Abstract
One of the most challenging issues in vehicular network designs is security matter. Particularly, there have been several potential attacks (e.g., message alteration, eavesdropping, privacy violation, and replay) on Vehicle to Infrastructure (V2I) communication. Most previous studies have based on Public Key Infrastructure (PKI) and authentication in broadcast services. By relying on the PKI solutions, cryptographic overhead and the management difficulties of public key certificates can be problematic. Furthermore, broadcast services can cause network flooding. Hence, this paper proposes a novel authentication scheme based on WAVE unicast services to reduce the PKI overhead between vehicles and Road Side Units (RSU). The new scheme is based on Pairwise Transient Key (PTK) procedures with a few extra authentication steps. To evaluate the new scheme, we have experimented on a Network Simulator (NS-2) under both city and highway scenarios. The experimental results have demonstrated that our new scheme introduces only small WAVE Short Message (WSM) delay. The new scheme is also flexible to use in various scenarios under different road situations.
1. Introduction
In recent years, vehicular networks have been investigated by academic researchers and industrial laboratories. The creation of vehicular networks is to provide connectivity among vehicles, resulting in road safety improvement and traffic management. These features are very significant in Intelligent Transport Systems (ITS). In a vehicular network, there are two wireless terminals, namely, Road Side Unit (RSU) and On-Board Unit (OBU). The RSUs may be connected with their infrastructures or other RSUs and located at important parts along roadside. The OBUs are wireless devices, equipped in vehicles to communicate with RSUs and other OBUs. To support ITS, the IEEE 802.11p Dedicated Short Range Communications (DSRC) [1] has been standardized for Wireless Access in Vehicular Environments (WAVE), including Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I). WAVE Short Message Protocol (WSMP) [2] specifies the format of WAVE Short Messages (WSM), exchanged over V2V and V2I.
Security issues in vehicular networks are very crucial due to the sensitivity of WAVE messages in daily life (e.g., accident alerting, traffic jam warning, and traffic light notification). A few malicious WSMs can even create an enormous damage to people and vehicles. Furthermore, privacy must be preserved to protect user private information (e.g., driver's name and license number). The privacy preservation requires some security schemes. Nevertheless, providing the WAVE security is still a challenging task due to the characteristics of vehicular networks (e.g., high speed mobility and large coverage area).
Generally, security schemes are considered separately between V2V and V2I [3] due to the differences of communication models. In particular, sender authentication, message integrity check, and message encryption for V2I have recently been focused by several previous studies. However, there are still several unsolved issues.
Most previous V2I authentication and privacy schemes [3–6] have mainly relied on broadcast communication, which causes network flooding. Boban et al. [7] have evaluated the achievable unicast performance over WAVE services under both city and highway environments. Their evaluation results have demonstrated that unicast communication has the ability to provide a reliable WAVE service and prevents the network flooding. Furthermore, Huang-Fu et al. [8] have proposed mechanisms based on the unicast service that can reduce 40–90 percent of network traffic overhead. However, there is no security scheme defined in all previous unicast-based mechanisms to protect against several security threats.
So far, there have been a lot of security protocols to prevent several potential attacks in vehicular networks, such as IEEE 1609.2 [9], GSIS [3], IBV [6], and so on. Yet, most of them still have some drawbacks. The IEEE 1609.2 standard with the support of Elliptic Curve Digital Signature Algorithm is designed to support security services on WAVE. However, cryptographic overhead and the management difficulties of public key certificates are still the big concerns [5, 10]. GSIS can only support the authentication between RSUs and the OBUs of some emergency vehicles. It has not been designed for the OBUs of any normal vehicles. In IBV, an OBU's private key is generated by a tamperproof device (deployed at each vehicle) to sign a message, lunched by an OBU. Yet, IBV has not defined a method to secure a message from an RSU.
Hence, in this paper, we mainly focus on V2I authentication scheme to solve the cryptographic overhead problem and the management difficulties of public key certificates problem. Furthermore, we focus on securing and authenticating WSMs from both directions (RSUs to OBUs and OBUs to RSUs). Our design is also based on WAVE unicast services to avoid network flooding. This work is also an extended work from our previous work in [11] to enhance the vehicle driver's privacy issues. To evaluate the flexibility of our scheme in different communication scenarios, we simulate our new design in both city and highway environments using NS-2.
The rest of this paper is organized as follows. We first introduce the background and related work in Section 2. In Section 3, our scheme is proposed. Section 4 analyzes our scheme in several security requirements including authentication, nonrepudiation, integrity, and availability. In Section 5, our scheme has been simulated and evaluated on NS-2. Finally, Section 6 concludes this paper.
2. Background and Related Work
2.1. Vehicular Network Communication
In vehicular networks, the IEEE 802.11p [1] has been standardized to support a wide range communication. The IEEE 802.11p is designed for DSRC radio to support WAVE data transmission in ranges up to 1,000 m with vehicle velocities in several environments (e.g., urban, highway, and rural). WAVE is a multichannel system that operates among one Control CHannel (CCH) and multiple Service CHannels (SCHs). WAVE management messages and WSMs are transmitted by using the CCH. IP data packets (e.g., Internet access, voice over IP, and video streaming) are transferred under a SCH. WSMs can also be delivered over both CCH and SCHs.
The WSMP is used to rapidly deliver a WSM for data transmission and a WAVE Service Advertisement (WSA) for signal controlling [2, 12]. The WSA is broadcasted to provide the information of available ITS services, offered by an RSU. A Provider Service Identifier (PSID) is used to identify each ITS service.
2.2. WAVE Unicast Services
In the WAVE unicast services, each ITS server must track the addresses of OBUs. Hence, a mobility management technique is also necessary for tracking.
Basic Mobility Management (BMM) and Location Estimation-based Mobility Management (LEMM) have been proposed to provide WAVE unicast services in [8, 13]. For BMM, all RSUs are partitioned into several Location Areas (LAs) [8]. The LA consists of one or more RSUs and it is identified by a Location Area Identity (LAI) [14]. A Location Server is deployed to maintain the RSUs and LAs mapping. In an LA, RSUs broadcast a WSA (PSID service) to OBUs. If the OBU has subscribed to the PSID service, it then identifies this service over the SCH. After that, the RSUs allocate radio resources to support this service operation. The OBU then sends a registration WSM under the unicast mode through the RSU to the Location Server. It then maps the OBU's MAC address to the LAI, which is covered within the RSU. Finally, this mapping information is stored in the Location Server's database. The Location Server can send WSMs to the OBU using this LAI. If the OBU enters a new LA, it performs another registration to update new LAI. For LEMM, positioning systems (e.g., GPS) are deployed to estimate the OBU's location of a high-speed vehicle.
Although both mechanisms can effectively reduce the network overhead of the broadcast behavior, there is no proposed authentication scheme to secure the unicast WSMs. So, it is vulnerable to several attacking techniques.
2.3. Security Issues between OBUs and RSUs
According to Raya et al. [10], vehicular networks are vulnerable to several security threats. In a communication without cryptographic mechanisms, an attacker can deliberately generate false information and transmit to victims. The attacker can also eavesdrop the victims' personal data. Furthermore, message modification, fabrication, and replay can cause misunderstanding to a victim. Hence, security schemes are very crucial to protect against all aforementioned problems.
The IEEE 1609.2 standard [9] is a set of security services for WSM data and applications. In the IEEE 1609.2, security systems rely on Public Key Infrastructure (PKI) with the support of Elliptic Curve Digital Signature Algorithm (ECDSA). However, an RSU can communicate with hundreds of OBUs in a high density traffic road, in which there may be roughly 180 vehicles keeping within the RSU's coverage area [6]. So, the management difficulties of public key certificates under PKI may be unacceptable. In addition, driver identification, certificate revocation, cryptography overhead, and privacy protection are additional concerns about the standard. Moreover, the hardware costs would be very expensive to verify a digital signature for every incoming message [4].
Lin et al. [3] have proposed a security protocol (viz., GSIS), based on a group signature and an identity-based signature. The group-based signature is deployed to provide security in V2V, while the identity-based is deployed to secure communication in V2I. This protocol integrates identity-based signature [15] to sign messages, lunched by RSUs. After receiving the messages, OBUs verify the signature to ensure its authenticity. However, the protocol is not defined how to verify messages created by general OBUs. In fact, the general OBUs can contact an RSU to request or report some information, such as traffic jam, road under accident, and so on.
Zhang et al. [6] have proposed an Identity-based Batch Verification (IBV) scheme to sign messages created by OBUs. A tamperproof device is equipped in a vehicle to generate an OBU's private key for signing each message, lunched by the OBU. A Real IDentity (RID) and a password are used to authenticate and activate the tamperproof device. The password can be the signature of the RID signed by a Trust Authority (TA). However, drivers have to contact the TA, if they want to change the device's password. So, it is probably infeasible to use. Furthermore, this technique has not yet defined a method to sign a message, lunched by an RSU.
A lightweight authentication scheme has been proposed in [16] to secure the handoff process in IEEE 802.11p for nonsafety related application. However, there are enormous numbers of keys appearing at RSUs. This scheme has not defined key management processes after completing communication. Hence, the RSU may store hundreds of keys that can hugely degrade the RSU performance.
In [11], we have proposed an authentication scheme in V2I communication based on WAVE unicast services under a city environment. To exchange WSMs with minimum cryptographic overhead, a symmetric encryption is deployed by creating Pairwise Transient Keys (PTKs). We have designed two PTKs, namely,
3. Proposed Design
To countermeasure the potential security threats with minimum authentication overhead, we propose a novel authentication scheme for V2I communication based on WAVE unicast services. In our scheme, there are two types of unicast WSMs, including authentication WSMs and ITS WSMs. The authentication WSM is to authenticate a legitimate driver and a vehicle (an OBU). The ITS WSM is to transfer information for supporting the ITS (e.g., traffic jam alerting messages) and to update the OBU's address for location tracking according to WAVE unicast services. The notations in our proposed scheme are listed in Table 1. Figure 1 presents an overview scenario of our scheme.
Notations and descriptions.

An overview of system architecture in our scheme.
To reduce authentication operations at an RSU and the workload of an authentication server, all RSUs in the scenario are partitioned into several LAs. We assume that the communication of RSUs with their infrastructures and the communication between RSUs are secure and trustable. The details of our keys procedures are discussed as follows.
In our design, there are three key types, namely, pre-pairwise transient key (
In [11], a driver's license plate number is transferred in plaintext under WSMP from a source OBU to a destination RSU. This license plate number is deployed to query its password for generating the RSU side
In our authentication scheme, there are two main security procedures as follows.
3.1. Authentication Procedures
In our design, a legitimate driver must register to subscribe ITS services from an ITS website. This website is protected by traditional web security. It may be a government's website operated with a transportation database. This database stores important information of the driver (e.g., the driver's license plate number and its password pair) and the information of his/her vehicle (e.g., vehicle ID and its password pair). After completing the registration process, the legitimate driver has username and its password pair to access the ITS services in each RSU.
There are two pairs of username/password, which are used to generate a key

An authentication process for generating a PTK.
Step A.1. The OBU initiates a unicast service by recoding the service PSID (i.e., IDUC). The OBU has to be a member of this service. If an RSU supports this service, it allocates radio resources and announces the service IDUC by sending a WSA to the OBU (described further in Step A.2).
Step A.2. The RSU intermittently broadcasts the WSA to the OBU in Step A.2.1. In this WSA, the source address (src) is the RSU's MAC address (MACRSU). The destination address (
Step A.3. In path (1) Figure 1,
Step A.4. The OBU sends the authentication WSM to authenticate at the RSU. The data payload also contains an IDOBU and the encrypted value, including the authentication request message (i.e., type “AUTH REQUEST”), the
Step A.5. The RSU receives the
Step A.6. The RSU-side
Step A.7. To send a reply message back to the OBU,
Step A.8. The RSU generates the key rskRSU to be a component of the key
Step A.9 and Step A.10. The OBU side
3.2. Security Procedures between OBUs and RSUs
To secure communication between the OBU and the RSU, the key

The operations for securing a WAVE unicast message.
Step B.1 and Step B.2. The OBU has to perform Steps B.1 and B.2 to subscribe the AM service. This service is used to map the MACOBU and the connecting IDRSU. It is necessary to track the OBU's location.
Step B.3. The key
Step B.4. The OBU sends an ITS WSM to the RSU for updating its address. The data payload contains the request message (i.e., “UPDATE”), IDOBU, and IDRSU. The RSU forwards these data to the ITS server. In AM service at the ITS server, the MACOBU and the IDRSU pair is mapped and stored in AM cache. When the OBU enters a new RSU, it has to perform this step again to update the MACOBU and the new IDRSU pair in AM cache.
Step B.5. The
Step B.6. The RSU generates a WSM and sends it back to the OBU. The WSM data message (i.e., “200 OK”) and IDRSU are encrypted by the
Step B.7. When the ITS server needs to send an ITS message (e.g., traffic jam warning message) to the OBU, the MACOBU and IDRSU pair is obtained from the AM cache. The ITS message with the MACOBU and IDRSU pair is sent to the RSU. After that, the RSU converts the received data into a WSM format to forward to the OBU accordingly.
Step B.8. The RSU forwards the ITS message as the WSM format under unicast communication to the OBU by using MACOBU, obtained from Step B.7 as the destination. The WSM data payload contains the ITS message and IDRSU, which are encrypted by
Step B.9. When the OBU receives the ITS WSM, it uses the OBU side
If the OBU cannot receive the ITS WSM (no reply back to the RSU), the following operations are activated. In Figure 1, when the message in path (3) cannot reach the OBU, the process of path (4) is activated. In this process,
4. Security Analysis
The proposed scheme has been designed to secure V2I communication. By using the PTK procedures, the WSMs can be transmitted between OBUs and RSUs with minimum cryptographic overhead without introducing the management difficulties of public key certificates. So, this scheme is better than the traditional PKI-based schemes. The novel authentication scheme primarily satisfies the requirements of authentication, non-repudiation, integrity, and availability. The analysis of these security requirements is discussed as follows.
Authentication. The authentication procedures with two pairs of username/password have been proposed. To identify the permission of a legitimate user and an OBU, RSUs have to authenticate the OBU and the legitimate driver by using an OBU's ID (as a username), its password, and an encrypted driver's license plate number. To generate a
Nonrepudiation. Each unicast WSM data payload is encrypted by a Pairwise Transient Key. This key is generated by using the specific authentication data of an OBU and a legitimate driver. So, when a driver (as an attacker) sends a false message to an RSU (e.g., reporting fake traffic jam information), the RSU can decrypt to get the message and the driver of the source OBU. So, the driver cannot repudiate the unicast WSM, encrypted by his or her
Integrity. Message alteration and source modification can cause a serious damage to drivers, passengers, and vehicles. To prevent the message alteration and the source modification, a unicast WSM is encrypted using a Pairwise Transient Key. When the WSM is modified, the specific Pairwise Transient Key for the original WSM cannot be used to decrypt the modified WSM.
Availability. Two pairs of username/password and random short keys are used to generate a
The possible potential attacks in vehicular networks have been presented in [10]. The most potential attacks can be eavesdropping, message alteration, privacy violation, and replay. By using these attacking techniques, an attacker can confuse victim drivers with fake information that can damage the drivers, passengers, and vehicles. Here, we analyze our security scheme to protect against the most potential attacks.
Eavesdropping. A driver authentication can be completed, when an authentication request message is successfully decrypted. By using this technique, attackers cannot eavesdrop to get the password. The passwords (of OBUs and drivers) have never been sent across the network. At the RSUs, the passwords of OBUs and the drivers are stored in location server's database. Each OBU has also stored its own password and entered driver's password. Furthermore, when an attacker eavesdrops a WSM, the information in the data payload cannot be decrypted at the attacker's side because there is no valid victim's
Message Alteration. When a unicast WSM is altered by an attacker or encrypted by a fake key, the destination of the unicast WSM cannot decrypt to obtain the information due to the alteration of the WSM payload. If the decryption fails, this WSM may be illicitly altered. So, it will be dropped. In addition, the attacker cannot fake an RSU's messages to a victim (OBU) because the attacker has no valid victim's
Privacy Violation. We have proposed the new authentication procedures to improve the privacy concern in [11]. If we use a plaintext license plate number, privacy preservation could be failed. In this new scheme, the license plate number is encrypted before sending to authenticate at the Location Server. This license plate number is used to query its password to be used as a component of the
Replay. An attacker eavesdrops and replays a unicast WSM encrypted by the current
5. Evaluation
In this section, our scheme has been experimented on the Network Simulator (NS-2) (release 2.35) [17]. In [11], we have focused on a city environment only. However, our scheme is actually designed to support in both highway environments (where vehicles move very fast) and city environments (where vehicles move slowly). In this paper, we have extended the performance evaluation of our scheme to cover the highway environment scenario. The NS-2 based IEEE 802.11p is modified to simulate our scheme. To create vehicles movement, an NS-2 traffic generator has been developed using JAVA. This generator creates movement scripts and other parameters as discussed in what follows. The goal is to test whether or not our new scheme can be flexible to use in both highway and city scenarios.
City Scenario. The traffic generator deploys a Manhattan model [18] to simulate the city environment. The probability of remaining on the same street is 0.5, and the probability of turning left or right is 0.25. Each node is randomly assigned the path of routes for traveling. The vehicle velocities are randomly generated between 3.5 and 20 m/s (12.6–72 km/h) to typically simulate a traffic behavior in the city scenario. Furthermore, the density of the vehicles on the road is a main factor to impact the vehicular network performance. So, there are different numbers of nodes (OBUs) introduced (as shown in Figure 4). The city scenario simulation parameters are shown in Table 2.
Simulation configuration.

Performance comparison using the different numbers of nodes in the city environment scenario: (a) average authentication WSM delay in millisecond with and without ITS WSM background traffic; (b) average ITS WSM delay in millisecond.
Highway Scenario. In the traffic generator, we assume a three-lane highway of 20 kilometers length in one direction. The vehicles (simulation nodes) move to the end of the highway. The velocity of the vehicles is a main factor to evaluate the performance in highway environments. We have measured the performance with different vehicle velocities. The average velocities are faster than the city scenario. In addition, the different numbers of nodes can cause the different results of the evaluation. In the normal behavior of a highway environment, the density of nodes is smaller than a city environment. However, the nodes density is still an important factor to affect the vehicular network performance. So, we consider different average numbers of nodes/km (including 10, 20, and 30 nodes/km). Table 2 presents the simulation parameters of the highway scenario.
According to Emmelmann et al. [19], packet size of 100 bytes is long enough to distribute the WSM safety related message. Yet, due to security overhead, the packet size is likely longer. An average packet size of 500 bytes has been used in [20] to evaluate the IEEE 802.11p performance, since it is a reasonable average packet size including data and security information. So, we choose a packet size of 512 bytes for covering our security overhead in each unicast WSM.
In order to evaluate the performance of our scheme, we focus on the authentication WSM delay and the ITS WSM delay. The WSM delay is the most important factor for the evaluation. It can indicate whether or not our scheme can provide a reliable service. The goal is also to test whether or not the authentication WSM and the ITS WSM in our scheme causes too high delay. The performance evaluation metrics and results are discussed as follows.
5.1. Authentication Delay
The authentication delay in different densities of the OBU nodes is a main factor to evaluate the efficiency of an authentication scheme. In our evaluation, we have measured the delay of the authentication WSM (from the OBU beginning to send an authentication request to the RSU until replying back the authenticated WSM to the OBU). We consider the number of nodes separately between the city and highway.
5.1.1. Evaluation Results in the City Scenario
The simulation results are shown in Figure 4(a) with error bars that represent the 95% Confidence Interval. According to the figure, with the increase of traffic load (i.e., increasing the numbers of nodes in the simulation area), we can find that the authentication delay increases. However, when the traffic load becomes large, the WSM authentication delay increases negligibly (e.g., 350 nodes with around 4 ms) comparing to the light traffic (e.g., 20 nodes with around 3 ms). In case of the traffic load growing up, the results with ITS WSM background traffic are more volatile (the variation of the error bars) than the results without ITS WSM background traffic. This is due to the interruption by the background traffic in different road situations. However, the results are applicable, even if the traffic load becomes large.
The improvement of our new authentication scheme cannot significantly change the evaluation results in the city scenario because the concept of WSM transmission remains the same as proposed in [11]. However, this new authentication scheme has been improved to be the better solution in terms of security and privacy as discussed in Section 4.
5.1.2. Evaluation Results in the Highway Scenario
We have simulated a highway scenario with different vehicle velocities and numbers of nodes/km. The simulation results with error bars that represent the 95% Confidence Interval are shown in Figure 5(a). The results of the average authentication WSM delay are negligible. The maximum value with the peak error bar is around 4 ms. The results of the higher velocity nodes (e.g., 24 and 30 m/s) in the larger traffic density (e.g., 30 nodes/km) are more volatile (the variation of the error bars) than the slower velocity nodes in the smaller traffic density. When the traffic density becomes large, the number of WSM packets then increases. So, it can increase the probability of the packets from a node interrupting each other and can make the variation of the error bars depending on the road situations. Even after increasing the velocity, the differences of the authentication delays are still negligible. The velocity may have little effect on the results due to the small number of authentications in the Location Area design.

Performance comparison using the different average vehicle velocities in the highway environment scenario: (a) average authentication WSM delay in millisecond with the different numbers of nodes/km; (b) average ITS WSM delay in millisecond with the different numbers of nodes/km.
5.2. Unicast ITS WSM Delay
Packet delay of the unicast ITS WSM is also important to evaluate the efficiency of our security procedures. In our simulation, RSUs periodically send ITS WSM traffic (e.g., traffic jam alerting) in unicast mode to OBUs. So, we simulate the unicast ITS WSMs and let the RSUs intermittently send the messages to the OBUs. The OBUs then reply the messages (“200 OK”) back to the RSUs as unicast WSMs. The ITS WSM delay in each communication (from the source address beginning to send an ITS WSM until receiving at the destination address) has been used to measure the efficiency of the security procedures.
5.2.1. Evaluation Results in the City Scenario
The experimental results with error bars that represent the 95% Confidence Interval are shown in Figure 4(b). It can be seen that the ITS WSM delay ratio and the error bars ratio grow up when the traffic load becomes large. This is reasonable because when the traffic load increases, there are more numbers of packet transmission. However, the ITS WSM delay does not vary a lot. This delay is still smaller than the maximum delay of 100 ms, discussed in [19] to be able to provide a reliable service.
5.2.2. Evaluation Results in the Highway Scenario
Figure 5(b) shows the results with error bars that represent the 95% Confidence Interval. A slower velocity node must take longer time to travel to the end of the highway than a faster velocity node. So, with the slower velocity node, the probability to receive the ITS WSMs is higher. When the average velocity is 16 m/s with the largest number of nodes/km (e.g., 30 nodes/km) in the simulated highway, the average ITS WSM delay is approximately 16 ms, and the error bar is more volatile than other node densities. The slower velocity node takes longer time to travel in the highway. So, it can increase a chance to receive WSMs. Also, the ITS WSM delay can be increased due to interrupting by several WSMs from many nodes in different road situations. However, in the same velocity of 16 m/s, the delays are still negligible in the smaller density (e.g., 10 and 20 nodes/km) due to fewer packets at the light traffic density.
For the high velocity (e.g., 24, and 30 m/s) nodes, the average ITS WSM delays are smaller than the slower velocity nodes. When the nodes move very fast, the chance to receive the ITS WSMs is low. So, the small number of packets can decrease the delays. However, the experimental results demonstrate that our scheme introduces very small delay in various road situations.
6. Conclusions
In this paper, a novel authentication scheme based on WAVE unicast services has been proposed for V2I. With Pairwise Transient Key (
To test whether or not our new scheme can be flexible to use in both highway and city scenarios, the experimental results have been done using NS-2. The experimental results have demonstrated that the unicast WSM delay can be kept quiet low in both simulated scenarios.
Footnotes
Acknowledgments
This research has been funded by Thailand Research Fund (RSA5080013), National Research Council of Thailand, and Mahasarakham University.
