Submitted:
07 October 2023
Posted:
10 October 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
- We show [1]that Zhang’s IBV scheme [5] is vulnerable to impersonation attacks where any member of a VANET can easily obtain the private information of other members and generate and sign messages on their behalf. We discuss causes and propose general improvements to the scheme to mitigate this attack. We also show that the same scheme [5] is vulnerable to repudiation attacks where malicious users can send messages with false information using fake identities and escape retribution accordingly. This encourages them to send false information to suit their own purposes and easily escape accountability in case their messages are reported to a trusted authority. Finally, we point out the deficiencies in Tao’s [6] cryptanalysis of Zhang’s IBV scheme [5]
- We show that Xiong’s CLAS scheme [9] is vulnerable to bogus information attacks since partial private keys and pseudo-identities are not adequately verified and can be replaced by the sender of the message and still perform successful verification at the receiver’s end. We also show that the scheme is vulnerable to the same repudiation attack that afflicts Zhang’s scheme and point out a mistake in the batch verification equation.
2. VANET Security Requirements
2.1. Attacks on Availability
2.2. Attacks on Authentication
2.3. Attacks on Integrity
2.4. Attacks on Conditional Privacy
2.5. Attacks on Non-Repudiation
2.6. Attacks on Confidentiality
3. Related Work: IBV and CLAS Schemes
3.1. IBV schemes
3.1.1. History of IBV
3.1.2. IBV in the Context of VANETs
3.2. CLAS Schemes
3.2.1. History of CLAS Schemes
3.2.2. CLAS in the Context of VANETs
4. Preliminaries
4.1. Elliptic curves
4.2. Chinese Remainder Theorem
4.3. Network Model
- Trusted Authority (TA): This is also known as the Trusted Third Party (TTP) or the Central Authority (CA). It is generally known to comprise a Key Generation Center (KGC) and a Tracing Authority/ Tracing Manager (TRA/TRM). IBV schemes tend to combine the role of the KGC and the TRM while CLAS schemes necessarily posit them as distinct entities. The KGC is meant to generate public and private keys (or partial keys) for all members to enable digital signature verification, while the TRM is meant to generate verifiable pseudo-identities for each member to enable traceability in case of disputes. Schemes occasionally propose redundant TAs with access to the same data repository to avert single points of failure.
- Roadside Units (RSUs): They are connected to the TA with secure wired links and to vehicles with insecure wireless connections. Different schemes assume different levels of RSU trustworthiness, where the predominant assumption is that RSUs are honest but curious. The role of RSUs varies in different schemes, from being merely a gateway to relay messages from the TA to vehicles (and back) to being a group manager that issues signing and verification keys to members within its domain and managing localized groups.
- Vehicles: Vehicles are assumed to be untrustworthy. They are equipped with On Board Units (OBUs) which contain a tamper proof device (TPD). It is assumed that all vehicles will be equipped with TPDs but schemes diverge on the assumption of an ideal TPD (secure enough to store the master secret key of the system for self-authentication) or a realistic TPD (where only the secret key of the corresponding user is stored, and authentication is carried out elsewhere).
5. Zhang et al.’s Scheme
5.1. Description
5.2. Cryptanalysis
5.2.1. Impersonation Attack
5.2.2. Repudiation/Spoofing Attack
5.3. Causes and Countermeasures
5.3.1. Impersonation Attack
5.3.2. Repudiation Attack
5.4. A Commentary on the Cryptanalysis of this Scheme by TAO et al. [6]
6. Xionf et al.’s Scheme
6.1. Description
6.2. Cryptanalysis
6.2.1. Bogus Information and Repudiation Attack
6.2.2. Other Flaws
6.3. Causes and Counter Measures
7. Conclusions and Future Work
References
- B. Hammi, J.-P. Monteuuis, and J. Petit, “PKIs in C-ITS: Security functions, architectures and projects: A survey,” Vehicular Communications, vol. 38, p. 100531, 2022. [CrossRef]
- H. Chen, J. Liu, J. Wang, and Y. Xun, “Towards secure intra-vehicle communications in 5G advanced and beyond: Vulnerabilities, attacks and countermeasures,” Vehicular Communications, p. 100548, 2022.
- V. Mannoni, V. Berg, S. Sesia, and E. Perraud, “A comparison of the V2X communication systems: ITS-G5 and C-V2X,” in 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 2019, pp. 1-5: IEEE.
- E. L. Cominetti, M. V. M. Silva, M. A. Simplicio Jr, H. K. Patil, and J. E. Ricardini, “Faster verification of V2X basic safety messages via Message Chaining,” Vehicular Communications, p. 100662, 2023. [CrossRef]
- J. Zhang, J. Cui, H. Zhong, Z. Chen, and L. Liu, “PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks,” IEEE Transactions on Dependable Secure Computing vol. 18, no. 2, pp. 722-735, 2019. [CrossRef]
- Q. Tao, H. Ding, T. Jiang, and X. Cui, “B-DSPA: A Blockchain-based Dynamically Scalable Privacy-Preserving Authentication Scheme in Vehicular Ad-hoc Networks,” IEEE Internet of Things Journal, 2023. [CrossRef]
- W. Xiong, R. Wang, Y. Wang, F. Zhou, and X. Luo, “CPPA-D: Efficient conditional privacy-preserving authentication scheme with double-insurance in VANETs,” IEEE Transactions on Vehicular Technology, vol. 70, no. 4, pp. 3456-3468, 2021. [CrossRef]
- K.-A. Shim, “Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs,” IEEE Access, vol. 11, pp. 33956-33963, 2023. [CrossRef]
- W. Xiong, R. Wang, Y. Wang, Y. Wei, F. Zhou, and X. Luo, “Improved certificateless aggregate signature scheme against collusion attacks for vanets,” IEEE Systems Journal, vol. 17, no. 1, pp. 1098-1109, 2022. [CrossRef]
- M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” Journal of computer security, vol. 15, no. 1, pp. 39-68, 2007. [CrossRef]
- Y. Chen, J. Yuan, and Y. Zhang, “An improved password-authenticated key exchange protocol for VANET,” Vehicular Communications, vol. 27, p. 100286, 2021. [CrossRef]
- S. Sharma and A. Kaul, “A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud,” Vehicular communications, vol. 12, pp. 138-164, 2018. [CrossRef]
- F. Gonçalves et al., “A systematic review on intelligent intrusion detection systems for VANETs,” in 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2019, pp. 1-10: IEEE.
- H. Bangui and B. Buhnova, “Recent advances in machine-learning driven intrusion detection in transportation: Survey,” Procedia Computer Science, vol. 184, pp. 877-886, 2021. [CrossRef]
- C. Paar and J. Pelzl, Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media, 2009.
- M. Raya and J.-P. Hubaux, “The security of vehicular ad hoc networks,” in Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005, pp. 11-21.
- H. N. Noura, O. Salman, R. Couturier, and A. Chehab, “LoRCA: Lightweight round block and stream cipher algorithms for IoV systems,” Vehicular Communications, vol. 34, p. 100416, 2022. [CrossRef]
- A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of CRYPTO 84 4, 1985, pp. 47-53: Springer.
- D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings, 2001, pp. 213-229: Springer.
- C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” in IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2008, pp. 246-250: IEEE.
- C. Zhang, P.-H. Ho, and J. Tapolcai, “On batch verification with group testing for vehicular communications,” Wireless Networks, vol. 17, pp. 1851-1865, 2011. [CrossRef]
- T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li, “SPECS: Secure and privacy enhancing communications schemes for VANETs,” Ad Hoc Networks, vol. 9, no. 2, pp. 189-203, 2011.
- K.-A. Shim, “CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks,” IEEE transactions on vehicular technology, vol. 61, no. 4, pp. 1874-1883, 2012. [CrossRef]
- C.-C. Lee and Y.-M. Lai, “Toward a secure batch verification with group testing for VANET,” Wireless networks, vol. 19, pp. 1441-1449, 2013. [CrossRef]
- M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, “A secure authentication scheme for VANETs with batch verification,” Wireless networks, vol. 21, pp. 1733-1743, 2015. [CrossRef]
- S.-F. Tzeng, S.-J. Horng, T. Li, X. Wang, P.-H. Huang, and M. K. Khan, “Enhancing security and privacy for identity-based batch verification scheme in VANETs,” IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3235-3248, 2015. [CrossRef]
- I. Ali and F. Li, “An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs,” Vehicular Communications, vol. 22, p. 100228, 2020. [CrossRef]
- S. O. Ogundoyin and I. A. Kamil, “An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy,” Vehicular Communications, vol. 31, p. 100384, 2021. [CrossRef]
- S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Asiacrypt, 2003, vol. 2894, pp. 452-473: Springer.
- H. Zhong, S. Han, J. Cui, J. Zhang, and Y. Xu, “Privacy-preserving authentication scheme with full aggregation in VANET,” Information Sciences, vol. 476, pp. 211-221, 2019. [CrossRef]
- Q. Mei, H. Xiong, J. Chen, M. Yang, S. Kumari, and M. K. Khan, “Efficient certificateless aggregate signature with conditional privacy preservation in IoV,” IEEE Systems Journal, vol. 15, no. 1, pp. 245-256, 2020. [CrossRef]
- J. Qi, T. Gao, X. Deng, and C. Zhao, “A pseudonym-based certificateless privacy-preserving authentication scheme for VANETs,” Vehicular Communications, vol. 38, p. 100535, 2022. [CrossRef]
- S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan, “An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks,” Information Sciences, vol. 317, pp. 48-66, 2015. [CrossRef]
- J. Li, H. Yuan, and Y. Zhang, “Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks,” Cryptology ePrint Archive, 2016.
- Y. Zhao, Y. Hou, L. Wang, S. Kumari, M. K. Khan, and H. Xiong, “An efficient certificateless aggregate signature scheme for the Internet of Vehicles,” Transactions on Emerging Telecommunications Technologies, vol. 31, no. 5, p. e3708, 2020. [CrossRef]
- Y. Ming and X. Shen, “PCPA: A practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks,” Sensors, vol. 18, no. 5, p. 1573, 2018. [CrossRef]
- J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu, “An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks,” Information Sciences, vol. 451, pp. 1-15, 2018. [CrossRef]
- I. A. Kamil, S. O. Ogundoyin, and applications, “An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks,” Journal of information security, vol. 44, pp. 184-200, 2019.
- C. Li, G. Wu, L. Xing, F. Zhu, and L. Zhao, “An efficient certificateless aggregate signature scheme designed for VANET,” %J Computers, Materials Continua vol. 63, no. 2, pp. 725-742, 2020.
- A. K. Malhi and S. Batra, “An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks,” Discrete Mathematics Theoretical Computer Science vol. 17, no. Distributed Computing and Networking, 2015. [CrossRef]
- P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam, “Secure CLS and CL-AS schemes designed for VANETs,” the journal of supercomputing, vol. 75, pp. 3076-3098, 2019. [CrossRef]
- Y. Zhang, R. H. Deng, G. Han, and D. Zheng, “Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things,” Journal of Network Computer Applications vol. 123, pp. 89-100, 2018. [CrossRef]
- Z. Xu, D. He, N. Kumar, and K.-K. R. Choo, “Efficient certificateless aggregate signature scheme for performing secure routing in VANETs,” J Security Communication Networks vol. 2020, pp. 1-12, 2020. [CrossRef]





| Notation | Definition |
|---|---|
| CA | Central Authority |
| CRT | Chinese Remainder Theorem |
| C-ITS | Cooperative Intelligent Transportation Systems |
| CL | Certificateless (Schemes) |
| CLAS | Certificateless Aggregate Signature (Schemes) |
| CPPA | Conditional Privacy Preserving Authentication |
| DSRC | Dedicated Short Range Communications |
| EC(C) | Elliptic Curve (Cryptography) |
| ECDLP | Elliptic Curve Discrete Logarithm Problem |
| GS | Group Signature |
| IBC | Identity Based Cryptography |
| IBV | Identity Based Batch-Verification (Schemes) |
| KGC | Key Generation Center |
| MAC | Message Authentication Code |
| OBU | On Board Unit |
| PKI | Public Key Infrastructure |
| PID | Pseudo Identity |
| PWD | Password |
| RID | Real Identity |
| RSU | Road Side Unit |
| TA/TTP | Trusted Authority/Trusted Third Party |
| TPD | Tamper Proof Device |
| TRA/TRM | Tracing Authority/Tracing Manager |
| VANET | Vehicular Adhoc Network |
| V2I | Vehicle-to-Infrastructure |
| V2V | Vehicle-to-Vehicle |
| V2X | Vehicle-to-Everything |
| Requirement | Description | Attacks | Protection |
|---|---|---|---|
| Availability | Timely arrival of critical information | Denial of service, spamming Blackhole, greyhole Malware |
Frequency hopping Channel Switching IDS |
| Authentication | Messages are sent by a legitimate user | Impersonation Sybil Wormhole, tunneling |
Digital Signatures MAC Tags IDS |
| Integrity | Message contents have not been modified | Message/broadcast tampering Replay |
Digital Signatures MAC Tags |
| Conditional Privacy | Only authorized entities have access to user identity | Location extraction attacks ID disclosure attacks |
Pseudonyms Group Signatures |
| Non-repudiation | Sender cannot deny having sent the message | Repudiation attacks | Public Key Cryptography |
| Confidentiality | Third party cannot extract meaningful information from any message | Eavesdropping Traffic Analysis |
Encryption |
| Phase | Scheme | Comments |
|---|---|---|
![]() | ||
| Phase | Scheme | Comments |
|---|---|---|
| Setup: TA= KGC+TRM |
, defines | Cyclic groups of order respectively |
| defined over finite field by the equation , | and . We take point to be the generator of | |
| KGC’s secret key | ||
| KGC computes | generator of elliptic curve | |
| TRM randomly chooses | TRM’s secret key | |
| TRM computes | ||
| PID Generation |
pseudonym validity time Note: TRM can compute: |
|
|
generates as: , | ||
| PPK Gen. | ||
| to securely | partial private key of vehicle | |
| checks: | ||
| USK Gen | randomly chooses | user secret key of vehicle |
| Re-computable by verifier | ||
| the public key of | ||
| Signing | randomly chooses | |
| computes | ||
| Message | ||
| Signature | ||
| sends: | ||
| Verifying | such that | Mitigates replay attacks |
| (Proof: LHS: → RHS) | ||
| Agg. sign | , , , | |
| for freshness | ||
| randomly chooses | here is the receiver/verifier | |
| computes | ERROR: should be | |
| computes | ||
| computes | ||
| Batch Verify | computes | pair |
| computes | ||
| checks if (Proof: LHS: → RHS) | ||
| computes (Proof: LHS →RHS) | ||
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

