest word.

User Authentication

User authentication can, in principle, be handled in the same way as server authentication. The user could obtain a certificate from an authority testifying to the user's identity. When the server asks for it, the user could provide the certificate and the server could verify the certificate (and thus the user's identity according to a certification authority) by using the public key of the authority that issued the certificate. Extensions of the TLS handshake protocol support this form of user authentication.

In practice, and in particular in the Web, user authentication doesn't rely on user certificates. Some organizations run a certificate authority and use it to authenticate members of their organization. However, often it is too much trouble for a user to obtain a certificate, so few Web users are willing to obtain one. Instead, many servers authenticate users based on the IP address of the client machine or based on a shared passphrase. Both methods are currently implemented insecurely.

Using the IP address for authentication is insecure because it is easy for an adversary to spoof an IP address. Thus, when the server checks whether a user on a machine with a particular IP address has access, the server has no guarantees. Typically, this method is used inside an organization that puts all its machines behind a firewall. The firewall attempts to keep adversaries out of the organization's network by monitoring all network traffic that is coming from the Internet and blocking bad traffic (e.g., a packet that is coming from outside the firewall but an internal IP address).

Passphrase authentication is better. In this case, the user sets up an account on the service and protects it with a passphrase that only the user and the service know. Later when the user visits the service again, the server puts up a login page and asks the user to provide the passphrase. If the passphrase is valid, the server assumes that the user is the principal who created the account.

To avoid having the user to type the password on each request, services can exploit a Web mechanism called cookies . A service sends a cookie, a service-specific piece of information, to the user's Web browser, which stores it for use in later requests to the service. The service sends the cookie by including in a response a SET_COOKIE directive containing data to be stored in the cookie. The browser stores the cookie in memory. (In practice, there may be many cookies, so they are named, but for this description, assume that there is only one and no name is needed.) On subsequent calls (i.e., GET or POST ) to the service that installed the cookie, the browser sends the installed cookie along with the other arguments to GET or POST .

Web services can use cookies for user authentication as follows. When the user logs in, the service creates a cookie that contains information to authenticate the user later and sends it to the user's browser, which stores it for use in future requests to this service. Every subsequent request from that browser will include a copy of the cookie, and the service can use the information stored in the cookie to learn which user issued this request. If the cookie is missing (for example, the user is using a different browser), the service will return an error to the browser and ask the user to login again. The security of this scheme depends on how careful the service is in constructing the authenticating cookie. One possibility is to create a nonce for a session and sign the nonce with a MAC. Kevin Fu et al. describe some ways to get it wrong and recommend a secure approach\(^*\).  Problem Set 28  explores some of the issues in protecting and authenticating cookies.

Websites use cookies in many ways. For example, many sites use cookies to track the browsing patterns of returning visitors. Users who want to protect their privacy must disable cookie tracking in their browser.

\(^*\) K. Fu, E. Sit, K. Smith, and N. Feamster, Dos and don'ts of client authentication on the Web, Proceedings of the tenth USENIX Security Symposium , Washington, August 2001.

IMAGES

  1. Choose Authentication Type

    case study about implementation of authentication protocols in the network

  2. Authentication Protocols: Definition & Examples

    case study about implementation of authentication protocols in the network

  3. Layer up your account security with Multi-Factor Authentication (MFA)

    case study about implementation of authentication protocols in the network

  4. Networks: Implementation of Authentication Process

    case study about implementation of authentication protocols in the network

  5. Guide for Business Leaders like CFO/CIO/COO: Oracle NetSuite ERP Implementation Plan I Introv

    case study about implementation of authentication protocols in the network

  6. AUTHENTICATION PROTOCOLS

    case study about implementation of authentication protocols in the network

VIDEO

  1. X.509 Authentication Service: Certificate, Procedures

  2. Authentication Protocols -- Kerberos -- PAP -- CHAP

  3. HTTPS: Connection Initiation and Closure

  4. Industry Study 2023

  5. User Authentication Protocols: Part 1

  6. Cyber Security Introduction: 6- Authentication And Authorization

COMMENTS

  1. Network Communication Encoding: A Study for Authentication Protocols

    The authentication protocols enable secure data transmission over the network. The objects in every network have an entry in Management Information Base (MIB), which is a set of network objects managed by Simple Network Management Protocol (SNMP) [].There were compatibility issues revealed in the literature during data transmission by SNMP with respect to incompatible data type encoding.

  2. PDF A case study in selection and deployment of a multi-factor

    challenges often results in changes in organizational behavior and process as well as the implementation of additional enhanced authentication protocols. One protocol that can offer an additional level of security is known as multi-factor authentication, which relies on a combination of authentication methods to enforce system access policies.

  3. PDF Analysis of Authentication Protocols with Scyter: Case Study

    Scyther [1] is a free downloadable tool designed primarily for verification analysis of security protocols. It is based on an algorithm that condensed representation (infinite) set of traces. This tool helps in classes of possible attacks and protocol behavior. Tool to prove the indeterminate number of connections.

  4. A Study of Authentication Protocols in Internet of Things

    Internet of Things(IoT) is a promising technology in the current era, and security is one amongst the significant challenges in its success. The resource constraints in devices make the design and implementation of counter security mechanisms more challenging. Many attacks from an eavesdropper may endanger to authentication and lunch further attack to IoT systems. Hence, there is a need for an ...

  5. (PDF) Network Authentication Protocol Studies

    Abstract and Figures. The original focus of this project was to investigate cryptographic protocols, and methods for formal design and analysis of those protocols. As time progressed, we found a ...

  6. Analysis and Implementation of the Authentication Protocol 802.1x

    Authentication process has the function to allow or prevent users from accessing the wireless network like IEEE 802.11b or 802.11g, it can be applied also to wired networks [3]. IEEE 802.1X [4] is ...

  7. Survey on authentication and security protocols and schemes over 5G

    These weaknesses in the authentication process motivated 5G network to make the authentication decision only by home network. The protocol works as follows: when a device requests authentication, the home network sends an authentication vector (a large random number) as a challenge to the device, then this device must encrypt it again as a ...

  8. PDF Network Communication Encoding: A Study for Authentication Protocols

    The objective of this paper is to study encoding schemes available for data transmission and their application in terms of authentication protocols such as Kerberos and LDAP. Furthermore, it will also emphasize on the design of integration model of Kerberos and LDAP to Cloud and Shared Storage to evaluate the impact of ASN.1 vulnerability.

  9. Network Authentication Protocols: Types and Their Pros & Cons

    The most commonly used authorization and authentication protocols are Oauth 2, TACACS+, RADIUS, Kerberos, SAML, and LDAP/Active Directory. It's important to understand these are not competing protocols. I've seen many environments that use all of them simultaneously—they're just used for different things.

  10. Networking: Implementation of Authentication Process Case Study

    School WLAN. Deploying a wireless local area network (WLAN) in a school environment can be an enormous asset in the learning process. However, such an environment presents unique challenges in ensuring the network's security. This report will examine the probable user groups, their security requirements, and potential risks associated with a ...

  11. PDF A Survey and Comparative Analysis of Security Properties of CAN

    selecting the protocol for real-world implementation. In conjunction with security requirements, these character-istics provide a comprehensive analytical overview of the protocols. •We propose enhancements that may be applied to make protocols more robust and secure and provide indications for developing future authentication protocols in ...

  12. Authentication strategies in vehicular communications: a taxonomy and

    A case study approach is employed to demonstrate the usefulness of the proposed taxonomy and framework. Through two types of case study, this research provides individual analysis of seven well-known authentication protocols and presents a hypothetical authentication protocol design. 1.4 Research scope

  13. [PDF] Security in IoT Pairing & Authentication protocols, a Threat

    Corpus ID: 244101039; Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis @inproceedings{Granata2021SecurityII, title={Security in IoT Pairing \& Authentication protocols, a Threat Model, a Case Study Analysis}, author={Daniele Granata and Massimiliano Rak and Giovanni Salzillo and Umberto Barbato}, booktitle={Italian Conference on Cybersecurity}, year ...

  14. (PDF) Network Security: Case Study Analysis

    NETWORK SECUIRTY. Ca se Overview. To provide a course of study leading to an understanding of the theory and practical issues that are involved. with securing computer networks; and an ...

  15. An Authentication Protocol for Healthcare Application: A Case Study of

    In 2017, Yeh et al. , proposed a secure light-weight protocol authentication scheme for IoT healthcare application. They exploited two authentication process: (i) phase 1: between the local processing and BSN server, and (ii) phase 2: between biosensor, local processing, and BSN server; to satisfy an efficient analysis and implementation.

  16. A Robust and Effective Two-Factor Authentication (2FA) Protocol Based

    In this study, we designed a robust and effective 2FA protocol based on elliptic curve cryptography (ECC) for authentication of users and service providers. We proved the robustness (respectively, the effectiveness) of the presented protocol with the heuristic analysis and security verification provided by the ProVerif tool (respectively, with ...

  17. Implementation of Authentication Protocols in the Network Related Case

    Atom Oliveros. BSIT 3-Implementation of Authentication Protocols in the Network Related Case Study (1) since a virtual private network requires encrypted communication devices and encryption/authentication protocols, the implementation of a authentication protocols solution is relatively inexpensive. this means that authentication protocols solutions can be secured using any various security ...

  18. Comparative Study on Various Authentication Protocols in ...

    Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research.

  19. PDF SSL / TLS Case Study

    • Widely deployed, "real-world" security protocol Protocol analysis case study ... Network protocols are usually disseminated in the form of an RFC ... • Test an implementation of the protocol, if available. 7 "Core" SSL 3.0 C Versions=3.0, suites, Ns,

  20. Enforcing Mutual Authentication and Confidentiality in ...

    In particular, a wireless sensor network for Fault-Detection, Isolation and Service Recovery (FDISR) on a Medium-Voltage Power Distribution Network is used as a case study to discuss and evaluate the adoption of the Extended Physical Hardware-Enabled Mutual Authentication Protocol (ExPHEMAP), compared to well known strategies based on symmetric ...

  21. Implementation of Authentication Protocols in the Network Related Case

    Implementation of Authentication Protocols in the Network. Related Case Study (2) The need to secure information and data in enterprise environments is always the key issue for most security professionals. In today's business environment, it is not uncommon for people to work from home or on the road while traveling for business.

  22. Case Study: Implementing a Secure Wireless Network using WPA

    Case Study: Implementing a Secure Wireless Network using WPA. Wireless network cards are becoming quite common at my company especially in notebook computers. With this proliferation of wireless network cards have come requests from the users of these computers to access the corporate network using a wireless connection.

  23. 5.11: Case Study

    User Authentication. The Transport Layer Security (TLS) protocol ∗ ∗ is a widely used security protocol to establish a secure channel (confidential and authenticated) over the Internet. The TLS protocol is at the time of this writing a proposed international standard. TLS is a version of the Socket Security Layer (SSL) protocol, defined by ...