A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment

被引:32
作者
Chen, Chien -Ming [1 ]
Li, Zhen [1 ]
Kumari, Saru [2 ]
Srivastava, Gautam [3 ,5 ,6 ]
Lakshmanna, Kuruva [4 ]
Gadekallu, Thippa Reddy [4 ,7 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao, Peoples R China
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut, India
[3] Brandon Univ BU, Dept Math & Comp Sci, Brandon, MB, Canada
[4] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
[5] China Med Univ, Res Ctr Interneural Comp, Taichung, Taiwan
[6] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[7] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos, Lebanon
关键词
Confidential computing; Social Internet of Vehicles; Authentication protocol; Fog; Key transfer; AGREEMENT PROTOCOL; MANAGEMENT; ARCHITECTURE; EFFICIENT;
D O I
10.1016/j.vehcom.2022.100567
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In recent years, the Social Internet of Vehicles (S IoV ) has been widely used in transportation, dramatically enhancing people's lifestyles. SIoV can collect and process traffic information in real-time, alleviate traffic congestion, and realize smart transportation in smart cities. However, the data generated by vehicles moving with servers are transmitted on public channels, so the sensitive information of drivers can be easily intercepted and tampered with by attackers. In addition, the massive amount of real-time data generated by these vehicles, devices, drivers, passengers, and other social relationships impose a tremendous load on servers. Therefore, in this paper, we propose a secure authentication protocol using confidential computing environments. Moreover, we also innovatively offer a better key transfer phase to reduce the computing pressure on cloud servers. We use the Real-Oracle Random model to demonstrate the proposed protocol is provably secure. Experimental evaluation shows that the proposed protocol has excellent computational and communication performance.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页数:12
相关论文
共 47 条
[1]   Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications [J].
AbdolrezaEftekhari, Seyed ;
Nikooghadam, Morteza ;
Rafighi, Masoud .
VEHICULAR COMMUNICATIONS, 2021, 28
[2]  
Agilandeeswari L, 2022, MULTIMED TOOLS APPL, P1
[3]  
Ahmed S., 2020, IEEE ACCESS, V8
[4]   Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Hasbullah, Iznan Husainy ;
Manickam, Selvakumar .
IEEE SENSORS JOURNAL, 2021, 21 (02) :2422-2433
[5]   VPPCS: VANET-Based Privacy-Preserving Communication Scheme [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Manickam, Selvakumar ;
Yassin, Ali A. .
IEEE ACCESS, 2020, 8 :150914-150928
[6]   Toward Social Internet of Vehicles: Concept, Architecture, and Applications [J].
Alam, Kazi Masudul ;
Saini, Mukesh ;
El Saddik, Abdulmotaleb .
IEEE ACCESS, 2015, 3 :343-357
[7]   Artificial Intelligence (AI)-Empowered Intrusion Detection Architecture for the Internet of Vehicles [J].
Alladi T. ;
Kohli V. ;
Chamola V. ;
Yu F.R. ;
Guizani M. .
IEEE Wireless Communications, 2021, 28 (03) :144-149
[8]  
[Anonymous], 2018, IEEE INTERNET THINGS, DOI DOI 10.1109/JIOT.2017.2764259
[9]  
Arooj A., 2021, Archives of Computational Methods in Engineering, P1
[10]   A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network [J].
Azam, Farooque ;
Yadav, Sunil Kumar ;
Priyadarshi, Neeraj ;
Padmanaban, Sanjeevikumar ;
Bansal, R. C. .
IEEE ACCESS, 2021, 9 :31309-31321