A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System

被引:13
|
作者
Mahmood, Khalid [1 ]
Ferzund, Javed [2 ]
Saleem, Muhammad Asad [2 ]
Shamshad, Salman [3 ]
Das, Ashok Kumar [4 ,5 ]
Park, Youngho [6 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu 64002, Yunlin, Taiwan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[3] Univ Lahore, Dept Software Engn, Lahore 54590, Pakistan
[4] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[5] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[6] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Protocols; Security; Internet of Things; Authentication; Big Data; Logic gates; Transportation; Authentication protocol; mutual authentication; key agreement; security protocol; KEY; PROTOCOLS; INTERNET;
D O I
10.1109/TITS.2022.3177692
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The emergence of contemporary technologies like cloud computing and the Internet of Things (IoT) has revolutionized the trends in the cyber world to serve humanity. There are plenty of applications in which they are being used, especially in smart cities and their constituents, Maritime Transportation System (MTS) is one of them. The IoT-enabled MTS has the potential to entertain the growing challenges of modern-day ship transportation. Secure real-time data access from numerous smart IoT devices is the most critical and crucial exercise for Big Data acquisition in IoT-enabled MTS. Therefore, we have developed a Physically Unclonable Function (PUF) based authenticated key agreement solution to deal with this challenge. This solution enables the mobile user and IoT node to mutually authenticate each other via Cloud-Gateway before real-time data exchange and transmission in IoT-enabled MTS. The use of PUF in our solution brings invincibility against physical security threats. An inclusive security analysis under the assumption of the specified threat model is carried out to substantiate the security resilience of our solution. The conduct of our solution is realized through security features, communication, and computation cost and It has been observed that our solution achieves efficiency of 37.3% and 9.7% in communication and computation overhead, respectively. Moreover, the network performance effectiveness of our solution is demonstrated in NS3 implementation.
引用
收藏
页码:2411 / 2421
页数:11
相关论文
共 50 条
  • [21] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [22] Intelligent metaheuristics with optimal machine learning approach for malware detection on IoT-enabled maritime transportation systems
    Maray, Mohammed
    Alghamdi, Mohammed
    Alrayes, Fatma S.
    Alotaibi, Saud S.
    Alazwari, Sana
    Alabdan, Rana
    Al Duhayyim, Mesfer
    [J]. EXPERT SYSTEMS, 2022, 39 (10)
  • [23] Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
    Maurya, Anup Kumar
    Das, Ashok Kumar
    Jamal, Sajjad Shaukat
    Giri, Debasis
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 120
  • [24] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ullah, Ata
    Said, Ghawar
    Sher, Muhammad
    Ning, Huansheng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 163 - 174
  • [25] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ata Ullah
    Ghawar Said
    Muhammad Sher
    Huansheng Ning
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 163 - 174
  • [26] A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System
    Kim, Myeonghyun
    Lee, Joonyoung
    Oh, Jihyeon
    Kwon, Deokkyu
    Park, Kisung
    Park, Youngho
    Park, Kil Houm
    [J]. IEEE ACCESS, 2022, 10 : 96224 - 96238
  • [27] A Secure and IoT-Enabled Data Sharing System Based on IPFS and IOTA Blockchain
    Huang, Tse-Yang
    Chen, Yu-Chi
    Hsieh, Tsung-Chen
    Chang, Huan-Chi
    Chang, Chih-Chieh
    [J]. PROCEEDINGS OF 2023 5TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2023, 2023, : 50 - 57
  • [28] BAESDA: A Blockchain-Assisted Efficient and Secure Data Authentication Scheme for Distributed IoT Collection System
    Deng, Yinjuan
    Wang, Shangping
    Wang, Jifang
    Yan, Ruoxin
    [J]. IEEE SENSORS JOURNAL, 2024, 24 (08) : 13193 - 13208
  • [29] A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
    Chaudhry, Shehzad Ashraf
    Irshad, Azeem
    Khan, Muhammad Asghar
    Khan, Sajjad Ahmad
    Nosheen, Summera
    AlZubi, Ahmad Ali
    Zikria, Yousaf Bin
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2401 - 2410
  • [30] IOT-Enabled Vertical Farming Monitoring System Using Big Data Analytics
    Chand, Javvaji Gopi
    Susmitha, Kodati
    Gowthami, Abbaraju
    Chowdary, Kambhampati Manohar
    Ahmed, Sk Khaleel
    [J]. 2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,