SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV
Subject Areas : Journal of Computer & RoboticsYashar Salami 1 , Vahid Khajehvand 2
1 - Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
2 - Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
Keywords:
Abstract :
[1] T. Mastelic, A. Oleksiak, H. Claussen, I. Brandic, J.-M.
Pierson, and A. V Vasilakos, “Cloud Computing: Survey
on Energy Efficiency,” ACM Comput. Surv., vol. 47, no. 2,
Dec. 2014.
[2] M. Xu and R. Buyya, “Brownout approach for adaptive
management of resources and applications in cloud
computing systems: A taxonomy and future directions,”
ACM Comput. Surv., vol. 52, no. 1, 2019.
[3] S. Sharma and B. Kaushik, “A survey on internet of
vehicles: Applications, security issues & solutions,” Veh.
Commun., vol. 20, pp. 100–182, 2019.
[4] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,
“Internet of Things (IoT): A vision, architectural elements,
and future directions,” Futur. Gener. Comput. Syst., vol.
29, no. 7, pp. 1645–1660, 2013.
[5] S. Andreev et al., “Understanding the IoT connectivity
landscape: a contemporary M2M radio technology
roadmap,” IEEE Commun. Mag., vol. 53, no. 9, pp. 32–40,
2015.
[6] M. H. Yaghmaee Moghaddam and A. Leon-Garcia, “A
fog-based internet of energy architecture for transactive
energy management systems,” IEEE Internet Things J.,
vol. 5, no. 2, pp. 1055–1069, Apr. 2018.
[7] M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L.
Shu, “Authentication Protocols for Internet of Things: A
Comprehensive Survey,” Secur. Commun. Networks, vol.
2017, 2017.
[8] M. Ma, D. He, H. Wang, N. Kumar, and K. K. R. Choo,
“An Efficient and Provably Secure Authenticated Key
Agreement Protocol for Fog-Based Vehicular Ad-Hoc
Networks,” IEEE Internet Things J., vol. 6, no. 5, pp.
8065–8075, 2019.
[9] X. Wang, Z. Ning, and L. Wang, “Offloading in Internet of
vehicles: A fog-enabled real-time traffic management
system,” IEEE Trans. Ind. Informatics, vol. 14, no. 10, pp.
4568–4578, 2018.
[10] R. Mahmud, R. Kotagiri, and R. Buyya, “Fog Computing:
A Taxonomy, Survey and Future Directions,” pp. 103–130,
2018.
[11] H. Hasrouny, C. Bassil, A. E. Samhat, and A. Laouiti,
“Group-based authentication in V2V communications,” in
2015 Fifth International Conference on Digital
Information and Communication Technology and its
Applications (DICTAP), 2015, pp. 173–177.
[12] Y. Liu, Y. Wang, and G. Chang, “Efficient Privacy-
Preserving Dual Authentication and Key Agreement
Scheme for Secure V2V Communications in an IoV
Paradigm,” IEEE Trans. Intell. Transp. Syst., vol. 18, no.
10, pp. 2740–2749, 2017.
[13] L. Benarous and B. Kadri, “Ensuring privacy and
authentication for V2V resource sharing,” Proc. - 2017 7th
Int. Conf. Emerg. Secur. Technol. EST 2017, pp. 1–6, 2017.
[14] P. Mohit, R. Amin, and G. P. Biswas, “Design of
authentication protocol for wireless sensor network-based
smart vehicular system,” Veh. Commun., vol. 9, no.
February, pp. 64–71, 2017.
[15] B. Ying and A. Nayak, “Anonymous and lightweight
authentication for secure vehicular networks,” IEEE Trans.
Veh. Technol., vol. 66, no. 12, pp. 10626–10636, 2017.
[16] J. Liu, Q. Li, R. Sun, X. Du, and M. Guizani, “An efficient
anonymous authentication scheme for internet of vehicles,”
IEEE Int. Conf. Commun., vol. 2018-May, pp. 1–6, 2018.
[17] K. Lim and K. M. Tuladhar, “LIDAR: Lidar Information
based Dynamic V2V Authentication for Roadside
Infrastructure-less Vehicular Networks,” 2019 16th IEEE
Annu. Consum. Commun. Netw. Conf. CCNC 2019, pp. 1–
6, 2019.
[18] C. M. Chen, B. Xiang, Y. Liu, and K. H. Wang, “A secure
authentication protocol for internet of vehicles,” IEEE
Access, vol. 7, no. c, pp. 12047–12057, 2019.
[19] H. Vasudev, V. Deshpande, D. Das, and S. K. Das, “A
lightweight mutual authentication protocol for V2V
communication in internet of vehicles,” IEEE Trans. Veh.
Technol., vol. 69, no. 6, pp. 6709–6717, 2020.
[20] S.-T. Wu, J.-H. Chiu, and B.-C. Chieu, “ID-based remote
authentication with smart cards on open distributed system
from elliptic curve cryptography,” in 2005 IEEE
International Conference on Electro Information
Technology, 2005, pp. 5----pp.
[21] S. Kalra and S. K. Sood, “Secure authentication scheme for
IoT and cloud servers,” Pervasive Mob. Comput., vol. 24,
pp. 210–223, 2015.
[22] S. Kumari, M. Karuppiah, A. Kumar, D. Xiong, L. Fan,
and N. Kumar, “A secure authentication scheme based on
elliptic curve cryptography for IoT and cloud servers,” J.
Supercomput., 2017.
[23] M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C.
Rodrigues, and Y. Park, “AKM-IoV: Authenticated Key
Management Protocol in Fog Computing-Based Internet of
Vehicles Deployment,” IEEE Internet Things J., vol. 6, no.
5, pp. 8804–8817, 2019.
[24] E. Bresson, O. Chevassut, and D. Pointcheval, “Provably
secure authenticated group Diffie-Hellman key exchange,”
ACM Trans. Inf. Syst. Secur., vol. 10, no. 3, pp. 10----es,
2007.
[25] L. Harn, M. Mehta, and W.-J. Hsin, “Integrating Diffie-
Hellman key exchange into the digital signature algorithm
(DSA),” IEEE Commun. Lett., vol. 8, no. 3, pp. 198–200,
2004.
[26] J. A. Hurtado Alegr$$’$$ia, M. C. Bastarrica, and A.
Bergel, “Analyzing software process models with
AVISPA,” in Proceedings of the 2011 International
Conference on Software and Systems Process, 2011, pp.
23–32.
[27] L. Viganò, “Automated security protocol analysis with the
AVISPA tool,” Electron. Notes Theor. Comput. Sci., vol.
155, pp. 61–86, 2006.
[28] A. Armando et al., “The AVISPA Tool for the Automated
Validation of Internet Security Protocols and
Applications,” in Computer Aided Verification, 2005, pp.
281–285.
[29] D. Von Oheimb, “The high-level protocol specification
language HLPSL developed in the EU project AVISPA,”
in Proceedings of APPSEM 2005 workshop, 2005, pp. 1–17.