Secure and Efficient Mutual Authentication Protocol for VANETs Using Edge Computing and Signature-Based Cryptography

Authors

  • Abdulnasser AbdulJabbar Abbood Southern Technical University
  • Faris K. Al-Shammri University of Warith Al Anbiyaa
  • Zainab Marid Alzamili Education Directorate of Thi-Qar
  • ‪Mahmood A. Al-Shareeda‬‏ Iraq University College (IUC)
  • Mohammed Amin Almaiah The University of Jordan
  • Rami Shehab King Faisal University
  • Md Asri Bin Ngadi Universiti Teknologi Malaysia
  • Abdulaziz Zaid A. Aljarwan University of Hail

DOI:

https://doi.org/10.18196/jrc.v6i2.25663

Keywords:

Edge Computing, VANET, Mutual Authentication, Elliptic Curve, Vehicular Adhoc Networks

Abstract

Security in vehicular ad-hoc networks (VANETs) as a result, vehicular ad-hoc networks (VANETs) need to adopt and implement strong security protocols respective to vehicle-tovehicle and vehicle-to-infrastructure communication. But state-ofthe-art authentication methods have drawbacks like computational overhead, scalability issues, and susceptibility to identity stealing, replay attacks and data manipulation. To mitigate these issues, we present an innovative protocol for mutual authentication in edge computing assisted VANEts by employing an elliptic curve signature-based to improve the security and performance of the protocol. The proposed scheme guarantees low-latency authenticated by offloading computation tasks to edge nodes and simultaneously provides conditional privacy-preserving vehicle tracing for law enforcement. Formal security verification using ProVerif shows to be resilient towards replays, man-in-the-middle and eavesdropping attacks. Simulation results also show that the proposed protocol achieves highly efficient computational and communication overhead in comparison with current approaches. The performance results are promising and therefore, the proposed scheme can I be considered as practical and scalable for realistic applications in VANET.

References

M. AlMarshoud, M. Sabir Kiraz, and A. H. Al-Bayatti, “Security, privacy, and decentralized trust management in vanets: a review of current research and future directions,” ACM Computing Surveys, vol. 56, no. 10, pp. 1–39, 2024, doi: 10.1145/3656166.

I. A. Kapetanidou, P. Mendes and V. Tsaoussidis, “Enhancing Security in Information-Centric Ad Hoc Networks,” NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, pp. 1-9, 2023, doi: 10.1109/NOMS56928.2023.10154444.

A. Dutta, L. M. Samaniego Campoverde, M. Tropea, and F. De Rango, “A comprehensive review of recent developments in vanet for traffic, safety & remote monitoring applications,” Journal of Network and Systems Management, vol. 32, no. 73, 2024, doi: 10.1007/s10922-024-09853-5.

G. Liu, H. Li, J. Le, N. Wang, Y. Liu and T. Xiang, “LRCPA: LatticeBased Robust and Conditional Privacy-Preserving Authentication for VANETs,” in IEEE Transactions on Vehicular Technology, 20224, doi: 10.1109/TVT.2024.3485671.

E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Cybersecurity threats, countermeasures and mitigation techniques on the iot: Future research directions,” Electronics, vol. 11, no. 20, 2022, doi: 10.3390/electronics11203330.

M. M. Hamdi, A. S. Mustafa, H. F. Mahd, M. S. Abood, C. Kumar and M. A. Al-shareeda, “Performance Analysis of QoS in MANET based on IEEE 802.11b,” 2020 IEEE International Conference for Innovation in Technology (INOCON), pp. 1-5, 2020, doi: 10.1109/INOCON50539.2020.9298362.

A. Alshuaibi, M. Almaayah, and A. Ali, “Machine learning for cybersecurity issues: A systematic review,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, 2025, doi: 10.63180/jcsra.thestap.2025.1.4.

A. Souri, M. Zarei, A. Hemmati, and M. Gao, “A systematic literature review of vehicular connectivity and v2x communications: Technical aspects and new challenges,” International Journal of Communication Systems, vol. 37, no. 10, 2024, doi: 10.1002/dac.5780.

A. K. Sangaiah, A. Javadpour, C.-C. Hsu, A. Haldorai, and A. Zeynivand, “Investigating routing in the vanet network: Review and classification of approaches,” Algorithms, vol. 16, no. 8, 2023, doi: 10.3390/a16080381.

S. Jiang, X. Zhu and L. Wang, “An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs,” in IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 8, pp. 2193-2204, 2016, doi: 10.1109/TITS.2016.2517603.

P. K. Pandey, V. Kansal, and A. Swaroop, “Pki-smr: Pki based secure multipath routing for unmanned military vehicles (umv) in vanets,” Wireless Networks, vol. 30, no. 2, pp. 595–615, 2024, doi: 10.1007/s11276-023- 03503-5.

R. S. Mousa and R. Shehab, “Applying risk analysis for determining threats and countermeasures in workstation domain,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 12–21, 2025, doi: 10.63180/jcsra.thestap.2025.1.2.

R. Almutairi, G. Bergami and G. Morgan, “Systematic Literature Review of VANET Simulators: Comparative Analysis, Technological Advancements, and Research Challenges,” 2024 International Symposium on Parallel Computing and Distributed Systems (PCDS), pp. 1-11, 2024, doi: 10.1109/PCDS61776.2024.10743218.

M. A. Al-Shareeda, M. Anbar, S. Manickam, A. Khalil and I. H. Hasbullah, “Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey,” in IEEE Access, vol. 9, pp. 121522-121531, 2021, doi: 10.1109/ACCESS.2021.3109264.

I. M. Varma and N. Kumar, “A comprehensive survey on sdn and blockchain-based secure vehicular networks,” Vehicular Communications, vol. 44, 2023, doi: 10.1016/j.vehcom.2023.100663.

M. A. Al-Shareeda and S. Manickam, “A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework,” in IEEE Access, vol. 11, pp. 46218-46228, 2023, doi: 10.1109/ACCESS.2023.3274774.

Z. Ghaleb Al-Mekhlafi et al., “Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models,” in IEEE Access, vol. 12, pp. 148935-148960, 2024, doi: 10.1109/ACCESS.2024.3476512.

Z. Ghaleb Al-Mekhlafi et al., “Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review,” in IEEE Sensors Journal, vol. 24, no. 19, pp. 29575-29602, 2024, doi: 10.1109/JSEN.2024.3436612.

M. Prakash and K. Saranya, “Vanet authentication with privacy-preserving schemes—a survey,” in Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: ICCCES 2022, vol. 977, pp. 465–480, 2023, doi: 10.1007/978-981-19-7753-4_36.

S. A. Rashid, L. Audah, M. M. Hamdi, M. S. Abood, and S. Alani, “Reliable and efficient data dissemination scheme in vanet: a review,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 6, pp. 6423–6434, 2020, doi: 10.11591/ijece.v10i6.pp6423-6434.

M. A. Al-Shareeda, S. Manickam, B. A. Mohammed, Z. G. AlMekhlafi, A. Qtaish, A. J. Alzahrani, G. Alshammari, A. A. Sallam, and K. Almekhlafi, “Cm-cppa: Chaotic map-based conditional privacypreserving authentication scheme in 5g-enabled vehicular networks,” Sensors, vol. 22, no. 13, 2022, doi: 10.3390/s22135026.

A. Bisht and V. Khaitan, “Reliability analysis of 5g-vanet using cloudfog-edge based architecture,” RAIRO-Operations Research, vol. 58, no. 1, pp. 129–149, 2024, doi: 10.1051/ro/2023189.

A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, “Eca-vfog: An efficient certificateless authentication scheme for 5gassisted vehicular fog computing,” Plos one, vol. 18, no. 6, 2023, doi: 10.1371/journal.pone.0287291.

Y. Sun, R. Lu, X. Lin, X. Shen and J. Su, “An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications,” in IEEE Transactions on Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, 2010, doi: 10.1109/TVT.2010.2051468.

P. Sarkar et al., The development and implementation of an intelligent transportation system with 5g capability CRC Press, 2025.

C.-C. Lee and Y.-M. Lai, “Toward a secure batch verification with group testing for vanet,” Wireless networks, vol. 19, pp. 1441–1449, 2013, doi: 10.1007/s11276-013-0543-7.

Y. Rajkumar and S. Santhosh Kumar, “A comprehensive survey on communication techniques for the realization of intelligent transportation systems in iot based smart cities,” Peer-to-Peer Networking and Applications, vol. 17, pp. 1263–1308, 2024, doi: 10.1007/s12083-024-01627-9.

J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo, “Improvements on an authentication scheme for vehicular sensor networks,” Expert Systems with Applications, vol. 41, no. 5, pp. 2559–2564, 2014, doi: 10.1016/j.eswa.2013.10.003.

X. Liu, Z. Fang and L. Shi, “Securing Vehicular Ad Hoc Networks,” 2007 2nd International Conference on Pervasive Computing and Applications, pp. 424-429, 2007, doi: 10.1109/ICPCA.2007.4365481.

J. P. Hubaux, S. Capkun and Jun Luo, “The security and privacy of smart vehicles,” in IEEE Security & Privacy, vol. 2, no. 3, pp. 49-55, 2004, doi: 10.1109/MSP.2004.26.

S. Jiang, X. Chen, Y. Cao, T. Xu, J. He and Y. Cui, “APKI: An Anonymous Authentication Scheme Based on PKI for VANET,” 2022 7th International Conference on Computer and Communication Systems (ICCCS), pp. 530-536, 2022, doi: 10.1109/ICCCS55155.2022.9845923.

C. Zhang, X. Lin, R. Lu and P. . -H. Ho, “RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks,” 2008 IEEE International Conference on Communications, pp. 1451-1457, 2008, doi: 10.1109/ICC.2008.281.

C. Zhang, X. Lin, R. Lu, P. -H. Ho and X. Shen, “An Efficient Message Authentication Scheme for Vehicular Communications,” in IEEE Transactions on Vehicular Technology, vol. 57, no. 6, pp. 3357-3368, 2008, doi: 10.1109/TVT.2008.928581.

A. A. Abbood et al., “Benchmarking bilinear pair cryptography for resource-constrained platforms using raspberry pi,” WSEASTransactions on Information Science and Applications, vol. 22, pp. 245–257, 2025, doi: 10.37394/23209.2025.22.21.

A. Sharma and K. Pandey, “Recent advancements in techniques used to solve the rsu deployment problem in vanets: A comprehensive survey,” International Journal of Sensors Wireless Communications and Control, vol. 12, no. 3, pp. 184–193, 2022, doi: 10.2174/2405520415666220217152355.

S. S. Kanumalli, A. Ch, and P. S. R. C. Murty, “Secure v2v communication in iov using ibe and pki based hybrid approach,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 1, 2020, doi: 10.14569/IJACSA.2020.0110157.

M. M. Hamdi, Y. A. Yussen and A. S. Mustafa, “Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review,” 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1-7, 2021, doi: 10.1109/HORA52670.2021.9461327.

M. Al Shareeda, A. Khalil and W. Fahs, “Towards the Optimization of Road Side Unit Placement Using Genetic Algorithm,” 2018 International Arab Conference on Information Technology (ACIT), pp. 1-5, 2018, doi: 10.1109/ACIT.2018.8672687.

Z. Jianhong, X. Min, and L. Liying, “On the security of a secure batch verification with group testing for vanet,” International Journal of Network Security, vol. 16, no. 5, pp. 351–358, 2014.

T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li, “Specs: Secure and privacy enhancing communications schemes for vanets,” Ad Hoc Networks, vol. 9, no. 2, pp. 189–203, 2011, doi: 10.1016/j.adhoc.2010.05.005.

O. S. Al-Heety, Z. Zakaria, M. Ismail, M. M. Shakir, S. Alani and H. Alsariera, “A Comprehensive Survey: Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET,” in IEEE Access, vol. 8, pp. 91028-91047, 2020, doi: 10.1109/ACCESS.2020.2992580.

Y. Liu, L. Wang and H. -H. Chen, “Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks,” in IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp. 3697-3710, 2015, doi: 10.1109/TVT.2014.2358633.

W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge Computing: Vision and Challenges,” in IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, 2016, doi: 10.1109/JIOT.2016.2579198.

W. Shi and S. Dustdar, “The Promise of Edge Computing,” in Computer, vol. 49, no. 5, pp. 78-81, 2016, doi: 10.1109/MC.2016.145.

M. N. Tahir, M. Katz and U. Rashid, “Analysis of VANET Wireless Networking Technologies in Realistic Environments,” 2021 IEEE Radio and Wireless Symposium (RWS), pp. 123-125, 2021, doi: 10.1109/RWS50353.2021.9360381.

D. Manivannan, S. S. Moni, and S. Zeadally, “Secure authentication and privacy-preserving techniques in vehicular ad-hoc networks (vanets),” Vehicular Communications, vol. 25, 2020, doi: 10.1016/j.vehcom.2020.100247.

R. I. Abdelfatah, N. M. Abdal-Ghafour and M. E. Nasr, “Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions,” in IEEE Access, vol. 10, pp. 1096-1115, 2022, doi: 10.1109/ACCESS.2021.3137877.

S. Son, J. Lee, Y. Park, Y. Park and A. K. Das, “Design of BlockchainBased Lightweight V2I Handover Authentication Protocol for VANET,” in IEEE Transactions on Network Science and Engineering, vol. 9, no. 3, pp. 1346-1358, 2022, doi: 10.1109/TNSE.2022.3142287.

V. O. Nyangaresi, A. J. Rodrigues, and N. K. Taha, “Mutual authentication protocol for secure vanet data exchanges,” in International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, vol. 382, pp. 58–76, 2021, doi: 10.1007/978-3-030-78459-1_5.

P. Wang, C. -M. Chen, S. Kumari, M. Shojafar, R. Tafazolli and Y. -N. Liu, “HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs,” in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 8, pp. 5071-5080, 2021, doi: 10.1109/TITS.2020.3013928.

M. Umar, S. H. Islam, K. Mahmood, S. Ahmed, Z. Ghaffar and M. A. Saleem, “Provable Secure Identity-Based Anonymous and PrivacyPreserving Inter-Vehicular Authentication Protocol for VANETS Using PUF,” in IEEE Transactions on Vehicular Technology, vol. 70, no. 11, pp. 12158-12167, 2021, doi: 10.1109/TVT.2021.3118892.

Y. Zhou et al., “An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs,” in IEEE Internet of Things Journal, vol. 10, no. 11, pp. 10052-10065, 2023, doi: 10.1109/JIOT.2023.3236699.

K. Lim, K. M. Tuladhar, X. Wang and W. Liu, “A scalable and secure key distribution scheme for group signature based authentication in VANET,” 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 478-483, 2017, doi: 10.1109/UEMCON.2017.8249091.

J. Zhang, H. Zhong, J. Cui, L. Wei and L. Liu, “CVAR: Distributed and Extensible Cross-Region Vehicle Authentication With Reputation for VANETs,” in IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 1, pp. 74-89, 2024, doi: 10.1109/TITS.2023.3306547.

S. Goudarzi et al., “A privacy-preserving authentication scheme based on elliptic curve cryptography and using quotient filter in fog-enabled vanet,” Ad Hoc Networks, vol. 128, 2022, doi: 10.1016/j.adhoc.2022.102782.

H. Tahir, K. Mahmood, M. F. Ayub, M. A. Saleem, J. Ferzund and N. Kumar, “Lightweight and Secure Multi-Factor Authentication Scheme in VANETs,” in IEEE Transactions on Vehicular Technology, vol. 72, no. 11, pp. 14978-14986, 2023, doi: 10.1109/TVT.2023.3286187.

A. A. Almazroi, M. H. Alkinani, M. A. Al-Shareeda, and S. Manickam, “A novel ddos mitigation strategy in 5g-based vehicular networks using chebyshev polynomials,” Arabian Journal for Science and Engineering, vol. 49, pp. 11991–12004, 2024, doi: 10.1007/s13369-023-08535-9.

Z. G. Al-Mekhlafi et al., “Efficient authentication scheme for 5g-enabled vehicular networks using fog computing,” Sensors, vol. 23, no. 7, 2023, doi: 10.3390/s23073543.

A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, and S. Manickam, “Lcppa: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5g-enabled vehicular system,” Plos one, vol. 18, no. 10, 2023, doi: 10.1371/journal.pone.0292690.

S. Chen, Y. Liu, J. Ning, and X. Zhu, “Basrac: An efficient batch authentication scheme with rule-based access control for vanets,” Vehicular Communications, vol. 40, 2023, doi: 10.1016/j.vehcom.2023.100575.

C. Wang, R. Huang, J. Shen, J. Liu, P. Vijayakumar and N. Kumar, “A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs,” in IEEE Internet of Things Journal, vol. 8, no. 18, pp. 14248-14257, 2021, doi: 10.1109/JIOT.2021.3068268.

N. Gupta, R. Manaswini, B. Saikrishna, F. Silva, and A. Teles, “Authentication-based secure data dissemination protocol and framework for 5g-enabled vanet,” Future Internet, vol. 12, no. 4, 2020, doi: 10.3390/fi12040063.

M. Ouaissa, M. Houmer and M. Ouaissa, “An Enhanced Authentication Protocol based Group for Vehicular Communications over 5G Networks,” 2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1-8, 2020, doi: 10.1109/CommNet49926.2020.9199641.

S. Soleymani, M. Anisi, A. H. Abdullah, M. A. Ngadi, S. Goudarzi, M. K. Khan, and M. N. Kama, “An authentication and plausibility model for big data analytic under los and nlos conditions in 5g-vanet,” Science China Information Sciences, vol. 63, no. 220305, 2020, doi: 10.1007/s11432- 019-2835-4.

V. O. Nyangaresi, A. J. Rodrigues and S. O. Abeka, “Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications,” 2020 16th International Computer Engineering Conference (ICENCO), pp. 25-30, 2020, doi: 10.1109/ICENCO49778.2020.9357372.

M. Asghar, R. R. M. Doss and L. Pan, “A Scalable and Efficient PKI Based Authentication Protocol for VANETs,” 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1-3, 2018, doi: 10.1109/ATNAC.2018.8615224.

S. Tangade, S. S. Manvi and P. Lorenz, “Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs,” in IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8647-8655, 2018, doi: 10.1109/TVT.2018.2839979.

Y. Cao, S. Xu, X. Chen, Y. He, and S. Jiang, “A forward-secure and efficient authentication protocol through lattice-based group signature in vanets scenarios,” Computer Networks, vol. 214, 2022, doi: 10.1016/j.comnet.2022.109149.

X. Yue, B. Chen, X. Wang, Y. Duan, M. Gao and Y. He, “An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures,” in IEEE Access, vol. 6, pp. 62584- 62600, 2018, doi: 10.1109/ACCESS.2018.2876126.

Y. Sun, Z. Feng, Q. Hu, and J. Su, “An efficient distributed key management scheme for group-signature based anonymous authentication in vanet,” Security and Communication Networks, vol. 5, no. 1, pp. 79–86, 2012, doi: 10.1002/sec.302.

J. Zhang, J. Cui, H. Zhong, I. Bolodurina and L. Liu, “Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks,” in IEEE Transactions on Network Science and Engineering, vol. 8, no. 4, pp. 2982-2994, 2021, doi: 10.1109/TNSE.2020.3029784.

Y. Tian, J. Yuan, and H. Song, “Efficient privacy-preserving authentication framework for edge-assisted internet of drones,” Journal of Information Security and Applications, vol. 48, 2019, doi: 10.1016/j.jisa.2019.06.010.

H. Khalid et al., “HOOPOE: High Performance and Efficient Anonymous Handover Authentication Protocol for Flying Out of Zone UAVs,” in IEEE Transactions on Vehicular Technology, vol. 72, no. 8, pp. 10906-10920, 2023, doi: 10.1109/TVT.2023.3262173.

J. Lee, G. Kim, A. K. Das and Y. Park, “Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks,” in IEEE Transactions on Network Science and Engineering, vol. 8, no. 3, pp. 2412-2425, 2021, doi: 10.1109/TNSE.2021.3093435.

P. Mall, R. Amin, M. S. Obaidat, and K.-F. Hsiao, “Comsec++: Puf-based secured light-weight mutual authentication protocol for drone-enabled wsn,” Computer Networks, vol. 199, 2021, doi: 10.1016/j.comnet.2021.108476.

S. A. Chaudhry et al., “A Lightweight Authentication Scheme for 6GIoT Enabled Maritime Transport System,” in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2401-2410, 2023, doi: 10.1109/TITS.2021.3134643.

B. Samra and S. Fouzi, “New efficient certificateless scheme-based conditional privacy preservation authentication for applications in vanet,” Vehicular Communications, vol. 34, 2022, doi: 10.1016/j.vehcom.2021.100414.

M. Takehiko, H. Okazaki, K. Arai, Y. Futa, and Y. Hiroaki, “Formal security verification for searchable symmetric encryption using proverif,” IEICE Proceedings Series, vol. 86, 2024, doi: 10.34385/proc.86.We-AM1-2-3.

B. Blanchet, B. Smyth, V. Cheval, and M. Sylvestre, “Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial,” Version from, pp. 5–16, 2018.

V. Cheval, V. Cortier and A. Debant, “Election Verifiability with ProVerif,” 2023 IEEE 36th Computer Security Foundations Symposium (CSF), pp. 43-58, 2023, doi: 10.1109/CSF57540.2023.00032.

J. Zhang, L. Yang, W. Cao and Q. Wang, “Formal Analysis of 5G EAPTLS Authentication Protocol Using Proverif,” in IEEE Access, vol. 8, pp. 23674-23688, 2020, doi: 10.1109/ACCESS.2020.2969474.

J. Yao, C. Xu, D. Li, S. Lin, and X. Cao, “Formal verification of security protocols: Proverif and extensions,” in Artificial Intelligence and Security, vol. 13339, pp. 500–512, 2022, doi: 10.1007/978-3-031-06788-4_42.

T. Mieno, H. Okazaki, K. Arai and Y. Futa, “How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif,” in IEEE Access, vol. 12, pp. 31605-31625, 2024, doi: 10.1109/ACCESS.2024.3368453.

T. Mieno, H. Okazaki, K. Arai, Y. Futa, and H. Yamamoto, “Formal security verification for searchable symmetric encryption using proverif,” in 2024 International Symposium on Information Theory and Its Applications (ISITA), pp. 419–424, 20224, doi: 10.34385/proc.86.We-AM-1-2-3.

M. Scott, “Miracl-a multiprecision integer and rational arithmetic c/c++ library,” http://www. shamus. ie, 2003.

Downloads

Published

2025-03-21

Issue

Section

Articles