Skip to main navigation Skip to search Skip to main content

PV+TESLA: a secure integrated approach to reduce message verification delay in V2V networks

  • Birmingham City University

Research output: Contribution to journalArticlepeer-review

Abstract

Vehicle-to-Vehicle (V2V) broadcast communication plays a crucial role in ensuring road safety in Intelligent Transport System (ITS) domain, but ensuring the authenticity and integrity of exchanged messages used by safety applications presents challenges. While the Timed Efficient Stream Loss-tolerant Authentication (TESLA) offers low computation overhead as it is primarily built on symmetric cryptographic primitives like MAC and hash chain technique, its inherent authentication delay may exceed the tolerable latency for future safety applications. To address these issues, we propose the Prompt Verification (PV) model, a modified version of TESLA which eliminates authentication delay by broadcasting the verification key with the message. Although the PV model provides benefits such as faster message verification and prevention of memory-based DoS attacks, it introduces a vulnerability exploitable by malicious users. To mitigate this vulnerability, we conduct a comprehensive analysis, evaluating its significance through a developed threat model and risk analysis framework. Our findings underscore the substantial risk posed by impersonation attacks, which could endanger lives and property. To counter these risks, we propose to integrate PV with TESLA, complemented by RSSI based message consistency checking scheme (RMCCS) for enhanced lightweight false message detection. Simulation results demonstrate an 85% reduction in authentication delays compared with standard TESLA and existing schemes, along with increased resilience against impersonation attacks. The PV+TESLA model, integrated with RMCCS, offers a robust solution for securing safety messages in V2V broadcast communication systems, showcasing its practical viability and effectiveness.

Original languageEnglish
Article number32
Number of pages36
JournalJournal of Network and Systems Management
Volume33
Issue number2
DOIs
Publication statusPublished - 15 Feb 2025

Keywords

  • Authentication
  • Impersonation attack
  • Latency
  • V2V communications
  • Verification
  • Vulnerability

ASJC Scopus subject areas

  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications
  • Strategy and Management

Fingerprint

Dive into the research topics of 'PV+TESLA: a secure integrated approach to reduce message verification delay in V2V networks'. Together they form a unique fingerprint.

Cite this