{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:05:00Z","timestamp":1770915900011,"version":"3.50.1"},"reference-count":37,"publisher":"MDPI AG","issue":"19","license":[{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols\u2014based on the Elliptic Curve Digital Signature Algorithm (ECDSA)\u2014are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.<\/jats:p>","DOI":"10.3390\/s20195719","type":"journal-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T10:22:25Z","timestamp":1602152545000},"page":"5719","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-8664","authenticated-orcid":false,"given":"Shimaa A. Abdel","family":"Hakeem","sequence":"first","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"},{"name":"Electronics Research Institute (ERI), Giza 12622, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7898-9854","authenticated-orcid":false,"given":"Mohamed A. Abd","family":"El-Gawad","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Korea University, Seoul 02841, Korea"},{"name":"National Telecommunication Institute, Cairo 11768, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-2075","authenticated-orcid":false,"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"107093","DOI":"10.1016\/j.comnet.2019.107093","article-title":"Security issues and challenges in V2X: A Survey","volume":"169","author":"Ghosal","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"101658","DOI":"10.1016\/j.cose.2019.101658","article-title":"PKI4IoT: Towards public key infrastructure for the Internet of Things","volume":"89","author":"Lindemer","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1002\/sec.590","article-title":"Certificateless broadcast authentication for vehicular ad hoc networks","volume":"6","author":"Ryu","year":"2012","journal-title":"Secur. Commun. Netw."},{"key":"ref_4","first-page":"1250","article-title":"A Secure Hash Message Authentication Code to Avoid Certificate Revocation List Checking in Vehicular Adhoc Networks","volume":"10","author":"Priyadharshini","year":"2015","journal-title":"Electron. J. Appl. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"11096","DOI":"10.1166\/asl.2017.10228","article-title":"High Speed Implementation of the Keyed-Hash Message Authentication Code (HMAC) Based on SHA-1 Algorithm","volume":"23","author":"Suhaili","year":"2017","journal-title":"Adv. Sci. Lett."},{"key":"ref_6","unstructured":"Krawczyk, H., Bellare, M., and Canetti, R. (2020, January 28). HMAC: KeyedHashing for Message Authentication, IETF RFC 2104. Available online: https:\/\/tools.ietf.org\/html\/rfc2104."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","article-title":"A Quintero VANET security surveys","volume":"44","author":"Engoulou","year":"2014","journal-title":"Comput. Commun."},{"key":"ref_8","unstructured":"Hodge, C., and Singer, M.R. (2020, January 28). Telematics Framework for Federal Agencies: Lessons from the Marine Corps Fleet, Available online: https:\/\/www.nrel.gov\/docs\/fy18osti\/70223.pdf."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"119689","DOI":"10.1109\/ACCESS.2019.2937182","article-title":"A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks","volume":"7","author":"Hakeem","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","article-title":"A secure authentication scheme for VANETs with batch verification","volume":"21","author":"Bayat","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","article-title":"2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication scheme for VANET","volume":"65","author":"Wang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_13","first-page":"1","article-title":"An Efficient V2I Authentication Scheme for VANETs","volume":"2018","author":"Zhou","year":"2018","journal-title":"Mob. Inf. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Perrig, A., and Tygar, J.D. (2003). TESLA Broadcast Authentication. Secure Broadcast Communication, Springer.","DOI":"10.1007\/978-1-4615-0229-6"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/JCN.2009.6388411","article-title":"Flexible, extensible, and efficient VANET authentication","volume":"11","author":"Studer","year":"2009","journal-title":"J. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TVT.2010.2089544","article-title":"ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks","volume":"60","author":"Huang","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Biswas, S., and Misic, J. (2010, January 6\u201310). Deploying proxy signature in VANETs. Proceedings of the IEEE Globalal Telecommunication Conference (GLOBECOM), Miami, FL, USA.","DOI":"10.1109\/GLOCOM.2010.5683526"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1109\/TVT.2015.2406877","article-title":"Enhancing security and privacy for identity-based batch verification scheme in VANETs","volume":"66","author":"Tzeng","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s00607-014-0393-x","article-title":"LESPP: Lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication","volume":"98","author":"Wang","year":"2014","journal-title":"Computing"},{"key":"ref_20","unstructured":"IEEE (2016). 1609.2-2016\u2014IEEE Standard for Wireless Access in Vehicular Environments\u2014Security Services for Applications and Management Messages, IEEE."},{"key":"ref_21","unstructured":"(2020, January 28). Intelligent Transport Systems (ITS); Security; Security Services and Architecture, document ETSI TS 103 097 V1.1.1 (2013-04). Available online: https:\/\/www.etsi.org\/deliver\/etsi_ts\/103000_103099\/103097\/01.01.01_60\/ts_103097v010101p.pdf."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Petit, J. (2009, January 20\u201323). Analysis of ecdsa authentication processing in vanets. Proceedings of the 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt.","DOI":"10.1109\/NTMS.2009.5384696"},{"key":"ref_23","unstructured":"Hamida, E.B., Znaidi, W., and Menouar, H. (2015, January 6\u20139). Implementation and evaluation of the ETSI security architecture for cooperative intelligent transport systems. Proceedings of the IEEE 82nd Vehicular Technology Conference, Boston, MA, USA."},{"key":"ref_24","unstructured":"Bi\u00dfmeyer, N., Mauthofer, S., Petit, J., Lange, M., Moser, M., Estor, D., Sall, M., Feiri, M., Moalla, R., and Lagana, M. (2020, January 28). PREparing SEcuRe VEhicle-to-X Communication Systems. Available online: https:\/\/www.preserve-project.eu\/www.preserve-project.eu\/sites\/preserve-project.eu\/files\/PRESERVE-D1.3-V2X_Security_Architecture_V2.pdf."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Javed, M., Hamida, E.B., and Znaidi, W. (2016). Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice. Sensors, 16.","DOI":"10.3390\/s16060879"},{"key":"ref_26","unstructured":"Ahmed-Zaid, F., Bai, F., Bai, S., Basnayake, C., Bellur, B., Brovold, S., Brown, G., Caminiti, L., Cunningham, D., and Elzein, H. (2011). Vehicle Safety Communication-Applications (VSC-A) Final Report: Appendix Volume 3 Security."},{"key":"ref_27","first-page":"1691","article-title":"Software implementation of wave security algorithms","volume":"15","author":"Kang","year":"2014","journal-title":"J. Korea Acad. Ind. Coop. Soc."},{"key":"ref_28","unstructured":"Orman, H., and Hoffman, P. (2020, January 28). Determining Strengths For Public Keys Used for Exchanging Symmetric Keys. Available online: https:\/\/tools.ietf.org\/html\/rfc3766."},{"key":"ref_29","unstructured":"Barker, E., and Barker, W. (2018). Recommendation for Key Management, Part 2: Best Practices for Key Management Organizations (2nd Draft) (No. NIST Special Publication (SP) 800-57 Part 2 Rev. 1 (Draft))."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Barker, E., and Roginsky, A. (2011). Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, Special Publication 800-131A.","DOI":"10.6028\/NIST.SP.800-131a"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Dang, Q. (2009). Recommendation for Applications Using Approved Hash Algorithms, Special Publication.","DOI":"10.6028\/NIST.SP.800-107"},{"key":"ref_32","unstructured":"Kelley, D. (2020, January 28). DSRC Implementation Guide, A Guide to Users of SAE J2735 Message Sets Over DSRC. Available online: https:\/\/docplayer.net\/85965432-Dsrc-implementation-guide-a-guide-to-users-of-sae-j2735-message-sets-over-dsrc.html."},{"key":"ref_33","unstructured":"(2020, January 28). SDK-Cohda Wireless, Cohda Wireless. Available online: https:\/\/Cohdawireless.com\/solutions\/sdk\/."},{"key":"ref_34","unstructured":"(2020, January 28). SAF5100\u2013V2X Baseband Processor NXP, Nxp.com. Available online: https:\/\/www.nxp.com\/products\/wireless\/dsrc-safety-modem\/software-defined-radio-processor-for-v2x-communication:SAF5100."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"149433","DOI":"10.1109\/ACCESS.2019.2947290","article-title":"A Comparative Experimental Analysis of Channel Access Protocols in Vehicular Networks","volume":"7","author":"Elsharief","year":"2019","journal-title":"IEEE Access"},{"key":"ref_36","unstructured":"(2020, January 28). Wireshark Go Deep.Wireshark.org. Available online: https:\/\/www.wireshark.org\/."},{"key":"ref_37","unstructured":"Yousefi, S., Fathy, M., and Benslimane, A. (2020, January 28). Performance of beacon safety message dissemination in Vehicular Ad hoc NETworks (VANETs), SpringerLink. Available online: https:\/\/link.springer.com\/article\/10.1631\/jzus.2007.A1990.01-Nov-2007."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/19\/5719\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:17:31Z","timestamp":1760177851000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/19\/5719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,8]]},"references-count":37,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2020,10]]}},"alternative-id":["s20195719"],"URL":"https:\/\/doi.org\/10.3390\/s20195719","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,8]]}}}