Next Article in Journal
Application of Pulse Compression Technique in High-Temperature Carbon Steel Forgings Crack Detection with Angled SV-Wave EMATs
Previous Article in Journal
Towards a Broad-Persistent Advising Approach for Deep Interactive Reinforcement Learning in Robotic Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems

by
Santhosh Kumar Sripathi Venkata Naga
1,*,
Rajkumar Yesuraj
1,
Selvi Munuswamy
2 and
Kannan Arputharaj
2
1
School of Information Technology and Engineering, Vellore Institute of Technology, Vellore 632013, Tamilnadu, India
2
School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, Tamil Nadu, India
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(5), 2682; https://doi.org/10.3390/s23052682
Submission received: 21 November 2022 / Revised: 4 January 2023 / Accepted: 7 February 2023 / Published: 1 March 2023
(This article belongs to the Section Sensor Networks)

Abstract

:
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy. To achieve secure data transmission, several authentication schemes are proposed by various researchers. The most predominant schemes are based on identity-based and public-key cryptography techniques. Due to limitations such as key escrow in identity-based cryptography and certificate management in public-key cryptography, certificate-less authentication schemes arrived to counter these challenges. This paper presents a comprehensive survey on the classification of various types of certificate-less authentication schemes and their features. The schemes are classified based on their type of authentication, the techniques used, the attacks they address, and their security requirements. This survey highlights the performance comparison of various authentication schemes and presents the gaps in them, thereby providing insights for the realization of intelligent transportation systems.

1. Introduction

Intelligent Transportation Systems (ITS) have made promising advancements in addressing the problems related to pollution and traffic management [1]. The emergence of the Internet of Things (IoT) has been revolutionary, with a variety of applications that benefit human lives, business operations, transactions, parking, governmental organizations, and so on. It consists of wide variety of sensors that capture data by sensing, and it deploys the information to the base station as a backup for analysis and analytics to gain business and research insights [2]. ITS can be regarded as a kind of heterogeneous network which comprises intra- and inter-vehicular communications. The most predominant application of the IoT is vehicular ad hoc networks (VANETs). They have captured huge attention from many researchers all around the world [3,4]. VANETs consist of cars equipped with On-board Units (OBUs) which facilitate communication via a dedicated short-range communication protocol (DSRC) [5]. Sensors installed inside the cars sense the environment and issue a collision warning in cases of vehicle-to-vehicle communications (V2V). These kinds of communications can be utilized for warning/alerting the drivers, thereby providing driving assistance. VANETs also consist of Road-side Units (RSUs), which are mainly necessary to provide service assistance to drivers in cases of accidents or traffic, thereby making commuters plan an alternative route in advance [6]. This kind of infrastructure communication can be referred as vehicle-to-infrastructure communication (V2I). The collected information has to be stored in a secured environment. If there is no proper security infrastructure to guard the data, then they may be prone to attacks. This might pose the attackers to even hack the IoT device (cars), which increases the security risk. Hence, security and privacy have been under threat due to new methods of communication and hacking methods. Figure 1 represents the typical components of Intelligent Transportation Systems in a smart city.

1.1. Problem Statement

Since VANETs are resource-constrained, they pose challenges, as they have less computational resources. Due to wide-open communication channels in recent years, end–end security has been a question in need of being addressed. Before a message is transferred, the data have to be owned and encrypted to emphasize that they originate from an authorized device and that they can stand alone in cases of attacks during transmission. The data transferred might contain important or highly sensitive information that should not be tampered with or leaked. In Vehicular Ad hoc Networks (VANETs), when a large number of On-board Units send data to a particular Road-side Unit, then it might take time to verify the integrity and authenticity of the data that are received. This leads to a processing delay, where the Road-side Units might become tired and announce a denial-of-service. This delay, in the case of sensitive information, may pose a huge risk. Additionally, they are easily exposed to wear and tear, ease of access, physical threats, and side-channel and cloning attacks [7]. Due to the high mobility and streamlining of resources, it is very difficult to interpret the nodes that behave malevolently. It is also possible that these malevolent nodes may send or broadcast wrong data to other nodes and might cause disturbances in the routing and data transmission. VANETs suffer from a wide variety of attacks, including message tampering, message spoofing, denial-of-service (DoS), and so on [8]. In order to ensure the security of VANETs, the design has to include principles such as authenticity, privacy, and integrity.

1.2. Background

Authenticity can be termed as ensuring the credibility of the sender to perform secure routing. Privacy refers to the protection of the information against third parties; this can be achieved using pseudonyms. Integrity is the mechanism of ensuring that the data are tamper-proof, and not altered or lost during transmission. Public-key cryptography (PKG) comes up with a solution termed as Digital Signature [9,10]. Digital Signature provides facilities for signing each message so that it ensures authentication, integrity, and confidentiality. In this approach, data transmission by a sender is acknowledged first by the receiver’s public key. If the sender has the recipient’s public key, then the sender authenticates the message by using the received public key. During transmission, the Road-side Units (RSUs) and Traffic Regulating Authority (TRAs) perform Signature Verification. Signature Verification takes a long processing time, which increases the delay and computational overhead in the cases of dense and sparse scenarios [11,12]. In order to solve this challenge, Shamir et al. [13] proposed a cryptographic technique called identity-based public-key cryptography (ID-PKC). In this approach, a public key can be generated by the user themselves, whereas the corresponding private key is generated by the Key Generation Center (KGC). Though it solves the problem of the management of certificates with public-key cryptography, it still suffers from a serious challenge. The Key Generation Center contains all the users’ private keys. At any time, if the Key Generation Center is attacked and captured, then the attacker is able to interpret the data that are to be communicated. The forging of signatures may also be possible, which poses a high risk. This forging of signatures attack is called a key escrow problem. In order to solve the deficiencies of the two cryptosystems, Al-Riyami et al. [14] came up with a solution termed as certificate-less public-key cryptography (CL-PKC). In this approach, the user’s private key is generated by the Key Generation Center. However, only part of the key can be generated by the KGC, and the remaining part has to be generated by the user. Thus, even if the attacker captures the KGC, it is impossible for them to gain access to the private information. Additionally, it eliminates the need for the management of certificates. Thus, both the certificate management and key escrow problems are solved. However, this still poses an overhead of a large number of certificates to be processed. To eliminate this aggregate, signature technology, along with the certificate-less public-key cryptography, provides a better solution. Instead of processing the individual signatures, which increases the computational overhead in a resource-constrained environment like VANETs, all these signatures are aggregated into a single signature. This kind of approach reduces the processing time and also improves the verification efficiency [15]. Therefore, certificate-less public-key cryptography, along with aggregate signature technology, has attracted the attention of many researchers around the world. Based on the ways in which the signature is authenticated, the certificate-less aggregate schemes (CLAS) are classified into different categories, namely batch verification, group verification, mutual authentication, cooperative authentication, hybrid authentication, and others. Figure 2 represents the taxonomy of the authentication schemes utilized for vehicular ad hoc networks.

1.3. Our Contributions

This paper aims to provide a comprehensive survey on the various types of certificate-less public-key cryptography-based authentication schemes. An analysis has been carried out and presented with existing surveys that are highlighted in Figure 2. From the analysis carried out, the significance of the survey has been constructed, as shown in Table 1.

1.4. Approach

1.4.1. Survey Organization

The survey has been carried out after a careful selection of more than 200 papers pertaining to the topic of certificate-less authentication schemes. To resolve the conclusion, the papers are segregated based on the signature verification technique applied, and the parameters used that address various issues. We then confined our scavenging with a case study that categorized based on the signature verification technique, as depicted in the Figure 3. The classification has been performed based on the Figure 4 as shown below.

1.4.2. Queries

Research questions pertaining to the proposed survey have been analyzed and identified, refining the process of conducting the literature survey. Table 2 defines the set of queries that confined the way for the proposed survey.

1.4.3. Literature Sources

The literature survey has been backed up from both open access and peer-reviewed publications from the following list of journal databases that includes:
Taylor and Francis (https://www.tandfonline.com)
Open Access (https://www.mdpi.com)
IEEE Xplore (ieeexplore.ieee.org)
ScienceDirect (www.sciencedirect.com)
The publications have been selected carefully, covering papers from the year 2012 to 2022, out of which most of them are from 2022.

1.4.4. Notion of Search

During the scavenging of literature sources, the keywords “Authentication schemes”, “Vanets”, “Survey”, and “Year” were the main words utilized for the hunt. In order to confine and to conclude within the domain, keywords such as “security” and “privacy” were also utilized.
This survey enables future researchers to gain an insight into designing an efficient cryptography scheme for VANETs in Intelligent Transportation Systems (ITS). The manuscript has been organized as follows: Section 1 describes the problem statement with an introduction. Section 2 provides a brief on the related works carried out by various researchers pertaining to certificate-less aggregate schemes. Section 3 explains the performance comparison of different certificate-less aggregate signature schemes, along with their gaps. Section 4 provides the conclusion and future perspectives.
Table 1. Comparison with existing surveys.
Table 1. Comparison with existing surveys.
AuthorYearGoalRequirementAdvantagesLimitations
Zhaojun Lu et al. [16]2018Compact Survey on anonymous authentication schemes under pseudonymsTo focus on novel privacy-preserving methods and trust models by filling gaps and to report the recent advancementsProvides clarity on privacy preservation and trust model designLacks clarity in addressing the issues pertaining to different authentication schemes
Shaik Mullapathi Farooq et al. [17]2021Surveyed on different authentication mechanism in VANETsTo provide a clarity on security attacks (both inside and outside)Provides research directions and arena for security mechanisms to be implementedLacks in addressing verification methods addressed in different authentication schemes
Eko Fajar Cahyadi et al. [18]2022Presented a survey on identity-based batch verification schemesTo provide a review on identity-based batch verification schemesVery limited but clarity in presenting the approachThe major drawback is that it has not considered other verification mechanisms
J.Jenefa et al. [19]2022Presented a survey on existing authentication schemesTo provide a survey based on message signing and verification methodsProvides enough clarity and classified different authentication methods in a precise wayIt has not addressed the classification based on wide collection of literature sources
Proposed2022Presenting a survey based on verification methods and various authentication schemesTo provide a clarified survey on different techniques, parameters, methods, and verification schemesProvides a research direction that address the future challenge-
Table 2. Queries.
Table 2. Queries.
QueriesAim
1. What are Intelligent Transportation Systems?They consist of wide variety of sensors that capture data by sensing and deploying the information to the base station as a backup for analysis and analytics of efficient traffic management and transportation.
2. What are VANETs?VANET consists of cars equipped with On-board Units (OBUs), facilitating communication via dedicated short-range communication protocols (DSRC).
3. What are issues faced by VANETs?Security, privacy, delay, and bandwidth are the issues faced due to the varying dynamic topology nature.
4. Why do VANETs face security and privacy issues?Due to the wide-open nature of communication channels, VANETs are highly subjected to security and privacy risks.
5. How to face security and privacy issues? Data has to be authenticated prior to transmission. Due to open communication channels, it is necessary to devise an authentication scheme that guards the data being transferred between VANETs.
6. What is an authentication scheme for VANETs?It is the way of acknowledging the user/sender identity, thereby gaining access to the resource or the message via a password, pseudonym, and so on.
7. How are they classified?They are classified based on certificates, without certificates and authentication mechanisms such as mutual, cooperative, hybrid, and other types.
8. What is an attractive feature of authentication schemes based on certificates and without certificates?In the case of certificate authentication schemes, there is no attraction because of the overhead incurred in the processing, managing, and verification of them. In the case of certificate-less authentication schemes, it alleviates the certificate processing management overhead.
9. How are certificate-less authentication schemes classified?They are classified based on the verification strategy and the authentication scheme employed.

2. Taxonomy of Classification of Different Certificate-Less Authentication Schemes

Authentication in VANETs can be achieved in two ways: authenticating infrastructures such as vehicles and messages generated. Infrastructure authentication is vital to ensuring the authenticity of the entity deployed inside the network. It is also necessary to ensuring whether the legitimacy of the entity has been compromised by the attacker or not. Message authentication is necessary to ensure the integrity of the data. Various authors have proposed a lot of research work pertaining to different security requirements in certificate-less aggregate schemes (CLASs) to achieve security and privacy. Figure 5 illustrates the classification of different authentication mechanisms based on message signature verification techniques.

2.1. Classification Based on Signature Verification Technique

Based on the verification mechanism followed, certificate-less aggregate signature schemes are classified into batch verification and group verification methods.

2.1.1. Batch Authentication

Digital Signatures can be verified or authenticated by batch. Batch verification can be taken as an approach to verify a collection of individual signatures at the same time. It is essential to reduce the computation time spent on verifying the signature rather than communication [20]. The following are the works carried out by various authors utilizing the batch verification process.
Felix Vallant et al. [21] proposed a CLAS scheme for VANETs in a smart grid environment. The major aim of the work is to achieve user anonymity, along with conditional privacy protection. The advantage of this scheme is that expensive operations such as bilinear pairings and Map-to-Point hash functions are not used. Though it reduces the computation and communication costs, the efficiency is on par with the other related works, which need to be improved further. Ismaila Adeniyi Kamil et al. [22] came up with a solution by finding and mitigating the security vulnerability in Cui et al. [23] by addressing the forgery under chosen messages. The advantage of the proposed work is that expensive operations like bilinear pairings are not used. A separate verifier is used for verifying the signatures, irrespective of the number of signatures used. The scheme can be utilized for several practical applications pertaining to safety, efficacy, infotainment, and user comfort ITS applications. Cui et al. [23] addressed privacy protection and key escrow problems. The major aim of their work was to achieve privacy preservation. One-way Hash is used for batch verification. The scheme mitigates forgery attack. Huei-Ru Tseng et al. [24] addressed the issue of the security and privacy of emergency or sensitive message dissemination. The scheme was proposed by them to defend against the forgery, privacy, and traceability of vehicles during data transmission. Bilinear pairing is a technique utilized for implementing security. This scheme does not support vehicle-to-infrastructure (V2I) communications. Samra et al. [25] came up with a ring-signature-based method to address the problem of privacy. A certificate-less ring signature scheme with batch verification was proposed by the authors. The major aim of their work is to preserve or protect privacy, authentication, integrity, and traceability. Their scheme uses a One-way Hash function for implementing security. However, ring signatures suffer a typical computation overhead. Guo et al. [26] proposed a different methodology based on a ring encryption scheme to address conditional privacy protection. The scheme supports both vehicle-to-vehicle (V2V) and V2I communications. The scheme mitigates the replay attack. However, it passively resists insider attacks. Additionally, the scheme has to be tested for urban scenarios. Ye et al. [27] addressed the problem of coalition attacks with the help of pseudonyms to achieve anonymity. Their proposed scheme mitigates forgery against both chosen messages and coalition attacks. The scheme suffers from a low efficacy due to malicious signatures during the aggregation. Wang et al. [28] addressed the problems of privacy in vehicles, messages, and other bandwidth-related constraints. This scheme mitigates forgery and replay attacks. Their proposed work has to be tested under real-time constraints. Chen et al. [29] addressed the problems of vehicle identity privacy, location privacy, high mobility, and limited bandwidth. Their scheme was proposed with the objective of achieving conditional privacy protection. The scheme consists of a message authentication protocol which has been enabled to counter forgery under chosen messages. Han et al. [30] developed a pairing-free certificate-less aggregate signature scheme to improve the security in vehicle-to-infrastructure communication. The scheme was proposed to address the problem of limited bandwidth and computing power in the case of VANETs. This scheme mitigates forgery attacks. The efficiency of their proposed scheme has to be improved further. Thumbur et al. [31] addressed the problem of message modification and the misuse of private information. The proposed scheme works for both V2V and V2I communications. The major advantage of it is that it means expensive operations like bilinear pairing are not used. It prevents malicious vehicles from disrupting the security features. Gayathri et al. [32] proposed a scheme to address the problems of security and privacy for healthcare-based wireless medical sensor networks. Their proposed scheme effectively resists signature forgery attacks. Expensive operations like bilinear pairings and Map-to-Point Hash functions are not used. Though their work achieves practicability, it has to be tested by designing novel attacks. Zhou et al. [33] proposed a scheme to address the problems of security and privacy by mitigating against signature forgery attacks. The scheme has to be tested by novel attacks so that it reveals its suitability for a particular scenario. Wang et al. [34] addressed the problem of security over wide-open communication channels for federated UAV networks. Their proposed work utilizes a certificate-less and fuzzy-based batch authentication scheme that aims to protect against forgery upon chosen message attacks. Wang et al. [35] came up with this by finding a flaw or secure vulnerability in the work of Li et al. [35]. The work performed by Li et al. is insecure against unlinkability and anonymity. The scheme utilized a random number to encrypt the unique tag in order to ensure anonymity. The scheme still suffers from computational overhead, which needs to be investigated further. Sunday et al. [36] proposed a lightweight and privacy-preserving certificate-less authentication scheme in fog-assisted VANETs, using blockchain and neuro-fuzzy machine learning techniques. The major aim of their scheme was to achieve a decentralized transparent and revocation process, and to prevent DoS attacks. Their proposed scheme mitigates forgery, replay, modification, impersonation, and man-in-the-middle attacks. The scheme has to be improved further to tackle novel types of attacks. Yang et al. [37] came up with a privacy-preserving aggregation authentication scheme for safety warning systems in fog-cloud based VANETs. Their proposed scheme utilizes bilinear maps for security implementation, thereby mitigating replay and forgery attacks. The limitation of their scheme is that the computation cost has to be reduced further. Ping et al. [38] proposed a pairing-free certificate-less aggregation authentication scheme to address the key escrow problem. The proposed scheme poses much effect against chosen message and identity attacks. Li et al. [39] came up with a solution to the flaw in the work proposed under the computational Diffie–Hellman assumption (CDH). The work is insecure against message signature forgery attacks. Hence, the proposed solution mitigated the flaw by making an improvement; hence, the scheme becomes superior against such attacks. Liu et al. [40] proposed a solution for Road-side Units (RSUs) due to the difficulty of verifying message signatures. The scheme works based on a proxy-vehicle to assist the RSU. In order to facilitate the data transmission, an expedite key negotiation scheme has been utilized. Their proposed work showed a significant improvement over the existing batch-based authentication schemes. However, it is crucial to make sure that these vehicles have incentives to serve others under the conditions of efficient message delivery. Another important challenge of the proposed scheme is that the redundant authentication event that happens frequently has to be addressed. Sai Ji et al. [41] proposed a scheme to address the problems of security and privacy in wireless body area networks (WBAN), utilizing big data services. The proposed scheme has tried to mitigate replay, impersonation, modification, a lost personal digital assistant (PDA), and man-in-the-middle (MitM) attacks. The proposed scheme was not tested under real-time scenarios. Zhong et al. [42] proposed a privacy-preserving authentication scheme with full aggregation. Their proposed work addresses the problems of latency and the integrity of data. The work involves protecting the identity and privacy of the mobile devices, and the attacks can be traced by using the pseudonym. The secure communication between a vehicle and multiple mobile devices is realized by certificate-less ring signature technology. However, security threat models need to be tested for various attacks. Hu et al. [43] addressed the problems of forgery, traceability, and blindness. The authors introduced a two-level dummy for enhancing the security. Even if one of the dummies gets exposed to the attacks, the other dummy entity will increase the security by protecting the real identity of the vehicle. Xie et al. [44] proposed a conditional privacy-preserving secure certificate-less authentication scheme for wireless body area networks. Their proposed work has tried to achieve forgery and replay attacks. The flaw mitigated the adversarial effect on the loopholes pertaining to message forgery and redundant message events. Further investigation of the scheme has to be tested by designing innovative attack scenarios. Song et al. [45] proposed a pairing-free lightweight batch anonymous authentication scheme that supports both V2V and V2I communications. The main aim of their work is to eliminate central authority dependency. The major advantage of the scheme is that no bilinear pairing operations have been performed, which increases the computation and the storage overhead. Zhang et al. [46] utilized the Chinese remainder theorem (CRT) that eliminates the need to store the sensitive information in the tamper-proof devices (TPD). Though the work achieves practicability, its efficiency has to be improved further. Table 3 depicts the classification of batch authentication schemes along with the problems addressed, the methodology, and the scenarios they suit.
Table 3. Classification of batch-verification-based certificate-less aggregate signature schemes.
Table 3. Classification of batch-verification-based certificate-less aggregate signature schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Felix Vallant et al. [21]Elliptic curves; One-way Hash functionUser anonymity, conditional privacyImpersonation, replay, modification, man-in-the-middle, and stolen-verifier table attacksV2V, V2I, V2G, V2E, IoT, Smart Grid
Cui et al. [23]Elliptic curves; Map-to-Point Hash functionIdentity privacy preservationImpersonation, replay, modification, man-in-the-middle and stolen-verifier table attacksV2I
Huei-Ru Tseng et al. [24]Bilinear pairingTraceability, conditional privacyForgery attackV2V
Samra et al. [25]Bilinear pairing, ring signatureUnforgeability, anonymity, traceability, conditional privacyForgery attackV2V, V2I
Guo et al. [26]Elliptic curves, ring signatureConditional privacyReplay attackV2V, V2I
Ye et al. [27]Elliptic curvesAnonymity, conditional privacyForgery, adaptive chosen message, coalition attacksIoV
Wang et al. [28]Bilinear pairingIntegrity, non-repudiation,
anonymity, unlinkability, traceability,
Forgery, chosen message, replay attacksV2V, V2I
Han et al. [29]Elliptic curvesConditional privacyReplay, impersonation, modification, message spoofing attacksV2I
Zhou et al. [30]Elliptic curvesConditional privacy, anonymity, traceabilitySignature forgery, replay, modification, man-in-the-middle attacksV2V, V2I
Sunday et al. [36]Elliptic curves; neuro fuzzy and blockchainPrivacy preservationDoS Attacks, signature forgery, replay, message modification, man-in-the-middle attacksV2V, V2I, V2E
Liu et al. [40]Bilinear pairing, proxy vehicle, expedite key negotiation schemeMessage integrity, authentication, identity privacy preservation, traceabilitySignature replay attacksV2V, V2I
Zhong et al. [42]Bilinear pairing, ring signatureLatency, authentication, revocation, unforgeability, integrity, identity privacy preservation, traceabilitySignature forgery attacksConnected Autonomous Vehicles (CAVs), Intelligent Connected Vehicles (ICVs)
Zhang et al. [46]Elliptic curves, Chinese remainder theorem (CRT)Conditional privacy preservation, identity privacy preservation, perfect backward secrecy, perfect forward secrecy, traceabilityImpersonation, message modification, replay, collusion attacksV2V, V2I

2.1.2. Group Verification

Digital signatures are the integral part of authenticating the originality of data. Hence, group signature is an approach which facilitates each member of a group to sign a message while the verification ensures that the message is from a particular group, while the signing authority is not known [47]. The following are the works carried out by various authors based on the group authentication process.
Tan et al. [48] addressed the problem of DoS attacks by eradicating the authentication of a large number of anomaly messages. They employed the Chinese remainder theorem to perform the group verification and updating, thereby eliminating the need for the wastage of the storage of tamper-proof devices. This scheme assists in the anomaly detection of Road-side Units. The work suffers from the limitation that it only considers the traffic information, but it does not take into account the traffic information during the data transfer from the vehicle. Ikram Ali et al. [49] proposed a blockchain-based certificate-less group authentication scheme to achieve conditional privacy and revocation transparency. The Chinese Remainder Theorem was used for group key distribution and updating, and the dynamic time warping algorithm was used for unsupervised anomaly detection. Though the work proposed mitigated the drawbacks of security and privacy threats, it is not suitable for V2I environments. Zhiyan Xu et al. [50] proposed a certificate-less aggregate signature scheme for classical issues such as certificate management and key escrow problems. RSUs and traffic centers in VANETs (generally verified by trusted authority) need to verify a large number of route-related signatures in high-density communication scenarios. The scheme is substantially more efficient than the other schemes. Wang et al. [51] carried out an analysis on the security vulnerabilities in the identity traceability and user identity privacy, and found that it is prone to attacks. The work is based on RSU-based authentication. It is not suited for V2V communications.
Ming et al. [52] addressed the problems of message recovery, certificate management, and key escrow. However, a performance investigation while using bilinear pairings and Map-to-Point Hash functions is to be used to determine its suitability. Zheng et al. [53] addressed the problem of anonymity within eavesdropping, positioning, and tracking a vehicle. Adding, signing, verifying, and the revocation of group members using the simple multiplication of elliptic curves has been used. The scheme saves much computation time due to partial key generation. A high computation overhead with certificate distribution and revocation, a strong resilience of tamper-proof devices, a limited scalability when building many secure channels, and an inability to detect between tampering attacks are some of the problems addressed by Li et al. [54]. Identity-based public key certificate-less authentication schemes are utilized to achieve privacy, anonymity, and traceability. The RSU overhead has been reduced. The computation overhead has been reduced to an extent. Ismaila et al. [55] found a flaw in Tan et al.’s [48] scheme, discovering that it could not prevent against signature forgery attacks. The work involves a lightweight certificate-less authentication scheme for information dissemination concerning the privacy of users. Gaya et al. [56] utilized a signcryption technique as an ideal way of disseminating messages in a logical, secure, and authenticated way. However, a real-time scenario investigation is yet to be conducted. Yang et al. [57] addressed the problems of certificate management and key escrow. The scheme is effective against attacks and satisfies the unforgeability, traceability, and anonymity of communication messages. The proposed scheme has to be tested for high density scenarios for its effectiveness. Zhong et al. [58] came up with a solution to address the issues of privacy preservation, computation overhead, and security. The proposed scheme achieves message authentication and saves bandwidth and computation resources. The work mitigates replay attacks. Though it achieves its practicability, still-improved lightweight schemes are needed. Zhao et al. [59] addressed the problems of key escrow and key management. Their scheme is suitable for V2I communications in urban scenarios. The schemes resist attacks and satisfy the unforgeability of the communication messages, as well as the traceability and anonymity of the vehicles. High-density scenarios are to be tested.
Hu et al. [60] investigated the flaws to defend against signature forgery attacks. The problems need to address limited energy and location privacy. Hu et al. [61] investigated the security flaw in the Teng and Wang scheme [48] and mitigated forgery attacks. Hu et al. [62] investigated and mitigated the forgery attacks. Tomar et al. [63] extensively carried out research to address the problems pertaining to certificate revocation list management, key distribution, key escrow, and high computation overhead. The authors studied the work of Cui et al. [23] and identified a flaw with the employment of multiple semi-trusted authorities. In their model, there was no cooperation between the multiple trusted authorities employed. Hence, in order to mitigate the issue, blockchain technology is used in order to achieve data security, thereby preventing data leakage attacks. The installation cost is going to soar high during implementation. Jun et al. [64] addressed the security and privacy at the regions where the Road-side Units were unavailable. Their proposed work needs to resist against known attacks with a lesser computation cost and to reduce the workload of the vehicles while performing verification. A lightweight certificate-less key agreement protocol without pairing has been proposed to counter the issue. The scheme does not suit V2I environments. Parthiban et al. [65] addressed the problem of user privacy through a certificate-less aggregate signature-based authentication scheme (CSBA). Further improvements are needed to address the challenges encountered during data transfer. The scheme does not suit vehicle-to-infrastructure environments. Yang et al. [66] addressed the problems of privacy, integrity, and non-repudiation. The work includes finding a flaw in Thumbur et al. [31], which is insecure against public key replacement and coalition attacks. The algorithm suffers from identity revocation and authentication is not considered in the scheme proposed.
Dewangan et al. [67] proposed a solution for side-channel attacks on OBUs. Due to classical cryptography problems such as certificate management and key escrow, side-channel attacks are more prevalent. Their proposed scheme is resistant to side-channel attacks and mitigates message forgeability behavior. However, the correctness of the proofs for traceability needs to be investigated. Pairat Thorncharoensri et al. [68] addressed security and privacy issues while sharing information over the cloud. This reduced the computation and the communication cost. But it still suffers from some of the issues that were solved by the benchmark Cui et al. [23]. Chattaraj et al. [69] proposed a new blockchain-based certificate-less key agreement protocol for the Internet of Vehicles (IoV). Elliptic curves have been used for implementing the security. Their proposed work successfully mitigated the pitfalls with the help of a blockchain. Mei et al. [70] addressed the problem of vehicle location privacy, and the authenticity in the case of Internet of Vehicles. The scheme has the ability to resist attacks from outside attackers and the malicious-but-passive KGC. The aggregate verification cost can be improved further. Table 4 provides the classification of various group authentication schemes along with the problem requirements, the methodology, and the scenario they suit.
Table 4. Classification of group-verification-based certificate-less aggregate signature schemes.
Table 4. Classification of group-verification-based certificate-less aggregate signature schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Haowen Tan et al. [48]Elliptic curves, Chinese remainder theorem (CRT), dynamic time warping algorithm (DTW)Unsupervised anomaly detectionDoS, anomaly attacksV2V, V2I
Ikram Ali et al. [49]Bilinear pairing, blockchainConditional privacy, source authentication, identity privacy preservation, traceability, revocation transparencyCollusion, impersonation, message modification, man-in-the-middle, replay attacksV2I
Zhiyan Xu et al. [50]Bilinear mapsPrivacy preservationForgery attackV2V, V2I
Ming et al. [52]Elliptic curvesConditional privacy preservation, identity privacy preservation, traceability, role separationReplay, modification, impersonation, man-in-the-middle attacksV2I
Li et al. [54]Elliptic curvesTraceability, impersonation Chosen message, node compromise, node replication, stolen smart card, replay attacksV2V, V2I
Ismaila et al. [55]Elliptic curvesPrivacy preservation, autonomy, non-repudiationsignature forgery, replay, man-in-the-middle, impersonation, modification attacksV2X, IoV
Yang et al. [57]Elliptic curvesUnforgeability, traceability and anonymityKey exposure, coalition attacksV2V, V2I
Zhong et al. [58]Bilinear mapsPrivacy preservation, identity privacy preservation, traceability, unforgeabilityChosen message, chosen-identity, public key replacement, replay attacksV2I
Zhao et al. [59]Bilinear pairingUnforgeability, traceability, anonymity, privacy Message forgery attackV2I
Tomar et al. [63]Elliptic curves, blockchainMessage authentication, identity protection, traceability, revocation, Modification, forgery, replay and man-in-the-middle, adaptive chosen message attacksV2V, V2I, V2E, V2X, IoV
Yang et al. [66]Elliptic curvesConditional privacy preservation, identity, traceability, user identity privacy, revocabilityinternal joint attacks, message modification, replay, impersonation attacksV2I, IoV
Dewangan et al. [67]Bilinear pairingMessage authentication, integrity, non-repudiationSide-channel, message forgery, key escrow attacksV2V, V2I
Chattaraj et al. [69]Elliptic curvesMessage authentication, integrity, non-repudiationreplay, man-in-the-middle, impersonation, privileged-insider, denial-of-service, physical vehicle capture, ephemeral secret leakageV2V, V2I, IoV
Mei et al. [70]Bilinear pairingConditional privacy preservation, anonymity, traceabilityPassive KGC, replay attacksV2V, V2I, IoV

2.2. Classification based on Different Authentication Methods

This section elaborates with a summary of the different authentication schemes proposed, based on certificate-less signature methods. Though there are some of the traditional methods such as mutual, cooperative, and hybrid authentication schemes, there are some of the recently developed advanced lightweight schemes, namely, smart card-based authentication, multi-factor authentication schemes, and hardware-based authentication schemes. Figure 6 represents the classification based on different authentication schemes.

2.2.1. Mutual Authentication

Mutual verification or authentication is a type of digital signature verification. It is also referred to as two-factor authentication. It is an approach within which both the client and the server of the system authenticate before the data transmission. In VANETs, each node about to communicate must validate each other. The above are the works of various researchers based on mutual authentication.
Cahyadi et al. [71] addressed the problem of information leakage on On-Board Units (OBUs) during information dissemination. The approach utilized a Tate pairing operation, thereby mitigating replay, man-in-the-middle, impersonation, and user location privacy attacks. The proposed scheme is substantially more efficient than the other competitive methods. Malhi et al. [72] came up with a new certificate-less aggregation scheme to prevent the problems of certificate management and key escrows. The proposed work mitigates replay attacks. Game-based security proofs provide prominent support for the efficacy of the proposed scheme. Investigations into other attacks are yet to be addressed further. Cui et al. [73] addressed the transmission delay that highly limited the data transmission. Their proposed work employs online/offline encryption technology. The scheme can meet the necessary security requirements, including mutual authentication, anonymity, untraceability, non-deniability, and confidentiality. The proposed scheme has to be tested under real-time constraints. Yao et al. [74] found a flaw in the traditional certificate-less aggregation scheme of message authentication without identity authentication, specifically the inability to support forward secrecy. Their proposed scheme provides privacy protection through a mutual authentication process. The scheme works for both V2V and V2I communications. Though the scheme gets relatively balanced, testing has to be performed for its practicability. Dewanta et al. [75] proposed a lightweight authentication scheme in fog computing. During the handover, the authentication between the vehicles and fog nodes, and the privacy and message integrity, are extremely needed. The scheme used a One-way Hash function, an Exclusive-OR function, and a first-come-first-serve reservation and handover schemes. The fault tolerance of the scheme has to be investigated.
Fang et al. [76] addressed the issue of security during the information dissemination in the heterogeneous Internet of Things (IoTs). The scheme has come into the picture to model the IoTs and trust relationships between the different entities within a large class of heterogenous IoT devices through mutual authentication. The work used physical unclonable functions (PUFs), and Hash and Ex-OR functions. The scheme achieves anonymity while performing mutual authentication. Gope et al. [77] addressed the problems of security and privacy in ubiquitous mobile networks. Their scheme was proposed to provide robust anonymous mutual authentication in a cloud environment, with the help of smart cards, service clouds, and hash chains. The scheme is immune to DoS, forgery, lost smart cards, and open side-channel attacks. Many features need to be taken and investigated. Mbarek et al. [78] addressed the problem of radio-frequency identification (RFID) authentication. It is always possible to encounter the problem of security issues when a jamming attack occurs. The proposed scheme can be utilized in smart home surveillance systems. The efficiency and energy consumption rates have to be investigated further. Zhu et al. [79] proposed a static random-access memory-based physical unclonable function (SRAM–PUF)-based lightweight mutual authentication scheme for the IoTs. The work has been proposed to mitigate forgery and illegal access. To guarantee the authenticity of the devices and nodes under low overhead conditions and that they are resistant to attacks, SRAM–PUFs are used. Though the scheme achieves practicability, testing has to be performed under real-time constraints. Xi et al. [80] addressed the issues of user privacy and efficiency. A zero-knowledge proof (ZKP)-based anonymous mutual authentication scheme has been proposed for use in Internet of Vehicles (IoVs). The proposed work utilized zero-knowledge proofs (ZKPs) based on a Fujisaki–Okamoto commitment algorithm and fast reconnection procedures. Their proposed scheme is resistant to replay attacks. The computational overhead needs to be reduced further. Noura et al. [81] proposed a lightweight mutual multi-factor authentication scheme for the IoTs. The proposed scheme supports both V2V and V2I communications. The work uses PUFs and entity-based fingerprints for encryption, etc. The scheme mitigates replay and MiTM attacks; it is highly immune to authentication attacks. However, the scheme has to be tested for real-time practical constraints. Alsahlani et al. [82] came up with a solution to the data transmission security and privacy issue during COVID-19 with the help of lightweight mutual multi-factor authentication, which was utilized for an IoT-based cloud environment. The scheme is highly suited for V2V and V2I communications. Alsahwish et al. [83] addressed the problem of security through mutual authentication in the Internet of Things (IoTs). However, end-to-end authentication is still a challenge. Fan et al. [84] addressed the problem of security and privacy. The authors proposed a cloud-based lightweight secure RFID mutual authentication protocol for the IoTs to achieve message authentication. The scheme has to be tested in an unsecured environment. Jan et al. [85] proposed a lightweight mutual authentication scheme to ensure data security in the IoTs for smart home surveillance. The system has been tested and utilized for time-critical applications. Table 5 provides the classification of mutual authentication schemes along with the requirements, methodology, and scenarios they suit.

2.2.2. Cooperative Authentication

Cooperative authentication increases the signature verification cost of the same message through the cooperation between vehicles. The two ways of cooperative authentication are: single-message cooperative authentication and parallel cooperative authentication. Single message cooperative authentication enables immediate, low-delay message authentication. Multi-vehicle parallel cooperative authentication effectively eliminates the concerns regarding the high computation cost of bilinear pairing, thus breaking the application limitation of bilinear-pairing-based signatures in resource-constrained scenarios. Many works were carried out by various researchers concerning cooperative authentication. Yang et al. [86] addressed the problem of message authentication delay in batch verification. The most prevalent problem is that the increase in authentication delay increases the message drop rate. Their proposed work mitigates forgery attacks. The work has to be tested for real-time scenarios. Tao Jing et al. [87] proposed an efficient anonymous batch authentication (EABA) in which the authors represented the problems of information loss and the workload of RSUs. Here, the RSU workload has to be reduced. The proposed scheme has to resist against message forgery attacks. The scheme has certain limitations, as follows: 1. Only a numerical analysis has been presented. 2. Cooperative authentication in the case of urban scenarios with road cuts, intersections, and blind-spots is not considered. Xie et al. [88] explained that vehicles are unwilling to participate in message authentication or false authentication because cooperative authentication results in a loss of privacy and resource consumption. The work involves reputation mechanisms and message sequence optimization algorithm approaches. The scheme avoids message forgery attacks. Their scheme has to be tested for real-time conditions. Lin et al. [89] addressed the issue of authentication overhead on individual vehicles and shortened the authentication delay. This scheme maximally eliminates redundant authentication efforts on the same message from different vehicles. A limitation is that the trusted authority is indirectly involved in the authentication process that increases the computation overhead. Hyo Jin Jo [90] addressed the problem of message authentication. Vehicle location tracking is one of the major problems that is also addressed by them. Its major advantage is that it does not require mode synchronization between cooperative and non-cooperative authentication. The process of updation of missing messages needs to be taken care of in further work. Table 6 depicts the classification of cooperative authentication schemes along with their requirements, methodology, and scenarios.
Table 5. Classification of mutual-authentication-based certificate-less aggregate signature schemes.
Table 5. Classification of mutual-authentication-based certificate-less aggregate signature schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Cahyadi et al. [71]Bilinear mapsPseudonymity, identity privacy preserving, mutual authentication, message authentication, non-repudiation, traceability, unlinkability, user location privacyReplay, man-in-the-middle, masquerade, impersonation attacksV2V, V2I
Malhi et al. [72]Bilinear mapsIntegrity, authenticity, privacy, and non-repudiationReplay, forgery, adaptive chosen message, signature forgery attacksV2V, V2I
Cui et al. [73]Elliptic curves, online/offline encryption technology, signcryption Mutual authentication, anonymity, untraceability, non-deniabilityEavesdropping, false message, message tampering, replay, denial-of-service attacksV2V, V2I, IoV
Yao et al. [74]Elliptic curvesPrivacy preservation, forward secrecy, message and identity AuthenticationImpersonation, forgery attacks, replay, known key secrecy attacksV2V, V2I
Dewanta et al. [75]Elliptic curvesMutual authenticationReplay, man-in-the-middle, arbitrary guessing attack, impersonation attack, stolen OBU/vehicle attack, replay attack, sniffing attacksV2V, V2I
Xi et al. [80]Zero-knowledge proofs, elliptic curves, Fujisaki–Okamoto commitment algorithmAnonymity, mutual authenticity, unlinkability, traceability, forward secrecyReplay attackIoV, V2V, V2I
Table 6. Classification of cooperative-authentication-based certificate-less aggregate signature schemes.
Table 6. Classification of cooperative-authentication-based certificate-less aggregate signature schemes.
SchemeMethodologyRequirementAttack ResistivityScenario
Yang et al. [86]Bilinear pairingMessage authentication delayForgery, denial-of-service, active, pseudonym, replay attacksV2V
Tao Jing et al. [87]Elliptic curves, message classification algorithm, auction-based cooperative authenticationInformation loss, identity privacy preservation, traceabilityMalicious tracking attacksV2V, V2I
Xie et al. [88]Group member registration protocol, dynamic reputation management, sequence optimization algorithmFalse authentication, loss of privacy, packet loss, missing detection ratioMalicious attackV2V, V2I
Lin et al. [89]bilinear pairing, signcryption, evidence-token approachMessage authentication delay, workloadFree riding attacksV2V, V2I
Hyo Jin jo et al. [90]Elliptic curvesVehicle location privacy, anonymity, authentication, revocation, conditional privacy preservation, forward secrecyColluding attacksV2V, V2I

2.2.3. Hybrid Authentication

Authentications can also be obtained through combinations of batch, group, mutual, cooperative, hybrid, and other verification mechanisms [91]. This combination of different authentication techniques is referred to as hybrid authentication. The following are the works carried out by various authors pertaining to the combination of different verification schemes. Tan et al. [92] proposed a certificate-less authentication scheme for efficient road message dissemination in vehicular ad hoc networks. Their proposed work combines both group and mutual authentication mechanisms, thereby mitigating forgery and replay attacks. The scheme has to improve a lot with respect to the handling of other types of attacks. Altaf et al. [93] proposed a privacy-preserving localized hybrid authentication scheme that is more efficient for large-scale VANETs, thereby eliminating the problems of central dependence on trusted authorities, frequent updates, and latency. Their proposed work resists open side-channel attacks. The verification costs have to be reduced further. Xue et al. [94] came up with a distributed authentication scheme by addressing the problems of central dependency on trusted authorities, roaming fraud, and single point failure. Their proposed work is based on blockchain-based technology that can be utilized for mobile vehicular networks. It offers roaming services efficiently and it is resistant to forgery, modification, replay, and man-in-the-middle attacks. However, authentication delays that need to be addressed still persist. Vijayakumar et al. [95] came up with a privacy-preserving mutual and batch authentication mechanism for the Internet of Things in a vehicular environment. The scheme can be utilized for safety-critical applications. The limitations are that the computation cost has to be reduced further, and that the key distribution and key management strategies have to be enhanced further. Table 7 depicts the classification of various works on hybrid authentication schemes along with their methodologies, challenges, and limitations.
Table 7. Classification of hybrid-authentication-based certificate-less aggregate signature schemes.
Table 7. Classification of hybrid-authentication-based certificate-less aggregate signature schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Tan et al. [92]Bilinear pairing, road message priority management the and dissemination
Mechanism
Road message dissemination, unforgeability, forward secrecy, session key establishment, mutual authenticationAdaptive chosen message, replay attacksV2V, V2I
Altaf et al. [93]Gap Diffie–Hellman group bilinear pairingLeakage resilience, low latency, localization, conditional anonymity, privacy preservation, role separationRSU workload, open side-channel, key exposure, forgery, impersonation attacksV2V, V2I
Xue et al. [93]Blockchain, roaming, elliptic curves, authentication protocol, Bloom filter, undeniable billing schememutual authentication, forward/backward secrecy, revocation, unforgeability, undeniabilityModification, replay, man-in-the-middle attacksV2V, V2I, V2P
Vijayakumar et al. [95]Bilinear mapsAnonymity, identity privacy preservation Forgery attackV2V

2.2.4. Smart-Card-Based Authentication Schemes

The smart-card-based authentication scheme provides a means for verifying the vehicle with its corresponding components in VANETs, such as trusted authority and Road-side Units, via the use of a physical card which is accompanied by a smart card reader and has software installed at the Road-side Units or at the trusted authority. Researchers have made a significant research contribution since this method involves the use of commercially feasible, available, cheap, low-cost, powerful, secure, and efficient smart cards. This consists of the consideration of two-factor, three-factor, or multi-factor considerations while performing authentication, in order to ensure the security and the privacy of VANETs.
i. Two-Factor Authentication schemes: Lu et al. [96] proposed an anonymous two-factor-based key agreement scheme for a session initiation protocol, utilizing elliptic curves. Lu et al. proposed in order to overcome the pitfalls of the other smart-card-based authentication protocols. The proposed scheme is efficient against user identity tracing, stolen smart card, key compromise, masquerading, and off-line password guessing attacks. Zhou et al. [97] proposed a bitcoin-based simplified payment verification protocol. The proposed protocol is efficient and secure, which incurs very low computation and communication costs when compared with its counterparts. Zhang et al. [98] proposed a two-factor authentication protocol that utilized elliptic curves to ensure user anonymity. The proposed work has been more efficient in alleviating various security attacks. Table 8 highlights the classification of various smart-card-based two-factor authentication schemes
ii. Three-Factor Authentication Schemes: Wang et al. [99] proposed a three-factor authentication protocol that utilized elliptic curves and a fuzzy extractor algorithm, in order to ensure privacy preservation and traceability. The proposed protocol has been efficient against replay, off-line password guessing, impersonation, stolen smart card, man-in-the-middle, and insider attacks. It is more suitable for both V2V and V2I Communications. Wazid et al. [100] proposed a secure three-factor authentication scheme for energy-based smart grid environments. The proposed work utilized smart cards. The proposed work achieves a better trade-off between security and privacy than its counterparts. Xu et al. [101] came up with a three-factor authentication scheme for VANETs in order to ensure privacy preservation and user anonymity. The algorithm suffers a serious drawback in central dependency. When trusted authority gets affected, it is impossible for it to function, which is a disadvantage. Duan et al. [102] also came up with a three-factor authentication scheme in order to ensure security and privacy. It also suffers from a central dependency on the trusted servers, which poses a disadvantage. Table 9 represents the classification of various smart-card-based three-factor authentication schemes.
iii. Multi-factor Authentication Schemes: Hegde et al. [103] proposed a multi-factor zero-knowledge proof-based authentication scheme in order to ensure full privacy preservation. Since the proposed scheme is based on biometrics, it is highly secure. Kebande et al. [104] came up with a blockchain-enabled multi-factor authentication model for a cloud-enabled Internet of vehicles environment. The proposed work utilized an embedded probabilistic polynomial time algorithm, which proves its efficiency by considerably overcoming the security threats. Table 10 represents the classification of various types of multi-factor-based authentication schemes.

2.2.5. Hardware-Based Authentication

i. Physical Unclonable Function based Hardware Authentication Scheme: Umar et al. [105] proposed a secure-identity-based anonymous inter-vehicular authentication protocol that used physically unclonable functions in VANETs to achieve privacy preservation. Though the proposed protocol is efficient, it still suffers from a high communication cost of 2976 bits. Significantly, the proposed work achieves computational efficiency. Therefore, the authentication delay will be high, which makes it infeasible for high-speed dynamic varying environments like VANETs. Othman et al. [106] addressed the problem of secure message transmission in vehicular communications. The security issue was addressed by utilizing a physically secure privacy-preserving message authentication protocol that utilized a physical unclonable function (PUF). The proposed protocol is efficient for security and privacy against passive and active attacks, even under memory leakage. The proposed protocol is efficient in achieving computation efficiency, but it still suffers from high communication costs, which need to be addressed. Table 11 represents the classification of the various types of physically unclonable function-based hardware authentication schemes. ii. RFID based Hardware Authentication Scheme: Akram et al. [107] proposed a secure and energy efficient RFID-based authentication scheme that utilized vehicular clouds. The proposed work achieves a high computation efficiency by reducing unwanted overheads, but it still suffers from high communication costs, which makes it bad. This will increase the communication delay in dynamic varying environments like VANETs. Table 12 represents the classification of the various types of RFID-based hardware authentication schemes.

2.2.6. Other Authentication Schemes

Guanquan et al. [108] addressed the problem of high computation overheads due to certificate management, key escrow problems, and central dependence on trusted authorities. A signature-enhanced certificate-less signature authentication protocol can be utilized for Vehicle-to-Infrastructure communications. The proposed work mitigates information injection attacks. This work follows elliptic curve cryptography (ECC)-based RFID authentication. The group management of vehicles in urban scenarios needs to be investigated further. Cui et al. [109] came up with an authentication scheme to reduce the problem of computation and communication overheads. Since vehicles need to store certificate revocation lists (CRLs), they are wasting storage and communication resources. The scheme uses pseudonym-based batch authentication. A limitation is that the scheme uses expensive operation-like bilinear pairings, which poses a disadvantage. Liang et al. [110] proved that certificate-less aggregation schemes are insecure and are prone to the forgery of signatures; thus, they proposed a new scheme. Their scheme involves conditional privacy preservation for the Internet of vehicles, which can be utilized for both V2V and V2I communications. Validations and security improvements are to be considered for future work. Ullah et al. [111] came up with an authentication scheme to ensure the legibility and confidentiality of message during transmission. Liao et al. [112] addressed the problems of authentication and privacy. Their scheme utilized an ECC-based RFID authentication scheme. The practicability of the proposed scheme is to be investigated further. Pino Caballero-Gil et al. [113,114] addressed the problem of the revocation of vehicles. The performance of the revocation of vehicles has to be improved. The scheme utilized tree-based revocation, which used ID-based authentication. The proposed scheme is resistant to side-channel leakage attacks, and many security constraints are yet to be addressed. Hathal et al. [115] proposed a certificate-less lightweight authentication scheme. The scheme is a broadcast authentication protocol that is well-suited for V2V and V2I communications. Their scheme utilized symmetric authentication to achieve computation and communication efficiency. The major problem is that the execution time takes the verification of the vehicles and the signature based on the trajectory information of the vehicles, which is impossible in cases of scarce environments. Table 13 represents the classification of the various types of other types of authentication schemes in VANETs.
i. Signcryption: Ullah et al. [111] addressed the problem of ensuring the credibility of the transmitted data on an open wireless channel to provide receiver anonymity (only the sender knows the identity of the receiver). The authors proposed an encryption scheme with a hyperelliptic curve for an Internet of vehicles scenario that can be utilized for V2V and V2I communications. The limitations are that the scheme avoids receiver anonymity in open wireless channels.
ii. Homomorphic Encryption: Lv et al. [116] addressed the problem of computational efficiency, which is directly proportional to that of the speed and coverage of the Road-side Units, which has an adverse effect on the safety of the vehicles. To maintain the route of the particular vehicle without being exposed, a privacy-preserving lightweight authentication scheme, utilized for Vehicle-to-Infrastructure communication. The proposed scheme utilized Moore curves, which are a protected via a homomorphic encryption technique. The scheme achieves fast authentication, which is suitable for dynamic mobile environments like VANETs. Though the proposed algorithm achieves computational efficiency, the increase in the number of Road-side Units increases the overhead considerably, which remains a drawback.
iii. Genetic Algorithm: Ghadeer et al. [117] addressed the problem of privacy-aware secure routing, which employs an elliptic-curve-based genetic algorithm that achieves a good authentication performance. The proposed routing strategy based its concept on the optimal distribution of Road-side Units. The proposed algorithm achieves a good performance in terms of energy efficiency, packet delivery ratio, overhead, and packet loss. The proposed algorithm effectively mitigates Sybil and black-hole attacks efficiently. Further contributions can be made in optimizing the distribution of Road-side Units in VANETs [113].
iv. Modeling: Iqbal et al. [118] proposed an IoT-based formal vehicle life integration model, which is based on the fog-based Road-side Units to assist vehicular communication in cases of emergency and life-critical situations. The proposed work incorporates unified modeling language (UML), graph theory, and VDM-SL (Vienna Development Method-Specification Language), which are suitable for vehicle–vehicle communication. The proposed work achieves its efficiency in detecting the flaws, thereby ensuring the security and the accuracy of the system. Boneh–Goh–Nissim (BGN) [119] a homomorphic encryption technique to ensure confidentiality but the major drawback is the computational overhead it faces. Jenefa et.al [120] came up with a survey that emphasize on various means of modeling techniques utilized to design a security scheme that will benefit the data transmission in vehicular ad hoc networks.
Table 8. Classification of smart card (two-factor) authentication schemes.
Table 8. Classification of smart card (two-factor) authentication schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Lu et al. [96]Elliptic curves, Session Initiation Protocol (SIP), two-factor authenticationAnonymity, forward secrecyTracing, pre-authentication, key compromise masquerading, off-line password guessing attacksV2V, V2I
Zhou et al. [97]Elliptic curves, Bitcoin Simple Payment verification protocol (SPV)User anonymityForgery, smart card stolen, privileged insider, off-line password guessing attacks-
Zhang et al. [98]Elliptic curves, two-factor remote authentication protocolUser anonymity, forward secrecyreplay, man-in-the-middle, impersonation, stolen-verifier table, offline dictionary, insider, stolen smart card, off-line password guessing, key exposure-
Table 9. Classification of smart card (three-factor) authentication schemes.
Table 9. Classification of smart card (three-factor) authentication schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Wang et al. [99]Elliptic curves, fuzzy extractor algorithm, three-factor authentication protocolPrivacy preservation, user anonymity, traceability, perfect forward secrecyReplay, off-line password guessing, impersonation, stolen smart card, MitM, insider attacks V2V, V2I
Wazid et al. [97]Elliptic curves, bitwise XOR, three-factor user authentication schemeAnonymity, untraceabilityPassword attack, replay, man-in-the-middle, privileged insider, user impersonation IoV, Smart Grid
Xu et al. [101]Elliptic curves, fuzzy extractor, three-factor authentication schemePrivacy preservation, anonymity, untraceability, forward/backward secrecyReplay, off-line password guessing, impersonation, smart card loss, MitMV2V, V2I
Duan et al. [102]Elliptic curves, fuzzy extractor, three-factor authentication Anonymity, untraceability, perfect forward secrecyReplay, off-line password guessing, impersonation, stolen smart card, MitM,
insider Attacks
V2V, V2I, V2C
Table 10. Classification of multi-factor authentication schemes.
Table 10. Classification of multi-factor authentication schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Hegde et al. [103]Multi-factor zero-knowledge proof authenticationUser identity verification, privacy preservation, untraceability, location privacyReplay, off-line password guessing, impersonation, smart card loss, man-in-the-middle, insider attacksV2V, V2I
Kebande et al. [104]Elliptic curves, blockchain,
multi-factor authentication embedded probabilistic polynomial time algorithm (ePPTA)
Confidentiality, integrity, availabilityForking blockchain attacksV2V, V2C, IoV
Table 11. Classification of hardware-physical-unclonable-function-based authentication schemes.
Table 11. Classification of hardware-physical-unclonable-function-based authentication schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Umar et al. [105]Physically unclonable function (PUFs), XOR functionVehicle anonymity, traceability, forward secrecyPhysical attack, impersonation, desynchronization, vehicle/RSU V2I
Othman et al. [106]Physically unclonable function (PUFs), pairwise temporal secret keys (PTKs), polynomial-based encryption, fuzzy extractorPrivacy preservation, message authentication, integrity, physical protection, confidentiality, untraceabilityKnown passive, active, DoS, collusion, impersonation, replay, man-in-the-middle attacksV2V
Table 12. Classification of hardware-RFID-tag-based authentication schemes.
Table 12. Classification of hardware-RFID-tag-based authentication schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Akram et al. [107]RFID authentication scheme, chaotic mapTag anonymity, untraceabilityImpersonation, ephemeral secret leakage (ESL), man-in-the-middle, synchronization attackV2V, V2C, V2D, V2I
Table 13. Classification of other authentication schemes.
Table 13. Classification of other authentication schemes.
SchemesMethodologyRequirementAttack ResistivityScenario
Guanquan et al. [108]Elliptic curvesMessage authentication, privacy preservation, traceabilityInformation injection, signature tampering attackV2I
Cui et al. [109]Elliptic curvesmessage integrity, non-repudiation, identity privacy preservation, traceability, revocationChosen message, signature forgery, man-in-the-middle, replay attacksV2V, V2I
Ullah et al. [111]Hyperelliptic curves (HEC), signcryptionconfidentiality, unforgeability, receiver anonymitySignature forgery attackV2V, V2I, V2X, IoV
Hathal et al. [115]Elliptic curves, HMAC, authentication tokens, Schnorr signature, TESLA broadcast authentication protocol, Chinese remainder theorem (CRT)Authentication, integrity, non-repudiation, confidentialityImpersonation, message modification, replay, DoS attacksV2V, V2I, IoV
Lv et al. [116]Moore curves, homomorphic encryption Privacy preservation, identity anonymity, route plan privacy Location privacy attacksV2I
Ghadeer et al. [117]Elliptic curves, genetic algorithmSecurity, privacySybil, black-hole AttacksV2V, V2I
Iqbal et al. [118]IoT, graph theory, (UML) modeling, Broadcast Emergency Message AlgorithmSecurity, privacy-V2V, V2P, V2D, V2S, IoV

3. Performance Comparison of Different Certificate-Less Aggregate Signature Schemes

In the existing literature, the major work has been focused on privacy preservation (conditional), anonymity, and privacy, thereby reducing the computation and communication costs, and the delay involved in authenticating the messages prior to their transmission. The existing literature utilized the communication cost calculated in bytes and the computation cost calculated in milliseconds per message as parameters, in order to evaluate the performance of the proposed authentication schemes. Some of the important benchmarks have been chosen and are analyzed for the comparison, and the insights have been presented.
Table 14 and Table 15 show the comparison of the signature verification schemes (batch vs group) based on the attacks mitigated and their performance aspects. From these tables, it is inferred that batch-based signature verification schemes are highly resistant to signature forgery, replay, modification, impersonation, man-in-the-middle, stolen-verifier tables, denial-of-service, and coalition attacks. In order to achieve a high efficiency in terms of computation, group-based elliptic curve cryptography provides high privacy and security towards various kinds of attacks. It is also evident that group-based signature verification exhibits high communication costs, since a single global public key occupies its place in determining its security and privacy aspects. Table 16 and Table 17 show the comparison of the authentication schemes (mutual, cooperative, and hybrid) based on the attacks mitigated and their performance aspects. From these tables, it is apparent that mutual authentication is inefficient in addressing attacks such as message modification, malicious, open side-channel, free riding, key exposure, collusion, and tracking attacks. It is also evident that cooperative authentication schemes are efficient against forgery, malicious, DoS, free riding, collusion, and tracking attacks. The hybrid authentication schemes combine either mutual and batch or mutual and group-based authentication schemes, which makes them highly efficient, more so than all the other authentication methods. Also, it can be seen from Table 14, Table 15, Table 16 and Table 17 that mutual authentication is used when smart cards are preferred. In the case of hybrid authentication, communication costs are high when compared with mutual and cooperative authentication schemes. From Table 18, it is inferred that the smart-card-based two-factor authentication schemes exhibit higher performance when countering attacks, while three-factor does not. When the number of consideration factors increases, the increase in the central dependence on trusted authorities also increases, this increases the communication and computation costs. From Table 19, it is apparent that two-factor authentication schemes achieve high computation efficiency when compared with their counterparts. Table 20 and Table 21 show the comparison of hardware-based authentication schemes in terms of the attacks mitigated and their performance aspects, either by using physical unclonable functions (PUFs) or radio-frequency identification (RFID) tags. From Table 17, Table 18, Table 19 and Table 20, it is evident that the physical-unclonable-function-based hardware authentication scheme exhibits a high performance in countering most of the attacks, while the radio frequency identification-based hardware authentication scheme exhibits inefficiency against achieving anonymity, traceability, replay, man-in-the-middle, impersonation, and physical and forward secrecy attacks. Among these, two-factor physical-unclonable-function-based authentication schemes also eliminate the need for relying on tamper-proof devices where physical capture attacks are possible. Both of these authentication schemes achieve low computation but high communication costs. Hence, physical-unclonable-function-based hardware authentication schemes are highly preferred, because when the radio-frequency identification tag gets lost or damaged, it would be impossible to achieve the desired authentication.

4. Conclusions

Intelligent Transportation Systems act as a backbone for any smart city. Vehicular ad hoc networks are the underneath infrastructure that provide the functioning of Intelligent Transportation Systems. Since they operate via open wireless communication channels, data have to be secured and protected prior to their transmission. Therefore, in this paper, a survey based on signature verification schemes (batch vs. group) and different authentication methods has been classified. The schemes are identified based on their security requirements, the attacks mitigated, and the scenario they suit. This has been depicted in Section 2. To further evaluate the study, a comparison of the attacks encountered by the various schemes and a performance comparison based on the computation and communication costs, obtained by selecting the chosen benchmarks, has been depicted in Section 3. Further insight has been provided into the schemes and their suitability for different scenarios is presented. It is apparent that the combination of certificate-less procedures has proved its effectiveness; still, there is a need to reduce the computation and the communication overhead incurred. Hence, the designing of lightweight certificate-less authentication or aggregation schemes is needed. The use of invalid signature schemes needs to be investigated in the near future. Due to high mobility, limited computation resources, and shorter connectivity, it is much better to assume that research is currently focusing on lightweight certificate-less schemes, rather than invalid signature schemes. Finally, the proliferation of artificial-intelligence-based autonomous cars and vehicles will accelerate this arena in the future. Thus, VANETs-based authentication schemes need to be integrated into artificial intelligence and machine learning smart grid systems.

Funding

We thank Vellore Institute of Technology, Vellore, Tamilnadu, India for providing funding for this manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

There are no data available for this manuscript.

Conflicts of Interest

The authors declare there are no conflicts of interest.

References

  1. Zhang, C.; Lu, R.; Lin, X.; Ho, P.H.; Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 816–824. [Google Scholar]
  2. Chesterton. How Many Cars Are There in the World? 2018. Available online: https://www.carsguide.com.au/car-advice/how-many-cars-are-there-in-the-world-70629 (accessed on 28 August 2019).
  3. Hao, Y.; Cheng, Y.; Zhou, C.; Song, W. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs. IEEE J. Sel. Areas Commun. 2011, 29, 616–629. [Google Scholar] [CrossRef]
  4. Liu, B.; Zhang, L. An improved identity-based batch verification scheme for VANETs. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, Xi’an, China, 9–11 September 2013; pp. 808–814. [Google Scholar]
  5. Jiang, D.; Delgross, L. IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In Proceedings of the VTC Spring 2008—IEEE Vehicular Technology Conference, Singapore, 11–14 May 2008; IEEE: New York, NY, USA, 2008; p. 2036. [Google Scholar]
  6. Qu, F.; Wang, F.-Y.; Yang, L. Intelligent transportation spaces: Vehicles, traffic, communications, and beyond. IEEE Commun. Mag. 2010, 48, 136–142. [Google Scholar] [CrossRef]
  7. Aman, M.N.; Chua, K.C.; Sikdar, B. Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet Things J. 2017, 4, 1327–1340. [Google Scholar] [CrossRef]
  8. Misener, J.A. Vehicle-infrastructure integration (vii) and safety: Rubber and radio meets the road in California. Intellimotion 2005, 11, 1–3. [Google Scholar]
  9. Ismail, S.; Tahat, N.M.F.; Ahmad, R.R. A new digital signature scheme based on factoring and discrete logarithms. J. Math. Stat. 2008, 4, 222–225. [Google Scholar]
  10. Lin, Q.; Li, J.; Huang, Z.; Chen, W.; Shen, J. A Short Linearly Homomorphic Proxy Signature Scheme. IEEE Access 2018, 6, 12966–12972. [Google Scholar] [CrossRef]
  11. Ibrahim, S.; Hamdy, M.; Shaaban, E. Towards an optimum authentication service allocation and availability in VANETs. Int. J. Netw. Sec. 2017, 19, 955–965. [Google Scholar]
  12. Castro, R.; Dahab, R. Efficient certificate-less signatures suitable for aggregation. IACR Cryptol. 2007, 2007, 453–478. [Google Scholar]
  13. Shamir, A. Identity-based cryptosystem and signatures schemes. In Advances in Cryptology; Blakley, G.R., Chaum, D., Eds.; Springer: Berlin/Heidelberg, Germany, 1984; pp. 47–53. [Google Scholar]
  14. Al-Riyami, S.S.; Paterson, K.G. Certificate-less public key cryptography. In Proceedings of the International Conference on theory and Application of Cryptology and Information Security, Taipei, Taiwan, 30 November–4 December 2003; Springer: Berlin, Heidelberg, Germany, 2003; pp. 452–473. [Google Scholar]
  15. Li, J.; Yan, H.; Zhang, Y. Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans. Serv. Comput. 2018, 14, 71–81. [Google Scholar] [CrossRef]
  16. Hakuta, K.; Katoh, Y.; Sato, H.; Takagi, T. Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures. In Information Security and Cryptology—ICISC ICISC Lecture Notes in Computer Science; Kwon, T., Lee, M.K., Kwon, D., Eds.; Springer: Berlin, Heidelberg, Germany, 2013. [Google Scholar] [CrossRef]
  17. Vallent, T.; Hanyurwimfura, D.; Mikeka, C. Efficient Certificate-Less Aggregate Signature Scheme with Conditional Privacy-Preservation for Vehicular Ad Hoc Networks Enhanced Smart Grid System. Sensors 2021, 21, 2900. [Google Scholar] [CrossRef]
  18. Kamil, I.A.; Ogundoyin, S.O. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. J. Inf. Secur. Appl. 2018, 44, 184–200. [Google Scholar] [CrossRef]
  19. Cui, J.; Zhang, J.; Zhong, H.; Shi, R.; Xu, Y. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Inf. Sci. 2018, 451-452, 1–15. [Google Scholar] [CrossRef]
  20. Tseng, H.R.; Jan, R.H.; Yang, W.; Jou, E. A Secure Aggregated Message Authentication Scheme for Vehicular Ad hoc Networks. In Proceedings of the 18th World congress on Intelligent Transportation Systems, Orlando, FL, USA, 16–20 October 2011; Volume 10, pp. 1–14. [Google Scholar]
  21. Bouakkaz, S.; Semchedine, F. A certificateless ring signature scheme with batch verification for applications in VANET. J. Inf. Secur. Appl. 2020, 55, 102669. [Google Scholar] [CrossRef]
  22. Guo, R.; Xu, L.; Li, X.; Zhang, Y.; Li, X. An Efficient Certificateless Ring Signcryption Scheme with Conditional Privacy-Preserving in VANETs. J. Syst. Arch. 2022, 129, 102633. [Google Scholar] [CrossRef]
  23. Ye, X.; Xu, G.; Cheng, X.; Li, Y.; Qin, Z. Certificateless-Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2021, 2021, 6677137. [Google Scholar] [CrossRef]
  24. Wang, H.; Wang, L.; Zhang, K.; Li, J.; Luo, Y. A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs. IEEE Access 2022, 10, 15605–15618. [Google Scholar] [CrossRef]
  25. Chen, Y.; Chen, J. CPP-CLAS: Efficient and Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for VANETs. IEEE Internet Things J. 2021, 9, 10354–10365. [Google Scholar] [CrossRef]
  26. Han, Y.; Song, W.; Zhou, Z.; Wang, H.; Yuan, B. eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication. IEEE Syst. J. 2021, 16, 1637–1648. [Google Scholar] [CrossRef]
  27. Thumbur, G.; Rao, G.S.; Reddy, P.V.; Gayathri, N.B.; Reddy, D.V.R.K.; Padmavathamma, M. Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Internet Things J. 2020, 8, 1908–1920. [Google Scholar] [CrossRef]
  28. Gayathri, N.B.; Thumbur, G.; Kumar, P.R.; Rahman, Z.U.; Reddy, P.V.; Lay-Ekuakille, A. Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 2019, 6, 9064–9075. [Google Scholar] [CrossRef]
  29. Zhou, X.; Luo, M.; Vijayakumar, P.; Peng, C.; He, D. Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Veh. Technol. 2022, 71, 7863–7875. [Google Scholar] [CrossRef]
  30. Wang, Z.; Zhang, J.; Liu, Y.; Lu, M.; Ying, Z.; Ma, J. A certificateless authentication scheme with fuzzy batch verification for federated UAV network. Int. J. Intell. Syst. 2022, 37, 6048–6079. [Google Scholar] [CrossRef]
  31. Wang, Y.; Liu, Y.; Tian, Y. ISC-CPPA:Improverd-Security Certificateless Conditional Privacy-Preserving Authentication Scheme with Revocation. IEEE Trans. Veh. Technol. 2022, 71, 12304–12314. [Google Scholar] [CrossRef]
  32. Ogundoyin, S.O.; Kamil, I.A. An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy. Veh. Commun. 2021, 31, 100384. [Google Scholar] [CrossRef]
  33. Yang, Y.; Zhang, L.; Zhao, Y.; Choo, K.-K.R.; Zhang, Y. Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. IEEE Trans. Inf. Forensics Secur. 2022, 17, 317–331. [Google Scholar] [CrossRef]
  34. Zeng, P.; Guo, R.; Ma, Y.; Gao, Y.; Zhao, G. Provable Security Certificate-less Authentication Scheme for Vehicular Ad hoc Network. J. Electron. Inf. Technol. 2020, 42, 2873–2881. [Google Scholar] [CrossRef]
  35. Li, J.; Zhang, Y. Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs. Wirel. Pers. Commun. 2019, 111, 1255–1269. [Google Scholar] [CrossRef]
  36. Liu, Y.; Wang, L.; Chen, H.-H. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2014, 64, 3697–3710. [Google Scholar] [CrossRef]
  37. Ji, S.; Gui, Z.; Zhou, T.; Yan, H.; Shen, J. An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services. IEEE Access 2018, 6, 69603–69611. [Google Scholar] [CrossRef]
  38. Zhong, H.; Han, S.; Cui, J.; Zhang, J.; Xu, Y. Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 2018, 476, 211–221. [Google Scholar] [CrossRef]
  39. Hu, X.; Ma, C.; Jiang, W. Forgery Attack And Improvement on Certificateless Aggregate Signature Schemes As Cases In Courses For Ideological And Political Education Based on Vehicular Networking Technology. In Proceedings of the 2021 2nd International Conference on Information Science and Education (ICISE-IE), Chongqing, China, 26–28 November 2021; pp. 264–267. [Google Scholar] [CrossRef]
  40. Xie, Y.; Zhang, S.; Li, X.; Li, Y.; Chai, Y. CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving. Secur. Commun. Netw. 2019, 2019, 5860286. [Google Scholar] [CrossRef] [Green Version]
  41. Song, C.; Zhang, M.; Jia, Z.; Peng, W.; Guo, H. A lightweight batch anonymous authentication scheme for VANET based on pairing-free. Comput. Sci. Inf. Syst. 2018, 15, 549–567. [Google Scholar] [CrossRef] [Green Version]
  42. Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 2019, 18, 722–735. [Google Scholar] [CrossRef] [Green Version]
  43. Siregar, S.D.; Banjarnahor, J.; Dharshinni, N.P.; Tamba, S.P.; Robin. Understanding group signature methods in making digital signatures to maintain the validity of messages. J. Phys. Conf. Ser. 2019, 1230, 012072. [Google Scholar] [CrossRef]
  44. Tan, H.; Gui, Z.; Chung, I. A Secure and Efficient Certificateless Authentication Scheme with Unsupervised Anomaly Detection in VANETs. IEEE Access 2018, 6, 74260–74276. [Google Scholar] [CrossRef]
  45. Ali, I.; Gervais, M.; Ahene, E.; Li, F. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. J. Syst. Arch. 2019, 99, 101636. [Google Scholar] [CrossRef]
  46. Xu, Z.; He, D.; Kumar, N.; Choo, K.-K.R. Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. Secur. Commun. Netw. 2020, 2020, 5276813. [Google Scholar] [CrossRef]
  47. Wang, X.; Jia, W.; Qin, H. An improved secure and efficient certificate-less conditional privacy-preserving authentication scheme in VANETs. In Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Online, 5 December 2020; pp. 496–503. [Google Scholar] [CrossRef]
  48. Ming, Y.; Shen, X. PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks. Sensors 2018, 18, 1573. [Google Scholar] [CrossRef] [Green Version]
  49. Zheng, Y.; Chen, G.; Guo, L. An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature. Complexity 2020, 2020, 1378202. [Google Scholar] [CrossRef]
  50. Li, C.; Zhang, X.; Wang, H.; Li, D. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks. Sensors 2018, 18, 194. [Google Scholar] [CrossRef] [Green Version]
  51. Kamil, I.A.; Ogundoyin, S.O. A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities. J. Inf. Secur. Appl. 2021, 63, 102994. [Google Scholar] [CrossRef]
  52. Hongzhen, D.; Qiaoyan, W.; Shanshan, Z.; Mingchu, G. A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks. Chin. J. Electron. 2021, 30, 947–955. [Google Scholar] [CrossRef]
  53. Yang, M.; Chen, J.; Chen, Y.; Ma, R.; Kumar, S. Strong key-insulated secure and energy-aware certificateless authentication scheme for VANETs. Comput. Electr. Eng. 2021, 95, 107417. [Google Scholar] [CrossRef]
  54. Zhong, H.; Pan, L.; Zhang, Q.; Cui, J. A New Message Authentication Scheme for Multiple Devices in Intelligent Connected Vehicles Based on Edge Computing. IEEE Access 2019, 7, 108211–108222. [Google Scholar] [CrossRef]
  55. Zhao, N.; Zhang, G. Privacy-Protected Certificate-less Aggregate Signature Scheme in VANET. In Proceedings of the 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 23–25 October 2019; pp. 1–6. [Google Scholar] [CrossRef]
  56. Hu, X.; Tan, W.; Yan, J.; Ma, C. Security and Improvement of Aggregate Signature Scheme for Underwater Wireless Sensor Networks and Certificate-less Aggregate Signature Scheme for Vehicular Ad Hoc Networks. In Proceedings of the 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), Harbin, China, 25–27 December 2020; pp. 574–577. [Google Scholar] [CrossRef]
  57. Hu, X.; Tan, W.; Yu, C.; Ma, C.; Xu, H. Security Analysis of Certificate-less Aggregate Signature Scheme in VANETs. Prceedings of the 12th International Congress on Image and Signal Processing, Bio-Medical Engineering and Informatics (CISP-BMEI), Suzhou, China, 19–21 October 2019; pp. 1–6. [Google Scholar] [CrossRef]
  58. Hu, X.; Tan, W.; Ma, C.; Chen, F.; Yu, C. Study on Security Analysis and Efficient improvement of Certificate-less Aggregate Signature Scheme. In Proceedings of the IEEE 11th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 16–18 October 2020; pp. 343–346. [Google Scholar] [CrossRef]
  59. Tomar, A.; Tripathi, S. BCAV: Blockchain-based certificateless authentication system for vehicular network. Peer-to-Peer Netw. Appl. 2022, 15, 1733–1756. [Google Scholar] [CrossRef]
  60. Song, J.; He, C.; Zhang, L.; Tang, S.; Zhang, H. Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Commun. 2014, 11, 93–103. [Google Scholar] [CrossRef]
  61. Parthiban, N.; Dheepa, G. CSBA: Secure Certificate-less Aggregate Signature-Based Authentication Scheme for Vehicular Ad-Hoc Networks. Nat. Volatiles Essent. Oils 2021, 8, 16244–16251. [Google Scholar]
  62. Yang, X.; Chen, A.; Wang, Z.; Du, X.; Wang, C. Cryptanalysis of an Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks. Secur. Commun. Netw. 2022, 2022, 4472945. [Google Scholar] [CrossRef]
  63. Dewangan, R.; Altaf, F.; Maity, S. Certificate-less Aggregate Message Authentication for Hierarchical Trusted Authority based VANET. In Proceedings of the 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 27–29 March 2019; pp. 429–434. [Google Scholar] [CrossRef]
  64. Thorncharoensri, P.; Susilo, W.; Baek, J. Aggregatable Certificateless Designated Verifier Signature. IEEE Access 2020, 8, 95019–95031. [Google Scholar] [CrossRef]
  65. Chattaraj, D.; Bera, B.; Das, A.K.; Saha, S.; Lorenz, P.; Park, Y. Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation. IEEE Trans. Veh. Technol. 2021, 70, 8092–8107. [Google Scholar] [CrossRef]
  66. Mei, Q.; Xiong, H.; Chen, J.; Yang, M.; Kumari, S.; Khan, M.K. Efficient Certificateless Aggregate Signature with Conditional Privacy Preservation in IoV. IEEE Syst. J. 2020, 15, 245–256. [Google Scholar] [CrossRef]
  67. Cahyadi, E.F.; Su, T.-W.; Yang, C.-C.; Hwang, M.-S. A certificateless aggregate signature scheme for security and privacy protection in VANET. Int. J. Distrib. Sens. Netw. 2022, 18, 1–21. [Google Scholar] [CrossRef]
  68. Malhi, A.K.; Batra, S. An efficient Certificate-less aggregate signature scheme for vehicular ad hoc networks. Discret. Math. Comput. Sci. 2015, 17, 317–338. [Google Scholar]
  69. Cui, M.; Han, D.; Wang, J. An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing. IEEE Internet Things J. 2019, 6, 9076–9084. [Google Scholar] [CrossRef]
  70. Yao, M.; Wang, X.; Gan, Q.; Lin, Y.; Huang, C. An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs. Secur. Commun. Netw. 2021, 2021, 6698099. [Google Scholar] [CrossRef]
  71. Dewanta, F.; Mambo, M. A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment. IEEE Access 2019, 7, 103095–103114. [Google Scholar] [CrossRef]
  72. Fang, D.; Qian, Y.; Hu, R.Q. A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications. IEEE Internet Things J. 2020, 7, 3474–3484. [Google Scholar] [CrossRef]
  73. Gope, P.; Das, A.K. Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services. IEEE Internet Things J. 2017, 4, 1764–1772. [Google Scholar] [CrossRef]
  74. Mbarek, B.; Ge, M.; Pitner, T. An Efficient Mutual Authentication Scheme for Internet of Things. Internet Things 2020, 9, 100160. [Google Scholar] [CrossRef]
  75. Zhu, Y.; Guan, Z.; Wang, Z.; Li, D.; Wang, Y.; Xu, M. SRAM-PUF Based Lightweight Mutual Authentication Scheme for IoT. In Proceedings of the 2021 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, 30 September–3 October 2021; pp. 806–813. [Google Scholar] [CrossRef]
  76. Xi, N.; Li, W.; Jing, L.; Ma, J. ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV. IEEE Internet Things J. 2022, 9, 22903–22913. [Google Scholar] [CrossRef]
  77. Noura, H.N.; Melki, R.; Chehab, A. Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems. In Proceedings of the IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–7. [Google Scholar] [CrossRef]
  78. Alsahlani, A.Y.F.; Popa, A. LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. J. Netw. Comput. Appl. 2021, 192, 103177. [Google Scholar] [CrossRef]
  79. Alshawish, I.; Al-Haj, A. An efficient mutual authentication scheme for IoT systems. J. Supercomput. 2022, 78, 16056–16087. [Google Scholar] [CrossRef]
  80. Fan, K.; Luo, Q.; Zhang, K.; Yang, Y. Cloud-based lightweight secure RFID mutual authentication protocol in IoT. Inf. Sci. 2019, 527, 329–340. [Google Scholar] [CrossRef]
  81. Jan, S.U.; Abbasi, I.A.; Alqarni, M.A. LMAS-SHS: A Lightweight Mutual Authentication Scheme for Smart Home Surveillance. IEEE Access 2022, 10, 52791–52803. [Google Scholar] [CrossRef]
  82. Yang, M.; Wei, S.; Jiang, R.; Ali, F.; Yang, B. Single-message-based cooperative authentication scheme for intelligent transportation systems. Comput. Electr. Eng. 2021, 96, 107390. [Google Scholar] [CrossRef]
  83. Jing, T.; Pei, Y.; Zhang, B.; Hu, C.; Huo, Y.; Li, H.; Lu, Y. An efficient anonymous batch authentication scheme based on priority and cooperation for VANETs. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 277. [Google Scholar] [CrossRef]
  84. Xie, Y.; Zhang, S.; Li, X.; Li, Y. An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks. Int. J. Distrib. Sens. Netw. 2019, 15, 1–13. [Google Scholar] [CrossRef]
  85. Lin, X.; Li, X. Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2013, 62, 3339–3348. [Google Scholar] [CrossRef]
  86. Jo, H.J.; Kim, I.S.; Lee, D.H. Reliable Cooperative Authentication for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2017, 19, 1065–1079. [Google Scholar] [CrossRef]
  87. Tayan, O.; Kabir, M.N.; Alginahi, Y.M. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents. Sci. World J. 2014, 2014, 514652. [Google Scholar] [CrossRef] [Green Version]
  88. Tan, H.; Choi, D.; Kim, P.; Pan, S.; Chung, I. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs. Wirel. Commun. Mob. Comput. 2018, 2018, 7978027. [Google Scholar] [CrossRef] [Green Version]
  89. Altaf, F.; Maity, S. PLHAS: Privacy-preserving localized hybrid authentication scheme for large scale vehicular ad hoc networks. Veh. Commun. 2021, 30, 100347. [Google Scholar] [CrossRef]
  90. Xue, K.; Luo, X.; Ma, Y.; Li, J.; Liu, J.; Wei, D.S.L. A Distributed Authentication Scheme Based on Smart Contract for Roaming Service in Mobile Vehicular Networks. IEEE Trans. Veh. Technol. 2022, 71, 5284–5297. [Google Scholar] [CrossRef]
  91. Vijayakumar, P.; Chang, V.; Deborah, L.J.; Balusamy, B.; Shynu, P. Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comput. Syst. 2018, 78, 943–955. [Google Scholar] [CrossRef]
  92. Lu, Y.; Li, L.; Peng, H.; Yang, Y. An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multimedia Tools Appl. 2015, 76, 1801–1815. [Google Scholar] [CrossRef]
  93. Zhou, L.; Ge, C.; Su, C. A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes. Sci. China Inf. Sci. 2020, 63, 130103. [Google Scholar] [CrossRef] [Green Version]
  94. Zhang, L.; Tang, S.; Chen, J.; Zhu, S. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wirel. Pers. Commun. 2014, 81, 53–75. [Google Scholar] [CrossRef]
  95. Wang, D.; Cao, Y.; Yan, F.; Liu, Y.; Tian, D.; Zhuang, Y. Secure Long-range Autonomous Valet Parking: A Reservation Scheme with Three-factor Authentication and Key Agreement. IEEE Trans. Veh. Technol. 2022. [Google Scholar] [CrossRef]
  96. Wazid, M.; Das, A.K.; Kumar, N.; Rodrigues, J.J.P.C. Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment. IEEE Trans. Ind. Inform. 2017, 13, 3144–3153. [Google Scholar] [CrossRef]
  97. Xu, T.; Xu, C.; Xu, Z. An efficient three-factor privacy-preserving authentication and key agreement protocol for vehicular ad-hoc network. China Commun. 2021, 18, 315–331. [Google Scholar] [CrossRef]
  98. Duan, Z.; Mahmood, J.; Yang, Y.; Berwo, M.A.; Yassin, A.a.K.A.; Bhutta, M.N.M.; Chaudhry, S.A. TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs. Secur. Commun. Netw. 2022, 2022, 8259927. [Google Scholar] [CrossRef]
  99. Hegde, N.; Manvi, S.S. MFZKAP: Multi Factor Zero Knowledge Proof Authentication for Secure Service in Vehicular Cloud Computing. In Proceedings of the Second International Conference on Advanced Computational and Communication Paradigms (ICACCP), Gangtok, India, 25–28 February 2019; pp. 1–6. [Google Scholar]
  100. Kebande, V.R.; Awaysheh, F.M.; Ikuesan, R.A.; Alawadi, S.A.; Alshehri, M.D. A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles. Sensors 2021, 21, 6018. [Google Scholar] [CrossRef] [PubMed]
  101. Umar, M.; Islam, S.H.; Mahmood, K.; Ahmed, S.; Ghaffar, Z.; Saleem, M.A. Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF. IEEE Trans. Veh. Technol. 2021, 70, 12158–12167. [Google Scholar] [CrossRef]
  102. Akram, W.; Mahmood, K.; Li, X.; Sadiq, M.; Lv, Z.; Chaudhry, S.A. An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing. Comput. Netw. 2022, 217, 109335. [Google Scholar] [CrossRef]
  103. Othman, W.; Fuyou, M.; Xue, K.; Hawbani, A. Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City. IEEE Trans. Veh. Technol. 2021, 70, 12902–12917. [Google Scholar] [CrossRef]
  104. Guangquan Xu, Wenjuan Zhou, Arun Kumar Sangaiah, Yao Zhang, Xi Zheng, Qiang Tang, Naixue Xiong, Kaitai Liang, and Xiaokang Zhou, A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs. IEEE Netw. 2020, 34, 22–29. [CrossRef]
  105. Cui, J.; Wu, D.; Zhang, J.; Xu, Y.; Zhong, H. An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs. IEEE Trans. Veh. Technol. 2019, 68, 2972–2986. [Google Scholar] [CrossRef]
  106. Liang, Y.; Liu, Y. Analysis and Improvement of an Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in VANETs. IEEE Syst. J. 2022. [Google Scholar] [CrossRef]
  107. Ullah, I.; Khan, M.A.; Alsharif, M.H.; Nordin, R. An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles. Sustainability 2021, 13, 10891. [Google Scholar] [CrossRef]
  108. Liao, Y.-P.; Hsiao, C.-M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 2014, 18, 133–146. [Google Scholar] [CrossRef]
  109. Caballero-Gil, P.; Martín-Fernández, F.; Caballero-Gil, C. Using query frequencies in tree-based revocation for Certificate-less authentication in VANETs. In Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK, 8–10 December 2014; pp. 268–273. [Google Scholar]
  110. Caballero-Gil, P.; Martín-Fernández, F.; Caballero-Gil, C. Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks. J. Comput. Commun. 2014, 2, 14–21. [Google Scholar] [CrossRef] [Green Version]
  111. Hathal, W.; Cruickshank, H.; Sun, Z.; Maple, C. Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks. IEEE Trans. Veh. Technol. 2020, 69, 16110–16125. [Google Scholar] [CrossRef]
  112. Lv, S.; Liu, Y. PLVA: Privacy-Preserving and Lightweight V2I Authentication Protocol. IEEE Trans. Intell. Transp. Syst. 2021, 23, 6633–6639. [Google Scholar] [CrossRef]
  113. Shayea, G.G.; Mohammed, D.A.; Abbas, A.H.; Abdulsattar, N.F. Privacy-Aware Secure Routing through Elliptical Curve Cryptography with Optimal RSU Distribution in VANETs. Designs 2022, 6, 121. [Google Scholar] [CrossRef]
  114. Iqbal, S.; Zafar, N.A.; Ali, T.; Alkhammash, E.H. Efficient IoT-Based Formal Model for Vehicle-Life Interaction in VANETs Using VDM-SL. Energies 2022, 15, 1013. [Google Scholar] [CrossRef]
  115. Boneh, D.; Gentry, C.; Lynn, B.; Shacham, H. Aggregate and verifiably encrypted signatures from bilinear maps. In Advances in Cryptology—EUROCRYPT 2003, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, 4–8 May 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 416–432. [Google Scholar]
  116. Hussain, K.; Jhanjhi, N.; Ur-Rahman, H.M.; Hussain, J.; Islam, M.H. Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes. J. King Saud Univ. Comput. Inf. Sci. 2021, 33, 417–425. [Google Scholar] [CrossRef]
  117. Lu, Z.; Qu, G.; Liu, Z. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy. IEEE Trans. Intell. Transp. Syst. 2018, 20, 760–776. [Google Scholar] [CrossRef]
  118. Farooq, S.M.; Hussain, S.M.S.; Ustun, T.S. A Survey of Authentication Techniques in Vehicular Ad-Hoc Networks. IEEE Intell. Transp. Syst. Mag. 2020, 13, 39–52. [Google Scholar] [CrossRef]
  119. Cahyadi, E.F.; Damarjati, C.; Hwang, M.S. Review on Identity-Based Batch Verification Schemes for Security and Privacy in VANETs. J. Electron. Sci. Technol. 2022, 20, 92–110. [Google Scholar] [CrossRef]
  120. Jenefa, J.; Anita, E.A.M. Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey. Wirel. Pers. Commun. 2021, 123, 31–36. [Google Scholar] [CrossRef]
Figure 1. Components of a Smart City.
Figure 1. Components of a Smart City.
Sensors 23 02682 g001
Figure 2. Classification of certificate-less authentication schemes (CLAS).
Figure 2. Classification of certificate-less authentication schemes (CLAS).
Sensors 23 02682 g002
Figure 3. Art of collection of the literature.
Figure 3. Art of collection of the literature.
Sensors 23 02682 g003
Figure 4. Segregation of authentication schemes.
Figure 4. Segregation of authentication schemes.
Sensors 23 02682 g004
Figure 5. Classification based on signature verification.
Figure 5. Classification based on signature verification.
Sensors 23 02682 g005
Figure 6. Other Types of Authentication Schemes.
Figure 6. Other Types of Authentication Schemes.
Sensors 23 02682 g006
Table 14. Comparison based on attacks mitigated by batch vs group verification schemes.
Table 14. Comparison based on attacks mitigated by batch vs group verification schemes.
AttacksBatchGroup
Signature forgeryYesYes
ReplayYesYes
Message modificationYesYes
ImpersonationYesYes
Man-in-the-middleYesYes
Stolen-verifier tableYesNo
Stolen smart cardNoYes
Denial-of-serviceYesYes
Anomaly NoYes
CoalitionYesYes
Adaptive chosen message NoYes
Key exposureNoYes
Node replicationNoYes
Side-channelNoYes
Vehicle captureNoYes
Ephemeral secret leakageNoYes
Table 15. Performance comparison of batch verification vs group signature verification schemes based on communication and communication costs.
Table 15. Performance comparison of batch verification vs group signature verification schemes based on communication and communication costs.
Batch VerificationGroup Verification
SchemesComputation CostCommunication CostSchemesComputation CostCommunication Cost
Guo et al. [26]6.692 ms184 bytesAli et al. [45]5.9271 ms536 bytes
Zhou et al. [33]1.7737 ms208 bytesMing et al. [48]3.3240 ms128 bytes
Sunday et al. [36]1.3762 ms148 bytesTomar et al. [59]0.874 ms224 bytes
Zhong et al. [42]10.131 ms192 bytesYang et al. [62]0.6650 ms480 bytes
Zhang et al. [46]1.3297 ms84 bytes
Table 16. Comparison based on attacks mitigated by mutual, cooperative, and hybrid authentication schemes.
Table 16. Comparison based on attacks mitigated by mutual, cooperative, and hybrid authentication schemes.
AttacksMutualCooperativeHybrid
ForgeryYesYesYes
ReplayYesNoYes
Message modificationNoNoYes
Message tamperingYesNoNo
ImpersonationYesNoYes
MasqueradingYesNoNo
Man-in-the-middle YesNoYes
Adaptive chosen message YesNoYes
Denial-of-serviceYesYesYes
Key secrecyYesNoYes
MaliciousNoYesNo
Stolen OBU/vehicleYesNoNo
Arbitrary guessing YesNoNo
Open side-channelNoNoYes
Key exposureNoNoYes
Free ridingNoYesYes
CollusionNoYesYes
TrackingNoYesNo
Table 17. Performance comparison of mutual, cooperative, and hybrid authentication schemes based on computation and communication costs.
Table 17. Performance comparison of mutual, cooperative, and hybrid authentication schemes based on computation and communication costs.
Mutual AuthenticationHybrid Authentication Cooperative Authentication
SchemesComputation Cost (ms)Communication Cost (Bytes)SchemesComputation Cost (ms)Communication Cost (Bytes)SchemesAuthentication Delay
Cahyadi et al. [71]10.41583Xue et al. [90]6.884453Yang et al. [86]3
Malhi et al. [72]10.8727Altaf et al. [91]12.6294Tao Jing et al. [87]0.2
Cui et al. [73]40.9100Vijayakumar et al. [91]5.71435Xie et al. [88]0.2
Yao et al. [74]36.8168 Hyo Jin Jo et al. [90]0.2
Dewanta et al. [75]9896 Yang et al. [86]3
Table 18. Comparison based on attacks mitigated by smart-card-based (two vs three vs multi-factor) schemes.
Table 18. Comparison based on attacks mitigated by smart-card-based (two vs three vs multi-factor) schemes.
AttacksTwo-FactorThree-Factor
ReplayYesYes
Man-in-the-middleYesYes
ImpersonationYesYes
Stolen-verifier tableYesNo
Offline dictionary YesNo
InsiderYesYes
Log-inYesNo
Password disclosureYesNo
Session keyYesNo
Key exposureYesNo
Perfect forward secrecyYesYes
Mutual authenticationYesNo
PasswordYesYes
User anonymityYesYes
ForgeryYesNo
Stolen smart cardYesYes
TracingYesYes
Ephemeral secret leakageNoYes
AnonymityNoYes
Table 19. Performance comparison of smart-card-based (two vs three vs multi-factor) schemes.
Table 19. Performance comparison of smart-card-based (two vs three vs multi-factor) schemes.
Two-Factor AuthenticationThree-Factor Authentication
SchemesComputation CostCommunication CostSchemesComputation CostCommunication Cost
Zhou et al. [105]0.3117 ms2210 bytesWang et al. [107]129.022 ms2144 bits
Wazid et al. [111]3.59 ms1536 bits
Xu et al. [112]0.9448 ms1088 bits
Duan et al. [118]2.65 ms2560 bits
Table 20. Comparison based on attacks mitigated by hardware-based (PUFs vs hardware) schemes.
Table 20. Comparison based on attacks mitigated by hardware-based (PUFs vs hardware) schemes.
AttacksPUFsHardware
Physical attack resilienceYesNo
Vehicle anonymityYesNo
Vehicle traceabilityYesNo
Mutual authenticationYesNo
Desynchronization attacksYesYes
Impersonation attacksYesNo
Perfect forward secrecyYesNo
Cloning and physical attacksYesYes
Tag anonymityNoYes
UntraceabilityNoYes
Server impersonation attacksNoYes
Ephemeral secret leakage attackNoYes
Man-in-the-middle attacksNoYes
Table 21. Performance comparison of hardware-based (PUFs vs RFID) schemes.
Table 21. Performance comparison of hardware-based (PUFs vs RFID) schemes.
Physical Unclonable Function AuthenticationRFID Authentication
SchemesComputation CostCommunication CostSchemesComputation CostCommunication Cost
Umar et al. [108]3.7833 ms2976 bitsAkram et al. [117]4.222 ms2496 bits
Othman et al. [110]32.84 ms3360 bits
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sripathi Venkata Naga, S.K.; Yesuraj, R.; Munuswamy, S.; Arputharaj, K. A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems. Sensors 2023, 23, 2682. https://doi.org/10.3390/s23052682

AMA Style

Sripathi Venkata Naga SK, Yesuraj R, Munuswamy S, Arputharaj K. A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems. Sensors. 2023; 23(5):2682. https://doi.org/10.3390/s23052682

Chicago/Turabian Style

Sripathi Venkata Naga, Santhosh Kumar, Rajkumar Yesuraj, Selvi Munuswamy, and Kannan Arputharaj. 2023. "A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems" Sensors 23, no. 5: 2682. https://doi.org/10.3390/s23052682

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop