تعداد نشریات | 418 |
تعداد شمارهها | 10,003 |
تعداد مقالات | 83,617 |
تعداد مشاهده مقاله | 78,267,245 |
تعداد دریافت فایل اصل مقاله | 55,322,538 |
SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV | ||
Journal of Computer & Robotics | ||
مقاله 2، دوره 13، شماره 1، شهریور 2020، صفحه 11-20 اصل مقاله (743.11 K) | ||
نویسندگان | ||
Yashar Salami؛ Vahid Khajehvand* | ||
Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran | ||
چکیده | ||
Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user and can communicate with Road Side Units (RSU) and process information with low latency. IOV employs a wireless network for message exchange which is a security flaw and an opportunity for the adversaries since that can modify the transmitted data. Thus, data authentication between the transmitter and the receiver has become a challenge in this context. We propose a secure mutual authentication protocol with the ability to key exchange in this paper, which does not use the hash function. We compared this design with other protocols in terms of security requirements and communication and processing costs. To the security analysis of the proposed Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used. The results show that the proposed protocol is more resistant to other methods of active and passive attacks but Computation and communication costs have increased. | ||
کلیدواژهها | ||
Authentication؛ Security؛ Model-Checker؛ OFMC؛ CL-ATSE؛ Avispa | ||
مراجع | ||
[1] T. Mastelic, A. Oleksiak, H. Claussen, I. Brandic, J.-M. Pierson, and A. V Vasilakos, “Cloud Computing: Survey on Energy Efficiency,” ACM Comput. Surv., vol. 47, no. 2, Dec. 2014. [2] M. Xu and R. Buyya, “Brownout approach for adaptive management of resources and applications in cloud computing systems: A taxonomy and future directions,” ACM Comput. Surv., vol. 52, no. 1, 2019. [3] S. Sharma and B. Kaushik, “A survey on internet of vehicles: Applications, security issues & solutions,” Veh. Commun., vol. 20, pp. 100–182, 2019. [4] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Futur. Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013. [5] S. Andreev et al., “Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap,” IEEE Commun. Mag., vol. 53, no. 9, pp. 32–40, 2015. [6] M. H. Yaghmaee Moghaddam and A. Leon-Garcia, “A fog-based internet of energy architecture for transactive energy management systems,” IEEE Internet Things J., vol. 5, no. 2, pp. 1055–1069, Apr. 2018. [7] M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L. Shu, “Authentication Protocols for Internet of Things: A Comprehensive Survey,” Secur. Commun. Networks, vol. 2017, 2017. [8] M. Ma, D. He, H. Wang, N. Kumar, and K. K. R. Choo, “An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks,” IEEE Internet Things J., vol. 6, no. 5, pp. 8065–8075, 2019. [9] X. Wang, Z. Ning, and L. Wang, “Offloading in Internet of vehicles: A fog-enabled real-time traffic management system,” IEEE Trans. Ind. Informatics, vol. 14, no. 10, pp. 4568–4578, 2018. [10] R. Mahmud, R. Kotagiri, and R. Buyya, “Fog Computing: A Taxonomy, Survey and Future Directions,” pp. 103–130, 2018. [11] H. Hasrouny, C. Bassil, A. E. Samhat, and A. Laouiti, “Group-based authentication in V2V communications,” in 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2015, pp. 173–177. [12] Y. Liu, Y. Wang, and G. Chang, “Efficient Privacy- Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm,” IEEE Trans. Intell. Transp. Syst., vol. 18, no. 10, pp. 2740–2749, 2017. [13] L. Benarous and B. Kadri, “Ensuring privacy and authentication for V2V resource sharing,” Proc. - 2017 7th Int. Conf. Emerg. Secur. Technol. EST 2017, pp. 1–6, 2017. [14] P. Mohit, R. Amin, and G. P. Biswas, “Design of authentication protocol for wireless sensor network-based smart vehicular system,” Veh. Commun., vol. 9, no. February, pp. 64–71, 2017. [15] B. Ying and A. Nayak, “Anonymous and lightweight authentication for secure vehicular networks,” IEEE Trans. Veh. Technol., vol. 66, no. 12, pp. 10626–10636, 2017. [16] J. Liu, Q. Li, R. Sun, X. Du, and M. Guizani, “An efficient anonymous authentication scheme for internet of vehicles,” IEEE Int. Conf. Commun., vol. 2018-May, pp. 1–6, 2018. [17] K. Lim and K. M. Tuladhar, “LIDAR: Lidar Information based Dynamic V2V Authentication for Roadside Infrastructure-less Vehicular Networks,” 2019 16th IEEE Annu. Consum. Commun. Netw. Conf. CCNC 2019, pp. 1– 6, 2019. [18] C. M. Chen, B. Xiang, Y. Liu, and K. H. Wang, “A secure authentication protocol for internet of vehicles,” IEEE Access, vol. 7, no. c, pp. 12047–12057, 2019. [19] H. Vasudev, V. Deshpande, D. Das, and S. K. Das, “A lightweight mutual authentication protocol for V2V communication in internet of vehicles,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 6709–6717, 2020. [20] S.-T. Wu, J.-H. Chiu, and B.-C. Chieu, “ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography,” in 2005 IEEE International Conference on Electro Information Technology, 2005, pp. 5----pp. [21] S. Kalra and S. K. Sood, “Secure authentication scheme for IoT and cloud servers,” Pervasive Mob. Comput., vol. 24, pp. 210–223, 2015. [22] S. Kumari, M. Karuppiah, A. Kumar, D. Xiong, L. Fan, and N. Kumar, “A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers,” J. Supercomput., 2017. [23] M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and Y. Park, “AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment,” IEEE Internet Things J., vol. 6, no. 5, pp. 8804–8817, 2019. [24] E. Bresson, O. Chevassut, and D. Pointcheval, “Provably secure authenticated group Diffie-Hellman key exchange,” ACM Trans. Inf. Syst. Secur., vol. 10, no. 3, pp. 10----es, 2007. [25] L. Harn, M. Mehta, and W.-J. Hsin, “Integrating Diffie- Hellman key exchange into the digital signature algorithm (DSA),” IEEE Commun. Lett., vol. 8, no. 3, pp. 198–200, 2004. [26] J. A. Hurtado Alegr$$’$$ia, M. C. Bastarrica, and A. Bergel, “Analyzing software process models with AVISPA,” in Proceedings of the 2011 International Conference on Software and Systems Process, 2011, pp. 23–32. [27] L. Viganò, “Automated security protocol analysis with the AVISPA tool,” Electron. Notes Theor. Comput. Sci., vol. 155, pp. 61–86, 2006. [28] A. Armando et al., “The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications,” in Computer Aided Verification, 2005, pp. 281–285. [29] D. Von Oheimb, “The high-level protocol specification language HLPSL developed in the EU project AVISPA,” in Proceedings of APPSEM 2005 workshop, 2005, pp. 1–17. | ||
آمار تعداد مشاهده مقاله: 402 تعداد دریافت فایل اصل مقاله: 323 |