Efficient Distributed Authentication for Intelligent Transportation Systems Using Mobile Devices

Date

2024-03-27

Department

Program

Citation of Original Publication

Alshaeri, Abdulaziz, and Mohamed Younis. “Efficient Distributed Authentication for Intelligent Transportation Systems Using Mobile Devices.” IEEE Transactions on Intelligent Transportation Systems, 2024, 1–16. https://doi.org/10.1109/TITS.2024.3376517.

Rights

© 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Abstract

Intelligent Transportation Systems (ITS) opt to improve safety and efficiency by internetworking vehicles, road infrastructure, pedestrians, etc. Given the ad-hoc connectivity and dynamic topology of such a network, robust authentication of member nodes is essential. The authentication process should also suit the resource constrained ITS nodes. This paper proposes an efficient approach for Distributed Authentication for ITS (DAITS). DAITS employs drivers’ mobile devices to act as verifiers, and hence message authentication is provided in an as-a-service basis for the ITS nodes. Moreover, DAITS is a certificateless system, which deploys private smart contracts in a permissioned blockchain, for certifying nodes. Furthermore, the smart contracts store authentication tokens for the ITS nodes which ensure authentication between the ITS nodes and road infrastructure. DAITS relies on lightweight security primitives such as hash function, bitwise XOR, and Hash-based Message Authentication Code (HMAC). Extensive security analysis shows that DAITS can resist various security attacks. The simulation results demonstrate that DAITS is both resource-efficient and scalable, and outperforms competing schemes in terms of computation and communication overhead, and verification delay.