Cryptanalysis and Secure Redesign of a Fog-Based Mutual Authentication Protocol for the Social Internet of Vehicles
Keywords:
Social Internet of vehicles, Authentication, Fog-Enabled NetworksAbstract
Li et al. proposed a provably secure and lightweight mutual authentication protocol for fog-enabled Social Internet of Vehicles, claiming resistance to various attacks, including offline password guessing and insider threats. However, upon thorough analysis, we identified several vulnerabilities in their scheme, such as susceptibility to insider attacks and offline password guessing. In response, we present a set of recommendations aimed at strengthening the protocol and addressing the identified weaknesses.
Downloads
References
Ahmed S, Kumari S, Saleem MA, et al. Anonymous key-agreement protocol for V2G environment within social internet of vehicles. IEEE Access 2020; 8: 119829–119839.
Alam KM, Saini M, El Saddik A. Toward social Internet of vehicles: concept, architecture, and applications. IEEE Access 2015; 3: 343–357.
Atzori L, Iera A and Morabito G. SIoT: giving a social structure to the internet of things. IEEE Commun Lett 2011; 15(11): 1193–1195.
Atzori L, Iera A, Morabito G, et al. The social Internet of things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw 2012; 56(16): 3594–3608.
Butt TA, Iqbal R, Shah SC, et al. social internet of vehicles: architecture and enabling technologies. Comput Electr Eng 2018; 69: 68–84.
Chandrakar P, Jain A, Balivada S, et al. A secure authentication protocol for vehicular ad-hoc networks. In: 2019 IEEE international conference on electrical, computer and communication technologies (ICECCT), Coimbatore, India, 20–22 February 2019, pp.1–7. New York: IEEE.
Chen, C., Chen, Z., Kumari, S., Obaidat, M., Rodrigues, J. & Khan, M. Blockchain Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment. IEEE Internet Of Things Journal. (2024)
Chen, C., Guo, H., Wu, Y., Gao, Y. & Liu, J. A novel two-factor multi-gateway authentication protocol for WSNs. Ad Hoc Networks. 141 pp. 103089 (2023)
Contreras-Castillo J, Zeadally S, Guerrero-Ibañez JA. Internet of vehicles: architecture, protocols, and security. IEEE Internet Things 2017; 5(5): 3701–3709.
Dandala TT, Krishnamurthy V, Alwan R. Internet of vehicles (IoV) for traffic management. In: 2017 international conference on computer, communication and signal processing (ICCCSP), Chennai, India, 10–11 January 2017, pp.1–4. New York: IEEE.
Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198-208.
Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23 (pp. 523-540). Springer Berlin Heidelberg.
Ferrag MA, Maglaras LA, Janicke H, et al. Authentication protocols for internet of things: a comprehensive survey. Secur Commun Netw 2017; 2017: 6562953.
Gupta et al. proposed a lightweight, load balancing, scalable, and decentralized framework for IoV. This framework opens new research directions where researchers are looking forward to a lightweight blockchain based framework for IoV. (2022)
Gupta et al. designed an advanced protocol supporting security functionalities, including unlikability, conditional-traceability, anti-replay, and data authenticity. This protocol is better in terms of energy consumption, data computations, communications, and cryptographic key storage overhead. (2022)
H. Sikarwar and D. Das, “SMMAP: Secure MAC-Based Mutual Authentication Protocol for IoV,” in Proceedings of the 24th International Conference on Distributed Computing and Networking (New York, NY: Association for Computing Machinery, 2023), 330–335.
Li, Z., Miao, Q., Chaudhry, S. A., & Chen, C. M. (2022). A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. International Journal of Distributed Sensor Networks, 18(6), 15501329221104332.
Maglaras LA, Al-Bayatti AH, He Y, et al. Social Internet of vehicles for smart cities. J Sens Actuator Netw 2016; 5(1): 3.
Nitti M, Atzori L, Cvijikj IP. Friendship selection in the social Internet of things: challenges and possible strategies. IEEE Internet Things 2014; 2(3): 240–247.
Park K, Park Y, Das AK, et al. A dynamic privacy-preserving key management protocol for V2G in social Internet of things. IEEE Access 2019; 7: 76812–76832.
Shen et al. [26] proposed a framework supporting both security and efficiency well. The protocol ensures authentication among moving nearby vehicles, edge nodes, and the central cloud.
Sun Y, Wu L, Wu S, et al. Security and privacy in the Internet of vehicles. In: 2015 international conference on identification, information, and knowledge in the Internet of Things (IIKI), Beijing, China, 22–23 October 2015, pp.116–121. New York: IEEE.
Wu TY, Guo X, Yang L, et al. A lightweight authenticated key agreement protocol using fog nodes in social Internet of vehicles. Mob Inf Syst 2021; 2021: 3277113.
Xu Z, Liang W, Li KC, et al. A blockchain-based roadside unit-assisted authentication and key agreement protocol for Internet of vehicles. J Parallel Distr Com 2021; 149: 29–39.
Yang F, Wang S, Li J, et al. An overview of Internet of vehicles. China Commun 2014; 11(10): 1–15
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.