AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

被引:153
|
作者
Wazid, Mohammad [1 ]
Bagga, Palak [2 ]
Das, Ashok Kumar [2 ]
Shetty, Sachin [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ]
Park, Youngho [7 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol, Dept Comp Sci & Engn, Manipal 576104, Karnataka, India
[2] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Ctr Cybersecur Educ & Res, Dept Modeling Simulat & Visualizat Engn, Suffolk, VA 23435 USA
[4] Natl Inst Telecommun, PPG Telecommun, BR-37540000 Santa Rita Do Sapucai, Brazil
[5] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[6] Univ Fed Piaui, PPGEE, BR-64049 Teresina, Brazil
[7] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authenticated key management; automated validation of Internet security protocols and application (AVISPA); fog computing; Internet of Vehicles (IoV); NS2; simulation; security; SCHEME; SECURITY; EXCHANGE; PRIVACY; DESIGN;
D O I
10.1109/JIOT.2019.2923611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.
引用
收藏
页码:8804 / 8817
页数:14
相关论文
共 50 条
  • [21] Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
    Li, Wei
    Li, Xuelian
    Gao, Juntao
    Wang, Haiyu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1276 - 1290
  • [22] A mobile edge computing-based applications execution framework for Internet of Vehicles
    WU Libing
    ZHANG Rui
    LI Qingan
    MA Chao
    SHI Xiaochuan
    [J]. Frontiers of Computer Science, 2022, 16 (05)
  • [23] A mobile edge computing-based applications execution framework for Internet of Vehicles
    Libing Wu
    Rui Zhang
    Qingan Li
    Chao Ma
    Xiaochuan Shi
    [J]. Frontiers of Computer Science, 2022, 16
  • [24] A mobile edge computing-based applications execution framework for Internet of Vehicles
    Wu, Libing
    Zhang, Rui
    Li, Qingan
    Ma, Chao
    Shi, Xiaochuan
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (05)
  • [25] An efficient and authenticated key establishment scheme based on fog computing for healthcare system
    Li, Xinghua
    Chen, Ting
    Cheng, Qingfeng
    Ma, Jianfeng
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (04)
  • [26] SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing
    Wu, Tsu-Yang
    Guo, Xinglan
    Chen, Yeh-Cheng
    Kumari, Saru
    Chen, Chien-Ming
    [J]. SYMMETRY-BASEL, 2022, 14 (07):
  • [27] An efficient and authenticated key establishment scheme based on fog computing for healthcare system
    LI Xinghua
    CHEN Ting
    CHENG Qingfeng
    MA Jianfeng
    [J]. Frontiers of Computer Science, 2022, 16 (04)
  • [28] An efficient and authenticated key establishment scheme based on fog computing for healthcare system
    Xinghua Li
    Ting Chen
    Qingfeng Cheng
    Jianfeng Ma
    [J]. Frontiers of Computer Science, 2022, 16
  • [29] RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones
    Tanveer, Muhammad
    Khan, Abd Ullah
    Kumar, Neeraj
    Hassan, Mohammad Mehedi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) : 1339 - 1353
  • [30] Research and Application of Intelligent Internet of Vehicles Model Based on Fog Computing
    Qin, Baoling
    Cai, Jiejian
    Luo, Yunshi
    Meng, Fenglin
    Mang, Jianwei
    Luo, Qiao
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1777 - 1783