An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing

被引:18
作者
Akram, Waseem [1 ]
Mahmood, Khalid [2 ,3 ]
Li, Xiong [4 ]
Sadiq, Mazhar [5 ]
Lv, Zhihan [6 ]
Chaudhry, Shehzad Ashraf [7 ,8 ]
机构
[1] Lahore Garrison Univ, Dept Comp Sci, Main Campus, Lahore, Pakistan
[2] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Yunlin 64002, Taiwan
[3] Univ Padua, Dept Math, I-35131 Padua, Italy
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[5] COMSATS Univ, Dept Comp Sci, Sahiwal Campus, Islamabad, Pakistan
[6] Uppsala Univ, Fac Arts, Dept Game Design, Uppsala, Sweden
[7] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[8] Nisantasi Univ, Fac Engn & Architecture, Dept Comp Engn, Istanbul, Turkey
关键词
Authentication; Mutual authentication; Identity based authentication; Vehicular cloud computing; USER AUTHENTICATION; DUAL AUTHENTICATION; KEY EXCHANGE; PROTOCOL; PRIVACY;
D O I
10.1016/j.comnet.2022.109335
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers vehicle-to-device, vehicle-to-infrastructure, and vehicle-to-vehicle communication in which the vehicles can communicate using sensing abilities. VCC is exploiting the IoT environment, cloud architecture, and vehicle resources. However, the energy-efficient privacy of communicators and security of communication are assertive problems in VCC. To accomplish this goal, we present an identity-based authentication scheme for VCC which also uses radio frequency identification (RFID). The security and robustness of the devised scheme are evaluated using informal and formal analysis. The informal analysis shows that our scheme is vigorous to resist various attacks. The formal analysis is done through Random Oracle Model (ROM) which shows that the scheme is secure and efficient. The performance of our scheme is also determined and compared with various related schemes which clearly illustrate the efficiency of the proposed scheme. Thus, our scheme is very efficient for employment in the VCC environment.
引用
收藏
页数:11
相关论文
共 67 条
[41]   A robust ElGamal-based password-authentication protocol using smart card for client-server communication [J].
Maitra, Tanmoy ;
Obaidat, Mohammad S. ;
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Chaudhry, Shehzad Ashraf ;
Giri, Debasis .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
[42]  
Mishra D., 2013, PAIRING FREE IDENTIT, P721
[43]   A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things [J].
Naeem, Muhammad ;
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid ;
Karuppiah, Marimuthu ;
Kumari, Saru .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
[44]   Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems [J].
Ning, H. ;
Liu, H. ;
Mao, J. ;
Zhang, Y. .
IET COMMUNICATIONS, 2011, 5 (12) :1755-1768
[45]   Taking VANET to the clouds [J].
Olariu, Stephan ;
Khalil, Ismail ;
Abuelela, Mahmoud .
INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2011, 7 (01) :7-+
[46]   RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing [J].
Safkhani, Masoumeh ;
Camara, Carmen ;
Peris-Lopez, Pedro ;
Bagheri, Nasour .
VEHICULAR COMMUNICATIONS, 2021, 28
[47]  
Shamshad Salman, 2021, Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), P1754, DOI 10.1109/ICAIS50930.2021.9395790
[48]  
Shamshad Salman, 2021, Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), P1766, DOI 10.1109/ICAIS50930.2021.9395888
[49]   A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Shi, Wenbo ;
Gong, Peng .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[50]   A survey on cloud computing security: Issues, threats, and solutions [J].
Singh, Saurabh ;
Jeong, Young-Sik ;
Park, Jong Hyuk .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 :200-222