A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System

被引:13
|
作者
Mahmood, Khalid [1 ]
Ferzund, Javed [2 ]
Saleem, Muhammad Asad [2 ]
Shamshad, Salman [3 ]
Das, Ashok Kumar [4 ,5 ]
Park, Youngho [6 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu 64002, Yunlin, Taiwan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[3] Univ Lahore, Dept Software Engn, Lahore 54590, Pakistan
[4] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[5] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[6] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Protocols; Security; Internet of Things; Authentication; Big Data; Logic gates; Transportation; Authentication protocol; mutual authentication; key agreement; security protocol; KEY; PROTOCOLS; INTERNET;
D O I
10.1109/TITS.2022.3177692
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The emergence of contemporary technologies like cloud computing and the Internet of Things (IoT) has revolutionized the trends in the cyber world to serve humanity. There are plenty of applications in which they are being used, especially in smart cities and their constituents, Maritime Transportation System (MTS) is one of them. The IoT-enabled MTS has the potential to entertain the growing challenges of modern-day ship transportation. Secure real-time data access from numerous smart IoT devices is the most critical and crucial exercise for Big Data acquisition in IoT-enabled MTS. Therefore, we have developed a Physically Unclonable Function (PUF) based authenticated key agreement solution to deal with this challenge. This solution enables the mobile user and IoT node to mutually authenticate each other via Cloud-Gateway before real-time data exchange and transmission in IoT-enabled MTS. The use of PUF in our solution brings invincibility against physical security threats. An inclusive security analysis under the assumption of the specified threat model is carried out to substantiate the security resilience of our solution. The conduct of our solution is realized through security features, communication, and computation cost and It has been observed that our solution achieves efficiency of 37.3% and 9.7% in communication and computation overhead, respectively. Moreover, the network performance effectiveness of our solution is demonstrated in NS3 implementation.
引用
收藏
页码:2411 / 2421
页数:11
相关论文
共 50 条
  • [31] An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
    Li, Chun-Ta
    Wu, Tsu-Yang
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Chen, Chien-Ming
    [J]. SENSORS, 2017, 17 (07):
  • [32] Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Kumar, Neeraj
    Lorenz, Pascal
    Alazab, Mamoun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 9097 - 9111
  • [33] Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems
    Gai, Keke
    Tang, Haokun
    Li, Guangshun
    Xie, Tianxiu
    Wang, Shuo
    Zhu, Liehuang
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2344 - 2358
  • [34] IDCT: Intelligent Data Collection Technique for IoT-Enabled Heterogeneous Wireless Sensor Networks in Smart Environments
    Osamy, Walid
    Salim, Ahmed
    Khedr, Ahmed M.
    El-Sawy, Ahmed A.
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (18) : 21099 - 21112
  • [35] IPDCA: Intelligent Proficient Data Collection Approach for IoT-Enabled Wireless Sensor Networks in Smart Environments
    Osamy, Walid
    Khedr, Ahmed M.
    El-Sawy, Ahmed A.
    Salim, Ahmed
    Vijayan, Dilna
    [J]. ELECTRONICS, 2021, 10 (09)
  • [36] A Secure Handshake Scheme for Mobile-hierarchy City Intelligent Transportation System
    Li, Shuai
    Gong, Peng
    Yang, Qian
    Li, Mingguan
    Kong, Jiejun
    Li, Ping
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 190 - 191
  • [37] Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT
    Kumar, Neeraj
    Ali, Rifaqat
    [J]. COMPUTER NETWORKS, 2024, 244
  • [38] A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications
    Karnatak, Vijay
    Mishra, Amit Kumar
    Tripathi, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    [J]. SECURITY AND PRIVACY, 2024, 7 (02)
  • [39] A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control
    Li, Xiong
    Tan, Jiawei
    Liu, Anfeng
    Vijayakumar, Pandi
    Kumar, Neeraj
    Alazab, Mamoun
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (04) : 2100 - 2110
  • [40] A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks
    Kumar, Ravi
    Singh, Samayveer
    Singh, Deepti
    Kumar, Mohit
    Gill, Sukhpal Singh
    [J]. SECURITY AND PRIVACY, 2024, 7 (01)