AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

被引:153
|
作者
Wazid, Mohammad [1 ]
Bagga, Palak [2 ]
Das, Ashok Kumar [2 ]
Shetty, Sachin [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ]
Park, Youngho [7 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol, Dept Comp Sci & Engn, Manipal 576104, Karnataka, India
[2] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Ctr Cybersecur Educ & Res, Dept Modeling Simulat & Visualizat Engn, Suffolk, VA 23435 USA
[4] Natl Inst Telecommun, PPG Telecommun, BR-37540000 Santa Rita Do Sapucai, Brazil
[5] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[6] Univ Fed Piaui, PPGEE, BR-64049 Teresina, Brazil
[7] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authenticated key management; automated validation of Internet security protocols and application (AVISPA); fog computing; Internet of Vehicles (IoV); NS2; simulation; security; SCHEME; SECURITY; EXCHANGE; PRIVACY; DESIGN;
D O I
10.1109/JIOT.2019.2923611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.
引用
收藏
页码:8804 / 8817
页数:14
相关论文
共 50 条
  • [31] Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system
    Thapliyal, Siddhant
    Wazid, Mohammad
    Singh, D. P.
    Das, Ashok Kumar
    Islam, S. K. Hafizul
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [32] Toward intelligent resource management in dynamic Fog Computing-based Internet of Things environment with Deep Reinforcement Learning: A survey
    Gupta, Shally
    Singh, Nanhay
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (04)
  • [33] A Key Management Scheme Based on Hypergraph for Fog Computing
    Zhi Li
    Yanzhu Liu
    Di Liu
    Chunyang Li
    Wei Cui
    Guanglin Hu
    [J]. China Communications, 2018, 15 (11) : 158 - 170
  • [34] A Key Management Scheme Based on Hypergraph for Fog Computing
    Li, Zhi
    Liu, Yanzhu
    Liu, Di
    Li, Chunyang
    Cui, Wei
    Hu, Guanglin
    [J]. CHINA COMMUNICATIONS, 2018, 15 (11) : 158 - 170
  • [35] Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid
    Sonker, Sanjay Kumar
    Raina, Vibha Kaw
    Sagar, Bharat Bhushan
    Bansal, Ramesh C.
    [J]. ELECTRICAL ENGINEERING, 2024, 106 (02) : 1339 - 1355
  • [36] Efficient Authenticated Key Agreement Protocol for Cloud-Based Internet of Things
    Muthukumaran, V
    Kumar, V. Vinoth
    Joseph, Rose Bindu
    Munirathnam, Meram
    Beschi, I. S.
    Niveditha, V. R.
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 3, 2023, 492 : 365 - 373
  • [37] Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles
    Xie, Zhan
    Chen, Yong
    Ali, Ikram
    Pan, Chengwei
    Li, Fagen
    He, Wen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (05) : 5642 - 5653
  • [38] An Edge Computing Unloading Algorithm for IIoT-based Mobile and Internet of Vehicles (IoV) Applications
    Wang, Wenfan
    Li, Junzheng
    [J]. IETE JOURNAL OF RESEARCH, 2023, 69 (11)
  • [39] Fog Computing for Detecting Vehicular Congestion, an Internet of Vehicles Based Approach: A Review
    Thakur, Arnav
    Malekian, Reza
    [J]. IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2019, 11 (02) : 8 - 16
  • [40] ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)
    Poomagal, C. T.
    Kumar, G. A. Sathish
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (02) : 1359 - 1377