EconPapers    
Economics at your fingertips  
 

Privacy-Preserving Authentication Based on PUF for VANETs

Lihui Li, Hanwen Deng, Zhongyi Zhai and Sheng-Lung Peng ()
Additional contact information
Lihui Li: School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
Hanwen Deng: School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
Zhongyi Zhai: School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
Sheng-Lung Peng: Department of Creative Technologies and Product Design, National Taipei University of Business, Taoyuan City 324022, Taiwan

Future Internet, 2024, vol. 16, issue 9, 1-17

Abstract: The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks. To resist physical attacks, we propose a physical-preserving authentication based on a physical unclonable function for vehicular ad hoc networks. In the proposed scheme, a physical unclonable function is deployed on the vehicle and the RSU to provide a challenge–response mechanism. A secret key is only generated by the challenge–response mechanism when it is needed, which eliminates the need to store a long-term secret key. As a result, this prevents secret keys from being captured by adversaries, improving system security. In addition, route planning is introduced into the proposed scheme so that a vehicle can obtain the authentication key of RSUs on its route before vehicle-to-infrastructure authentication, which greatly speeds up the authentication when the vehicle enters the RSUs’ coverage. Furthermore, a detailed analysis demonstrates that the proposed scheme achieves security objectives in vehicular ad hoc networks. Ultimately, when contrasted with similar schemes, the performance assessment demonstrates that our proposed scheme surpasses others in terms of computational overhead, communication overhead and packet loss rate.

Keywords: authentication; physical-preserving; physical unclonable function; route planning (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/16/9/326/pdf (application/pdf)
https://www.mdpi.com/1999-5903/16/9/326/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:16:y:2024:i:9:p:326-:d:1473826

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:16:y:2024:i:9:p:326-:d:1473826