SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV

Authors

Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

Abstract

Internet of Vehicles (IOV) is a section of the Internet of Things (IoT) which makes road transportation smart and provides security for the passengers traveling along the roads. Fog computation can be considered as a complement for IOV because it is close to the user and can communicate with Road Side Units (RSU) and process information with low latency. IOV employs a wireless network for message exchange which is a security flaw and an opportunity for the adversaries since that can modify the transmitted data. Thus, data authentication between the transmitter and the receiver has become a challenge in this context. We propose a secure mutual authentication protocol with the ability to key exchange in this paper, which does not use the hash function. We compared this design with other protocols in terms of security requirements and communication and processing costs. To the security analysis of the proposed Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used. The results show that the proposed protocol is more resistant to other methods of active and passive attacks but Computation and communication costs have increased.

Keywords


[1] T. Mastelic, A. Oleksiak, H. Claussen, I. Brandic, J.-M.
Pierson, and A. V Vasilakos, “Cloud Computing: Survey
on Energy Efficiency,” ACM Comput. Surv., vol. 47, no. 2,
Dec. 2014.
[2] M. Xu and R. Buyya, “Brownout approach for adaptive
management of resources and applications in cloud
computing systems: A taxonomy and future directions,”
ACM Comput. Surv., vol. 52, no. 1, 2019.
[3] S. Sharma and B. Kaushik, “A survey on internet of
vehicles: Applications, security issues & solutions,” Veh.
Commun., vol. 20, pp. 100–182, 2019.
[4] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,
“Internet of Things (IoT): A vision, architectural elements,
and future directions,” Futur. Gener. Comput. Syst., vol.
29, no. 7, pp. 1645–1660, 2013.
[5] S. Andreev et al., “Understanding the IoT connectivity
landscape: a contemporary M2M radio technology
roadmap,” IEEE Commun. Mag., vol. 53, no. 9, pp. 32–40,
2015.
[6] M. H. Yaghmaee Moghaddam and A. Leon-Garcia, “A
fog-based internet of energy architecture for transactive
energy management systems,” IEEE Internet Things J.,
vol. 5, no. 2, pp. 1055–1069, Apr. 2018.
[7] M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L.
Shu, “Authentication Protocols for Internet of Things: A
Comprehensive Survey,” Secur. Commun. Networks, vol.
2017, 2017.
[8] M. Ma, D. He, H. Wang, N. Kumar, and K. K. R. Choo,
“An Efficient and Provably Secure Authenticated Key
Agreement Protocol for Fog-Based Vehicular Ad-Hoc
Networks,” IEEE Internet Things J., vol. 6, no. 5, pp.
8065–8075, 2019.
[9] X. Wang, Z. Ning, and L. Wang, “Offloading in Internet of
vehicles: A fog-enabled real-time traffic management
system,” IEEE Trans. Ind. Informatics, vol. 14, no. 10, pp.
4568–4578, 2018.
[10] R. Mahmud, R. Kotagiri, and R. Buyya, “Fog Computing:
A Taxonomy, Survey and Future Directions,” pp. 103–130,
2018.
[11] H. Hasrouny, C. Bassil, A. E. Samhat, and A. Laouiti,
“Group-based authentication in V2V communications,” in
2015 Fifth International Conference on Digital
Information and Communication Technology and its
Applications (DICTAP), 2015, pp. 173–177.
[12] Y. Liu, Y. Wang, and G. Chang, “Efficient Privacy-
Preserving Dual Authentication and Key Agreement
Scheme for Secure V2V Communications in an IoV
Paradigm,” IEEE Trans. Intell. Transp. Syst., vol. 18, no.
10, pp. 2740–2749, 2017.
[13] L. Benarous and B. Kadri, “Ensuring privacy and
authentication for V2V resource sharing,” Proc. - 2017 7th
Int. Conf. Emerg. Secur. Technol. EST 2017, pp. 1–6, 2017.
[14] P. Mohit, R. Amin, and G. P. Biswas, “Design of
authentication protocol for wireless sensor network-based
smart vehicular system,” Veh. Commun., vol. 9, no.
February, pp. 64–71, 2017.
[15] B. Ying and A. Nayak, “Anonymous and lightweight
authentication for secure vehicular networks,” IEEE Trans.
Veh. Technol., vol. 66, no. 12, pp. 10626–10636, 2017.
[16] J. Liu, Q. Li, R. Sun, X. Du, and M. Guizani, “An efficient
anonymous authentication scheme for internet of vehicles,”
IEEE Int. Conf. Commun., vol. 2018-May, pp. 1–6, 2018.
[17] K. Lim and K. M. Tuladhar, “LIDAR: Lidar Information
based Dynamic V2V Authentication for Roadside
Infrastructure-less Vehicular Networks,” 2019 16th IEEE
Annu. Consum. Commun. Netw. Conf. CCNC 2019, pp. 1–
6, 2019.
[18] C. M. Chen, B. Xiang, Y. Liu, and K. H. Wang, “A secure
authentication protocol for internet of vehicles,” IEEE
Access, vol. 7, no. c, pp. 12047–12057, 2019.
[19] H. Vasudev, V. Deshpande, D. Das, and S. K. Das, “A
lightweight mutual authentication protocol for V2V
communication in internet of vehicles,” IEEE Trans. Veh.
Technol., vol. 69, no. 6, pp. 6709–6717, 2020.
[20] S.-T. Wu, J.-H. Chiu, and B.-C. Chieu, “ID-based remote
authentication with smart cards on open distributed system
from elliptic curve cryptography,” in 2005 IEEE
International Conference on Electro Information
Technology, 2005, pp. 5----pp.
[21] S. Kalra and S. K. Sood, “Secure authentication scheme for
IoT and cloud servers,” Pervasive Mob. Comput., vol. 24,
pp. 210–223, 2015.
[22] S. Kumari, M. Karuppiah, A. Kumar, D. Xiong, L. Fan,
and N. Kumar, “A secure authentication scheme based on
elliptic curve cryptography for IoT and cloud servers,” J.
Supercomput., 2017.
[23] M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C.
Rodrigues, and Y. Park, “AKM-IoV: Authenticated Key
Management Protocol in Fog Computing-Based Internet of
Vehicles Deployment,” IEEE Internet Things J., vol. 6, no.
5, pp. 8804–8817, 2019.
[24] E. Bresson, O. Chevassut, and D. Pointcheval, “Provably
secure authenticated group Diffie-Hellman key exchange,”
ACM Trans. Inf. Syst. Secur., vol. 10, no. 3, pp. 10----es,
2007.
[25] L. Harn, M. Mehta, and W.-J. Hsin, “Integrating Diffie-
Hellman key exchange into the digital signature algorithm
(DSA),” IEEE Commun. Lett., vol. 8, no. 3, pp. 198–200,
2004.
[26] J. A. Hurtado Alegr$$’$$ia, M. C. Bastarrica, and A.
Bergel, “Analyzing software process models with
AVISPA,” in Proceedings of the 2011 International
Conference on Software and Systems Process, 2011, pp.
23–32.
[27] L. Viganò, “Automated security protocol analysis with the
AVISPA tool,” Electron. Notes Theor. Comput. Sci., vol.
155, pp. 61–86, 2006.
[28] A. Armando et al., “The AVISPA Tool for the Automated
Validation of Internet Security Protocols and
Applications,” in Computer Aided Verification, 2005, pp.
281–285.
[29] D. Von Oheimb, “The high-level protocol specification
language HLPSL developed in the EU project AVISPA,”
in Proceedings of APPSEM 2005 workshop, 2005, pp. 1–17.

Volume 13, Issue 1
June 2020
Pages 11-20
  • Receive Date: 25 May 2020
  • Revise Date: 22 November 2020
  • Accept Date: 19 April 2021
  • First Publish Date: 19 April 2021