Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing

被引:10
|
作者
Lee, JoonYoung [1 ]
Yu, SungJin [1 ]
Kim, MyeongHyun [1 ]
Park, YoungHo [1 ]
Lee, SangWoo [2 ]
Chung, BoHeung [2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 18期
关键词
VANET; vehicular cloud computing; message confirmation; cryptanalysis; mutual authentication; AVISPA; ROR model; LIGHTWEIGHT AUTHENTICATION; MANAGEMENT PROTOCOL; SCHEME; INTERNET; VERIFICATION; DESIGN;
D O I
10.3390/app10186268
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as large as the number of vehicles and it is enormous when compared to vehicle calculation and storage performance. To resolve this problem, VANET uses a combined cloud computing technology, called vehicular cloud computing (VCC), which controls vehicle-related data, and helps vehicle drivers directly or indirectly. However, VANETs remain vulnerable to attacks such as tracking, masquerade and man-in-the-middle attacks because VANETs communicate via open networks. To overcome these issues, many researchers have proposed secure authentication protocols for message confirmation with vehicular cloud computing. However, many researchers have pointed out that some proposed protocols use ideal tamper-proof devices (TPDs). They demonstrated that realistic TPDs cannot prevent adversaries attack. Limbasiya et al. presented a message confirmation scheme for vehicular cloud computing using a realistic TPD in order to prevent these problems. However, their proposed scheme still has security weaknesses over a TPD and does not guarantee mutual authentication. This paper proposes a secure key agreement and authentication protocol to address the security weaknesses inherent in the protocol of Limbasiya et al. The suggested protocol withstands malicious attacks and ensures secure mutual authentication for privacy-preserving. We prove that the proposed protocol can provide session key security using Real-Or-Random (ROR) model. We also employed Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool to show that the proposed protocol is able to defeat replay and man-in-the-middle attacks. Furthermore, we established that the proposed protocol can resist other malicious attacks by conducting the informal security analysis. We proved that our proposed protocol is lightweight and suitable for VCC environments.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
    Wei, Guoheng
    Qin, Yanlin
    Fu, Wei
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 160 - 172
  • [22] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Alizadeh, Javad
    Safkhani, Masoumeh
    Allahdadi, Amir
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 2911 - 2935
  • [23] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Javad Alizadeh
    Masoumeh Safkhani
    Amir Allahdadi
    Wireless Personal Communications, 2022, 126 : 2911 - 2935
  • [24] Highly secure authentication and key agreement protocol for the internet of vehicles
    Li, Li
    Fan, Xingjuan
    Zhi, Boyuan
    Li, Shaojun
    Dabollahi, Seyyed Amirreza
    TELECOMMUNICATION SYSTEMS, 2024, 87 (01) : 73 - 88
  • [25] SAKA: a secure authentication and key agreement protocol for GSM networks
    Neetesh Saxena
    Narendra S. Chaudhari
    CSI Transactions on ICT, 2013, 1 (4) : 331 - 341
  • [26] Study of Broker-Based Mutual Authentication with Key Agreement for Secure Multi-Cloud Computing
    Kim, Bumryong
    Choi, Keunchang
    Kim, Hyungjoo
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2420 - 2424
  • [27] RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing
    Kumar, Vikas
    Kumar, Rahul
    Kumar, Vinod
    Kumari, Adesh
    Kumari, Saru
    Journal of Network Intelligence, 2022, 7 (03): : 526 - 543
  • [28] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2315 - 2329
  • [29] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huang, Huihui
    Lu, Siqi
    Wu, Zehui
    Wei, Qiang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [30] SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing
    Wu, Tsu-Yang
    Wang, Liyang
    Guo, Xinglan
    Chen, Yeh-Cheng
    Chu, Shu-Chuan
    SUSTAINABILITY, 2022, 14 (17)