Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing

被引:10
|
作者
Lee, JoonYoung [1 ]
Yu, SungJin [1 ]
Kim, MyeongHyun [1 ]
Park, YoungHo [1 ]
Lee, SangWoo [2 ]
Chung, BoHeung [2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 18期
关键词
VANET; vehicular cloud computing; message confirmation; cryptanalysis; mutual authentication; AVISPA; ROR model; LIGHTWEIGHT AUTHENTICATION; MANAGEMENT PROTOCOL; SCHEME; INTERNET; VERIFICATION; DESIGN;
D O I
10.3390/app10186268
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as large as the number of vehicles and it is enormous when compared to vehicle calculation and storage performance. To resolve this problem, VANET uses a combined cloud computing technology, called vehicular cloud computing (VCC), which controls vehicle-related data, and helps vehicle drivers directly or indirectly. However, VANETs remain vulnerable to attacks such as tracking, masquerade and man-in-the-middle attacks because VANETs communicate via open networks. To overcome these issues, many researchers have proposed secure authentication protocols for message confirmation with vehicular cloud computing. However, many researchers have pointed out that some proposed protocols use ideal tamper-proof devices (TPDs). They demonstrated that realistic TPDs cannot prevent adversaries attack. Limbasiya et al. presented a message confirmation scheme for vehicular cloud computing using a realistic TPD in order to prevent these problems. However, their proposed scheme still has security weaknesses over a TPD and does not guarantee mutual authentication. This paper proposes a secure key agreement and authentication protocol to address the security weaknesses inherent in the protocol of Limbasiya et al. The suggested protocol withstands malicious attacks and ensures secure mutual authentication for privacy-preserving. We prove that the proposed protocol can provide session key security using Real-Or-Random (ROR) model. We also employed Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool to show that the proposed protocol is able to defeat replay and man-in-the-middle attacks. Furthermore, we established that the proposed protocol can resist other malicious attacks by conducting the informal security analysis. We proved that our proposed protocol is lightweight and suitable for VCC environments.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET
    Zhou, Yanwei
    Cao, Lei
    Qiao, Zirui
    Xu, Ran
    Han, Yu
    Xing, Junsheng
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 13526 - 13541
  • [42] A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET
    Zhou, Yanwei
    Cao, Lei
    Qiao, Zirui
    Xu, Ran
    Han, Yu
    Xing, Junsheng
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    IEEE Transactions on Vehicular Technology, 2024, 73 (09): : 13526 - 13541
  • [43] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Rangwani, Diksha
    Om, Hari
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3865 - 3888
  • [44] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Diksha Rangwani
    Hari Om
    Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888
  • [45] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Saru Kumari
    Fan Wu
    Shehzad Ashraf Chaudhry
    R. Niranchana
    Mobile Networks and Applications, 2019, 24 : 1046 - 1062
  • [46] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 1046 - 1062
  • [47] An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds
    Li, Congcong
    Ji, Shouwen
    Zhang, Xi
    Wang, Haiping
    Li, Dongfeng
    Liu, Huiyong
    SENSORS, 2018, 18 (09)
  • [48] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [49] A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration
    Ogundoyin, Sunday Oyinlola
    Kamil, Ismaila Adeniyi
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 348 - 353
  • [50] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33