Dyanimc Key based Authentication Scheme for Vehicular Cloud Computing

被引:0
|
作者
Sharma, Manish Kumar [1 ]
Bali, Rasmeet S. [2 ]
Kaur, Arvinder [1 ]
机构
[1] Chandigarh Univ, Dept Comp Sci & Engn, Gharuan, Punjab, India
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Vehicular Cloud Computing; Key Generation; Key Authentication; Intelligent Transportation System; VANET's;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Vehicular Cloud Computing (VCC) has emerged as new technology to provide uninterrupted information to the vehicles from anywhere, anytime. The VCC provides two types of services such as safety related messages and non-safety related messages to the users. The vehicles have less computational power, storage etc. so that the vehicles collect information and send these information to the local or vehicular cloud for computation or storage purposes. But due to the dynamic nature, rapid topology changes and open communication medium, the information can be altered so that it leads to misguiding users, wrong information sharing etc. In the proposed scheme, Elliptic Curve Cryptography used for secure communication in the network that also ensures the security requirements such as confidentiality, integrity, privacy etc. The proposed scheme ensures the mutual authentication of both sender and receiver that wants to communicate. The scheme uses additional operation such as one-way hash function and concatenation to secure the network against various attacks i.e. spoofing attack, man-in-the-middle attack, replay attack etc. The effectiveness of the proposed scheme is evaluated using the different metrics such as packet delivery ratio, throughput and end-to-end delay and it is found better where it is not applied.
引用
收藏
页码:1059 / 1064
页数:6
相关论文
共 50 条
  • [31] An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
    Kumar, Vikas
    Kumar, Rahul
    Jangirala, Srinivas
    Kumari, Saru
    Kumar, Sachin
    Chen, Chien-Ming
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [32] Secure message confirmation scheme based on batch verification in vehicular cloud computing
    Limbasiya, Trupil
    Das, Debasis
    PHYSICAL COMMUNICATION, 2019, 34 : 310 - 320
  • [33] A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure
    Wang, Feifei
    Xu, Guosheng
    Xu, Guoai
    Wang, Yuejie
    Peng, Junhao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [34] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [35] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    ChineseJournalofElectronics, 2018, 27 (01) : 41 - 45
  • [36] AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
    Dey, Saurabh
    Ye, Qiang
    Sampalli, Srinivas
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 700 - 705
  • [37] Review on Various Authentication Scheme Over Cloud Computing
    Kaur, Manjot
    Verma, Amit
    Kaur, Iqbaldeep
    Sharma, Dolly
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 62 - 65
  • [38] An Efficient Authentication Scheme for Mobile Cloud Computing Services
    Audithan, Sivaraman
    Vijayasaro, Vijayaregunathan
    Vijayakumar, Pandi
    Vijayakumar, Varadarajan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 727 - 741
  • [39] An Efficient Group Authentication Mechanism Supporting Key Confidentiality, Key Freshness And Key Authentication In Cloud Computing
    Nair, Nikhitha K.
    Navin, K. S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC), 2015, : 288 - 292
  • [40] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072