AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

被引:153
|
作者
Wazid, Mohammad [1 ]
Bagga, Palak [2 ]
Das, Ashok Kumar [2 ]
Shetty, Sachin [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ]
Park, Youngho [7 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol, Dept Comp Sci & Engn, Manipal 576104, Karnataka, India
[2] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Ctr Cybersecur Educ & Res, Dept Modeling Simulat & Visualizat Engn, Suffolk, VA 23435 USA
[4] Natl Inst Telecommun, PPG Telecommun, BR-37540000 Santa Rita Do Sapucai, Brazil
[5] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[6] Univ Fed Piaui, PPGEE, BR-64049 Teresina, Brazil
[7] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Authenticated key management; automated validation of Internet security protocols and application (AVISPA); fog computing; Internet of Vehicles (IoV); NS2; simulation; security; SCHEME; SECURITY; EXCHANGE; PRIVACY; DESIGN;
D O I
10.1109/JIOT.2019.2923611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.
引用
收藏
页码:8804 / 8817
页数:14
相关论文
共 50 条
  • [41] ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)
    C. T. Poomagal
    G. A. Sathish Kumar
    [J]. Wireless Personal Communications, 2020, 113 : 1359 - 1377
  • [42] A Contract-Based Computing-Charging Protocol for Electric Vehicles with Vehicular Fog Computing
    Wei, Zhiwei
    Li, Bing
    Zhang, Rongqing
    Cheng, Xiang
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 5868 - 5873
  • [43] Internet of Vehicles (IoV)-Based Task Scheduling Approach Using Fuzzy Logic Technique in Fog Computing Enables Vehicular Ad Hoc Network (VANET)
    Ehtisham, Muhammad
    ul Hassan, Mahmood
    Al-Awady, Amin A.
    Ali, Abid
    Junaid, Muhammad
    Khan, Jahangir
    Abdelrahman Ali, Yahya Ali
    Akram, Muhammad
    [J]. SENSORS, 2024, 24 (03)
  • [44] Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
    Saurabh Rana
    Dheerendra Mishra
    Riya Arora
    [J]. Wireless Personal Communications, 2021, 119 : 727 - 747
  • [45] Building Decentralized Fog Computing-Based Smart Parking Systems: From Deterministic Propagation Modeling to Practical Deployment
    Celaya-Echarri, Mikel
    Froiz-Miguez, Ivan
    Azpilicueta, Leyre
    Fraga-Lamas, Paula
    Lopez-Iturri, Peio
    Falcone, Francisco
    Fernandez-Carames, Tiago M.
    [J]. IEEE ACCESS, 2020, 8 : 117666 - 117688
  • [46] Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
    Rana, Saurabh
    Mishra, Dheerendra
    Arora, Riya
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (01) : 727 - 747
  • [47] Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things
    Lee, Tian-Fu
    Chen, Wei-Yu
    [J]. Journal of Information Security and Applications, 2021, 59
  • [48] A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications
    Karnatak, Vijay
    Mishra, Amit Kumar
    Tripathi, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    [J]. SECURITY AND PRIVACY, 2024, 7 (02)
  • [49] Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things
    Lee, Tian-Fu
    Chen, Wei-Yu
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
  • [50] An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
    陆荣幸
    曹珍富
    苏仁旺
    柴震川
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 205 - 209