An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm
https://doi.org/10.17586/2226-1494-2025-25-4-755-761
Abstract
Authentication is a critical challenge in autonomous vehicles, particularly within Controller Area Networks which are prone to various cyber threats. Existing protocols often fall short in balancing strong security guarantees with computational efficiency and privacy preservation. In this paper, we propose a lightweight authentication protocol based on the Decisional Diffie–Hellman problem, specifically designed for Controller Area Network environments. The protocol employs lightweight cryptographic operations to verify vehicle authenticity and validate data messages, while also maintaining anonymity by regularly updating login identities. It also supports password changes without requiring a trusted third party. The protocol security is formally verified using Burrows-Abadi-Needham logic. Performance evaluation shows that our approach significantly reduces computational overhead, achieving an execution time of 0.90908 ms, outperforming existing solutions in the literature. By combining formal verification with practical efficiency, the proposed protocol offers a robust solution for secure and efficient authentication in resource-constrained vehicular networks. Its lightweight design and anonymity-preserving mechanisms make it particularly suitable for real-time autonomous vehicle applications.
Keywords
About the Authors
Muhammad Salman SaeedRussian Federation
Muhammad Salman Saeed, PhD Student
197101; Saint Petersburg
sc 57886147100
S. V. Bezzateev
Russian Federation
Sergey V. Bezzateev, D.Sc., Associate Professor, Head of Department, Director of Laboratory
190000; 197101; Saint Petersburg
sc 6602425996
References
1. Miller J. Vehicle-to-vehicle-to-infrastructure (V2V2I) intelligent transportation system architecture. Proc. of the IEEE Intelligent Vehicles Symposium, 2008, pp. 715–720. doi: 10.1109/ivs.2008.4621301
2. Bagga P., Das A.K., Wazid M., Rodrigues J.J.P.C., Park Y. Authentication protocols in Internet of Vehicles: taxonomy, analysis, and challenges. IEEE Access, 2020, vol. 8, pp. 54314–54344. doi: 10.1109/ACCESS.2020.2981397
3. Cheng X., Yang L., Shen X. D2D for intelligent transportation systems: a feasibility study. IEEE Transactions on Intelligent Transportation Systems, 2015, vol. 16, no. 4, pp. 1784–1793. doi: 10.1109/TITS.2014.2377074
4. Lo N.-W., Tsai J.-L. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 2016, vol. 17, no. 5. pp. 1319–1328. doi: 10.1109/TITS.2015.2502322
5. Nandy T., Idris M.Y.I., Noor R.M., Wahab A.W.A., Bhattacharyya S., Kolandaisamy R., Yahuza M. A secure, privacy-preserving, and lightweight authentication scheme for VANETs. IEEE Sensors Journal, 2021, vol. 21, no. 18, pp. 20998–21011. doi: 10.1109/JSEN.2021.3097172
6. Manivannan D., Moni S.S., Zeadally S. Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Vehicular Communications, 2020, vol. 25, pp. 100247. doi: 10.1016/j.vehcom.2020.100247
7. Jan S.A., Amin N.U., Othman M., Ali M., Umar A.I., Basir A. A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues. IEEE Access, 2021, vol. 9, pp. 153701–153726. doi: 10.1109/ACCESS.2021.3125521
8. Ying B., Nayak A. Anonymous and lightweight authentication for secure vehicular networks. IEEE Transactions on Vehicular Technology, 2017, vol. 66, no. 12, pp. 10626–10636. doi: 10.1109/TVT.2017.2744182
9. Saxena N., Choi B.J., Cho S. Lightweight privacy-preserving authentication scheme for V2G networks in the smart grid. Proc. of the IEEE Trustcom/BigDataSE/ISPA, 2015, pp. 604–611. doi: 10.1109/Trustcom.2015.425
10. Lee J., Kim G., Das A.K., Park Y. Secure and efficient honey list-based authentication protocol for Vehicular Ad Hoc Networks. IEEE Transactions on Network Science and Engineering, 2021, vol. 8, no. 3, pp. 2412–2425. doi: 10.1109/TNSE.2021.3093435
11. Li S., Yang R., Chen J. A privacy-preserving authentication scheme for VANETs with exculpability. Security and Communication Networks, 2023, vol. 2023, no. 1, pp. 8676929. doi: 10.1155/2023/8676929
12. Parmar K., Patil S., Patel D., Patel V., Parikh B., Padaria P. Privacy-preserving authentication scheme for VANETs using blockchain technology. Procedia Computer Science, 2023, vol. 220, pp. 40–47. doi: 10.1016/j.procs.2023.03.008
13. Vasudev H., Deshpande V., Das D., Das S.K. A lightweight mutual authentication protocol for V2V communication in internet of vehicles. IEEE Transactions on Vehicular Technology, 2020, vol. 69, no. 6, pp. 6709–6717. doi: 10.1109/TVT.2020.2986585
14. Zhou L., Chao H.C. Multimedia traffic security architecture for the internet of things. IEEE Network, 2011, vol. 25, no. 3, pp. 35–40. doi: 10.1109/MNET.2011.5772059
15. Burrows M., Abadi M., Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990, vol. 8, no. 1, pp. 18–36. doi: 10.1145/77648.77649
16. Mun H., Han K., Lee Y.S., Yeun C.Y., Choi H.H. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 2012, vol. 55, no. 1–2, pp. 214–222. doi: 10.1016/j.mcm.2011.04.036
17. Zhao D., Peng H., Li L., Yang Y. A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 2014, vol. 78, no. 1, pp. 247–269. doi: 10.1007/s11277-014-1750-y
18. Cui J., Yu J., Zhong H., Wei L., Liu L. Chaotic map-based authentication scheme using physical unclonable function for internet of autonomous vehicle. IEEE Transactions on Intelligent Transportation Systems, 2023, vol. 24, no. 3, pp. 3167–3181. doi: 10.1109/TITS.2022.3227949
Review
For citations:
Saeed M.S., Bezzateev S.V. An improved authentication protocol for self-driving vehicles based on Diffie–Hellman algorithm. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2025;25(4):755-761. https://doi.org/10.17586/2226-1494-2025-25-4-755-761