Computationally Efficient and Secure Session Key Agreement Techniques for Vehicular Cloud Computing

Author(s):  
Saurabh Rana ◽  
Dheerendra Mishra ◽  
Saurabh Gupta
2020 ◽  
Vol 10 (18) ◽  
pp. 6268
Author(s):  
JoonYoung Lee ◽  
SungJin Yu ◽  
MyeongHyun Kim ◽  
YoungHo Park ◽  
SangWoo Lee ◽  
...  

With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as large as the number of vehicles and it is enormous when compared to vehicle calculation and storage performance. To resolve this problem, VANET uses a combined cloud computing technology, called vehicular cloud computing (VCC), which controls vehicle-related data, and helps vehicle drivers directly or indirectly. However, VANETs remain vulnerable to attacks such as tracking, masquerade and man-in-the-middle attacks because VANETs communicate via open networks. To overcome these issues, many researchers have proposed secure authentication protocols for message confirmation with vehicular cloud computing. However, many researchers have pointed out that some proposed protocols use ideal tamper-proof devices (TPDs). They demonstrated that realistic TPDs cannot prevent adversaries attack. Limbasiya et al. presented a message confirmation scheme for vehicular cloud computing using a realistic TPD in order to prevent these problems. However, their proposed scheme still has security weaknesses over a TPD and does not guarantee mutual authentication. This paper proposes a secure key agreement and authentication protocol to address the security weaknesses inherent in the protocol of Limbasiya et al. The suggested protocol withstands malicious attacks and ensures secure mutual authentication for privacy-preserving. We prove that the proposed protocol can provide session key security using Real-Or-Random (ROR) model. We also employed Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool to show that the proposed protocol is able to defeat replay and man-in-the-middle attacks. Furthermore, we established that the proposed protocol can resist other malicious attacks by conducting the informal security analysis. We proved that our proposed protocol is lightweight and suitable for VCC environments.


IEEE Network ◽  
2018 ◽  
Vol 32 (3) ◽  
pp. 28-35 ◽  
Author(s):  
Qi Jiang ◽  
Jianbing Ni ◽  
Jianfeng Ma ◽  
Li Yang ◽  
Xuemin Shen

2020 ◽  
Vol 14 (12) ◽  
pp. 1724-1724
Author(s):  
Dheerendra Mishra ◽  
Vinod Kumar ◽  
Dharminder Dhaminder ◽  
Saurabh Rana

PLoS ONE ◽  
2018 ◽  
Vol 13 (1) ◽  
pp. e0191577 ◽  
Author(s):  
Jiaxi Liu ◽  
Zhibo Wu ◽  
Jian Dong ◽  
Jin Wu ◽  
Dongxin Wen

Author(s):  
Kayhan Zrar Ghafoor ◽  
Marwan Aziz Mohammed ◽  
Kamalrulnizam Abu Bakar ◽  
Ali Safa Sadiq ◽  
Jaime Lloret

Recently, Vehicular Ad Hoc Networks (VANET) have attracted the attention of research communities, leading car manufacturers, and governments due to their potential applications and specific characteristics. Their research outcome was started with awareness between vehicles for collision avoidance and Internet access and then expanded to vehicular multimedia communications. Moreover, vehicles’ high computation, communication, and storage resources set a ground for vehicular networks to deploy these applications in the near future. Nevertheless, on-board resources in vehicles are mostly underutilized. Vehicular Cloud Computing (VCC) is developed to utilize the VANET resources efficiently and provide subscribers safe infotainment services. In this chapter, the authors perform a survey of state-of-the-art vehicular cloud computing as well as the existing techniques that utilize cloud computing for performance improvements in VANET. The authors then classify the VCC based on the applications, service types, and vehicular cloud organization. They present the detail for each VCC application and formation. Lastly, the authors discuss the open issues and research directions related to VANET cloud computing.


2019 ◽  
Vol 45 (4) ◽  
pp. 2473-2499
Author(s):  
Hadjer Goumidi ◽  
Zibouda Aliouat ◽  
Saad Harous

Sign in / Sign up

Export Citation Format

Share Document