Today, cities are becoming smart cities; one of the important factors is smart vehicles [1]. Intelligent transportation is one of the key factors in this change, one of the hot topics in smart transportation is the Internet of vehicles (IoV)[2], the (IoV) is equipped with the Internet and can communicate with the outside world (infrastructures [3], roadside units [4], mobile devices, applications, services, etc.)[5]. Applications can be routing, parking access, safety, global positioning systems (GPS). The attractive feature of IoV connection with components such as infrastructure, roadside units (RSU), sensors[6].
In intelligent driving, the sender and receiver must verify each other's identity before sending and receiving data. One of the major challenges in intelligent driving is secure authentication.
Mun et al. [7], in 2011, the presentation of scheme Enhanced secure, the anonymous authentication scheme for roaming service in global mobility networks, was based on symmetric encryption. However, this scheme is vulnerable to rainbow table attack. A secure and effective anonymous authentication scheme for roaming service in global mobility networks was presented by Zhao et al. [8] in the year 2014. This method is based on asymmetric encryption and hash. However, it is vulnerable to a rainbow table attack. Mohit et al. [9] Design of authentication protocol for wireless sensor network-based smart vehicular system in 2017. This scheme is based on hash and is vulnerable to rainbow table attack.
Ying et al.[10] in the year 2017, the presentation of anonymous and lightweight authentication for secure vehicular networks. This method is based on asymmetric encryption and hash. However, it is vulnerable to a rainbow table attack. Chen et al. [11] secure authentication protocol for Internet of vehicles in the year 2019. This method is based on symmetric encryption and hash. However, it is vulnerable to a rainbow table attack. A lightweight mutual authentication protocol for V2V communication on the Internet of vehicles was presented by Vasudev et al. [12] in the year 2020. However, it is vulnerable to a rainbow table attack. Table 1 shows the comparison-related works.
Table 1
Comparison of related work.
Related work
|
TTP (Fog Node ) Base
|
Rainbow table
|
Mutual Authentication
|
Symmetric Base
|
Asymmetric Base
|
Hash Base
|
Intelligent Driving
|
Mun et al. [7]
|
✔
|
x
|
✔
|
✔
|
x
|
✔
|
x
|
Zhao et al. [8]
|
✔
|
x
|
✔
|
x
|
✔
|
✔
|
x
|
Mohit et al. [9]
|
✔
|
x
|
✔
|
x
|
x
|
✔
|
x
|
Ying et al.[10]
|
✔
|
x
|
✔
|
✔
|
x
|
✔
|
x
|
Chen et al. [11]
|
✔
|
x
|
✔
|
✔
|
x
|
✔
|
x
|
Vasudev et al. [12]
|
✔
|
x
|
✔
|
x
|
x
|
✔
|
x
|
Proposed scheme
|
✔
|
✔
|
✔
|
x
|
✔
|
x
|
✔
|
✔: The scheme is supported. X: The scheme is not supported.
1.1 Our contribution
-
This paper proposed a secure mutual authentication scheme for the vehicle to vehicle.
-
In this scheme, we used the Asymmetric cryptography method.
-
The proposed scheme is resistant to known attacks in the environment.
-
The AVISPA tool was used for security analysis, and the proposed scheme was compared with another scheme in terms of computing communication costs and a number of bits.
-
The proposed scheme is simulated with the NS3 tool and examined in different Packet Delivery, Throughput, and End-to-End Delay scenarios.
1.2 Structure of the paper
This paper is organized as follows: Section 2 introduces the proposed scheme's problem statement and network model. Section 3 presents the proposed scheme. Security Analysis and result discussed in section 4. Performance analysis and Security requirements comparison has been presented in section 5. Finally, section 6 concludes this work.