Ikram Ali Yong Chen Mohammad Faisal Meng Li Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks · · · Ikram Ali Yong Chen Mohammad Faisal Meng Li Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks IkramAli YongChen SchoolofAutomationEngineering SchoolofAutomationEngineering UniversityofElectronicScience UniversityofElectronicScience andTechnologyofChina andTechnologyofChina Chengdu,Sichuan,China Chengdu,Sichuan,China MohammadFaisal MengLi DepartmentofCS&IT SchoolofAutomationEngineering UniversityofMalakand UniversityofElectronicScience KhyberPakhtunkhwa,Pakistan andTechnologyofChina Chengdu,Sichuan,China ISBN978-981-16-8585-9 ISBN978-981-16-8586-6 (eBook) https://doi.org/10.1007/978-981-16-8586-6 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature SingaporePteLtd.2022 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore Acknowledgements Firstofall,IwouldliketothankAllahAlmighty,whoenabledmetocompletethis Book. My sincere most gratitude goes to my academic advisors for their prolific support,consistentencouragement,guidance,andmotivationduringmystudyatthe UniversityofElectronicScienceandTechnologyofChina.Iwouldalsoliketothank myfamilymembers,especiallymylatemotherforrememberingmeinherprayers andsupportingandencouragingme.Ialsothankmyfriendsandcolleaguesinthe labfortheirhelpandsupport,withwhomIspentalotofenjoyableandmemorable time.ThisworkissupportedbytheNationalNaturalScienceFoundationofChina under grant no. 61973331 and no. 61973257 and the National Key Research and Development Plan Programs of China under grant no. 2018YFB0106101, and the ChinaPostdoctoralScienceFoundationundergrantno.2021M690550. v Contents 1 Introduction ................................................... 1 1.1 ModesofCommunicationinVANETs ......................... 2 1.2 ChallengesinVANETs ...................................... 3 1.3 StatementoftheWork ...................................... 4 1.4 LiteratureReview .......................................... 4 1.4.1 PKI-BasedSignatureSchemes ......................... 5 1.4.2 IDC-BasedSignatureSchemes ......................... 7 1.4.3 CLC-BasedSchemes ................................. 13 1.5 ObjectivesoftheBook ...................................... 16 1.6 OrganizationoftheBook .................................... 19 References ..................................................... 20 2 Preliminaries .................................................. 27 2.1 PublicKeyCryptography .................................... 27 2.1.1 DigitalSignature ..................................... 27 2.1.2 PublicKeyInfrastructure .............................. 28 2.1.3 Identity-BasedCryptography .......................... 29 2.1.4 CertificatelessCryptography ........................... 30 2.2 Signcryption ............................................... 32 2.3 AnOverviewonVANETs ................................... 33 2.3.1 TypesofAttackers ................................... 33 2.3.2 TypesofAttacks ..................................... 34 2.3.3 SecurityRequirements ................................ 34 2.3.4 PerformanceRequirements ............................ 35 2.4 MathematicalBackground ................................... 35 2.4.1 EllipticCurveCryptosystem(ECC) ..................... 36 2.4.2 BilinearPairing ...................................... 36 2.4.3 ComputationalAssumptions ........................... 37 2.4.4 HashFunctions ...................................... 38 2.5 RandomOracleModel(ROM) ............................... 39 2.6 SecurityNotions ........................................... 39 vii viii Contents 2.6.1 GoalsoftheAdversary ............................... 39 2.6.2 PoweroftheAdversary ............................... 40 2.7 CryptographicLibraries ..................................... 41 2.8 Summary .................................................. 41 References ..................................................... 41 3 Authentication Scheme for Vehicle-to-Infrastructure CommunicationsusingBilinearPairing .......................... 43 3.1 SystemModel ............................................. 44 3.2 SecurityRequirements ...................................... 46 3.3 SyntaxandSecurityNotion .................................. 46 3.3.1 Syntax .............................................. 46 3.3.2 SecurityNotion ...................................... 47 3.4 ID-CPPASignatureScheme .................................. 47 3.4.1 Setup ............................................... 48 3.4.2 PIDGen ............................................ 50 3.4.3 KeyGen ............................................ 50 3.4.4 MsgSign ............................................ 51 3.4.5 SigVerify ........................................... 51 3.4.6 BSigVerify .......................................... 52 3.5 SecurityAnalysis ........................................... 53 3.5.1 SecurityProof ....................................... 53 3.5.2 SecurityRequirements ................................ 56 3.6 PerformanceAnalysis ....................................... 59 3.6.1 ComputationalCost .................................. 59 3.6.2 Communication/StorageCost .......................... 63 3.7 Summary .................................................. 64 References ..................................................... 65 4 AuthenticationSchemeforVehicle-to-VehicleCommunications usingECC ..................................................... 67 4.1 SystemModel ............................................. 68 4.2 SecurityRequirements ...................................... 70 4.3 SyntaxandSecurityNotion .................................. 70 4.3.1 Syntax .............................................. 70 4.3.2 SecurityNotion ...................................... 71 4.4 IDS-CPPAScheme ......................................... 72 4.4.1 Setup ............................................... 72 4.4.2 Vehicle-AID-GenerationandVehicle-Key-Generation ..... 73 4.4.3 Message-Signing .................................... 75 4.4.4 Individual-Signature-Verification ....................... 75 4.4.5 Batch-Signature-Verification ........................... 76 4.5 SecurityAnalysis ........................................... 77 4.5.1 SecurityProof ....................................... 77 4.5.2 SecurityRequirements ................................ 81 4.6 PerformanceAnalysis ....................................... 83 Contents ix 4.6.1 ComputationalCost .................................. 83 4.6.2 Communication/StorageCost .......................... 87 4.7 Summary .................................................. 88 References ..................................................... 88 5 Certificateless Signature-Based Authentication Scheme forVehicle-to-InfrastructureCommunicationsUsingBilinear Pairing ........................................................ 91 5.1 SystemModel ............................................. 93 5.2 SecurityRequirements ...................................... 94 5.3 SyntaxandSecurityNotions ................................. 95 5.3.1 Syntax .............................................. 95 5.3.2 SecurityNotions ..................................... 95 5.4 CL-PKSScheme ........................................... 97 5.4.1 Setup ............................................... 97 5.4.2 PIDGen ............................................ 99 5.4.3 PPKGen ............................................ 100 5.4.4 SPKGen ............................................ 100 5.4.5 CLSigGen .......................................... 101 5.4.6 CLSigVerify ........................................ 101 5.5 CL-PKSAggregationandVerification ......................... 103 5.5.1 ACLSigGen ......................................... 103 5.5.2 ACLSigVerify ....................................... 103 5.6 SecurityAnalysis ........................................... 104 5.6.1 SecurityProof ....................................... 104 5.6.2 SecurityRequirements ................................ 111 5.7 PerformanceAnalysis ....................................... 112 5.7.1 ComputationalCost .................................. 112 5.7.2 Communication/StorageCost .......................... 116 5.8 Summary .................................................. 117 References ..................................................... 117 6 AnECC-BasedConditionalPrivacy-PreservingAuthentication SchemeforVehicle-to-VehicleCommunications ................... 121 6.1 SystemModel ............................................. 123 6.2 SecurityRequirements ...................................... 124 6.3 FrameworkoftheScheme ................................... 125 6.3.1 GenericModel ...................................... 125 6.3.2 SecurityNotions ..................................... 125 6.4 CLSS-CPPAScheme ....................................... 127 6.4.1 Setup ............................................... 127 6.4.2 RegAIDGen ......................................... 128 6.4.3 PSKGen ............................................ 129 6.4.4 SPKGen ............................................ 130 6.4.5 CLSGen ............................................ 130 6.4.6 CLSVerify .......................................... 131 x Contents 6.4.7 BCLSVerify ......................................... 131 6.5 SecurityAnalysis ........................................... 132 6.5.1 SecurityProof ....................................... 132 6.5.2 SecurityRequirements ................................ 137 6.6 PerformanceEvaluation ..................................... 139 6.6.1 ComputationalCost .................................. 139 6.6.2 Communication/StorageCost .......................... 144 6.7 ConclusionandFutureWork ................................. 144 References ..................................................... 145 7 Bilinear Pairing-Based Signcryption Scheme for Secure Heterogeneous Vehicle-to-Infrastructure Communications inVANETs .................................................... 147 7.1 SystemModel ............................................. 150 7.2 SecurityRequirements ...................................... 151 7.2.1 MathematicalHardProblemsandAssumptions ........... 151 7.3 FormalFrameworkandSecurityNotions ...................... 152 7.3.1 Framework .......................................... 152 7.3.2 SecurityNotions ..................................... 153 7.4 CPP-HSCScheme .......................................... 154 7.4.1 Setup ............................................... 155 7.4.2 IDC-PIDKG ........................................ 156 7.4.3 PKI-KG ............................................ 156 7.4.4 Signcrypt ........................................... 156 7.4.5 Unsigncrypt ......................................... 157 7.5 SecurityProof ............................................. 159 7.6 PerformanceAnalysis ....................................... 166 7.6.1 ComputationalCost .................................. 167 7.6.2 Communication/StorageCost .......................... 170 7.7 ConclusionandFutureWork ................................. 171 References ..................................................... 171 8 ECC-Based Hybrid Signcryption Protocol for Secure HeterogeneousVehicle-to-InfrastructureCommunications ......... 175 8.1 SystemModel ............................................. 177 8.1.1 SecurityRequirements ................................ 178 8.2 FormalSyntaxandSecurityNotions .......................... 178 8.2.1 Syntax .............................................. 178 8.2.2 SecurityNotions ..................................... 179 8.3 ECCHSCProtocol .......................................... 180 8.3.1 Setup ............................................... 180 8.3.2 IDC-KeyGen ........................................ 181 8.3.3 PKI-KeyGen ........................................ 182 8.3.4 Signcrypt ........................................... 183 8.3.5 De-Signcrypt ........................................ 183 8.4 SecurityAnalysis ........................................... 185 Contents xi 8.4.1 SecurityProof ....................................... 185 8.4.2 SecurityRequirements ................................ 190 8.5 PerformanceAnalysis ....................................... 191 8.5.1 ComputationalOverhead .............................. 192 8.5.2 Communication/StorageOverhead ..................... 194 8.6 Application ................................................ 197 8.7 ConclusionandFutureWork ................................. 198 References ..................................................... 199 9 CLC- and PKI-based Hybrid Signcryption Scheme Using Bilinear Pairing for Secure Heterogeneous Vehicle-to-InfrastructureCommunications ....................... 201 9.1 SystemModel ............................................. 203 9.2 SecurityRequirements ...................................... 205 9.3 ComputationalAssumptions ................................. 205 9.4 FormalFrameworkandSecurityNotions ...................... 205 9.4.1 Framework .......................................... 205 9.4.2 SecurityNotions ..................................... 206 9.5 CP-CPPHSCScheme ....................................... 209 9.5.1 Setup ............................................... 209 9.5.2 CLC-AIDPSKG ..................................... 211 9.5.3 CLC-SPKG ......................................... 211 9.5.4 PKI-SPKG .......................................... 212 9.5.5 SC ................................................. 212 9.5.6 USC ............................................... 212 9.6 SecurityProof ............................................. 214 9.7 PerformanceAnalysis ....................................... 223 9.7.1 ComputationalCost .................................. 223 9.7.2 Communication/StorageCost .......................... 226 9.8 ConclusionandFutureWork ................................. 228 References ..................................................... 228