Skip to main content
Top
Published in: Wireless Personal Communications 2/2023

27-05-2023

Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing

Authors: Saurabh Rana, Dheerendra Mishra, Chhagan Lal, Mauro Conti

Published in: Wireless Personal Communications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Vehicular Cloud Computing (VCC) provides significant benefits (e.g., higher resource availability, and low communication latency) to vehicular applications. However, still there exists latency related issues with applications that require real-time response, and it is difficult to achieve when using VCC. Therefore, the use of fog computing that provides the next level service of cloud computing from the centre to edge networks is envisioned. Apart from low latency, fog computing also supports mobility, location-awareness, and real-time data handling, which enables ubiquitous connectivity between fog nodes and smart vehicles. However, there remain several security and privacy challenges while using fog computing in VANET applications. To address these challenges, we propose the design of an authenticated message-exchange scheme for fog-assisted VCC (called AME-VCC). The proposed scheme ensures mutual authentication along with anonymity, which enables accountable privacy. The correctness of the protocol and its security is proved in the random oracle model, which indicates that it is provably secure under any probabilistic polynomial time adversary. Moreover, the comparative study of computation cost is done to prove the claim of efficiency. The analysis of security and performance indicates that AME-VCC is computationally efficient protocol, and it ensures authenticated secure message exchange with anonymity and unlinkability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hou, X., Li, Y., Chen, M., Di, W., Jin, D., & Chen, S. (2016). Vehicular fog computing: A viewpoint of vehicles as the infrastructures. IEEE Transactions on Vehicular Technology, 65(6), 3860–3873.CrossRef Hou, X., Li, Y., Chen, M., Di, W., Jin, D., & Chen, S. (2016). Vehicular fog computing: A viewpoint of vehicles as the infrastructures. IEEE Transactions on Vehicular Technology, 65(6), 3860–3873.CrossRef
2.
go back to reference Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pages, (pp. 13–16). ACM. Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pages, (pp. 13–16). ACM.
3.
go back to reference Khattak, H. A., Islam, S. U., Din, I. U., & Guizani, M. (2019). Integrating fog computing with vanets: A consumer perspective. IEEE Communications Standards Magazine, 3(1), 19–25.CrossRef Khattak, H. A., Islam, S. U., Din, I. U., & Guizani, M. (2019). Integrating fog computing with vanets: A consumer perspective. IEEE Communications Standards Magazine, 3(1), 19–25.CrossRef
4.
go back to reference Arul Mozhi Pradeepa, M., & Gomathi, B. (2017). Towards fog computing based cloud sensor integration for Internet of Things. International Journal of Computer Science and Engineering Communications, 5(6), 1761–1773. Arul Mozhi Pradeepa, M., & Gomathi, B. (2017). Towards fog computing based cloud sensor integration for Internet of Things. International Journal of Computer Science and Engineering Communications, 5(6), 1761–1773.
5.
go back to reference Jia, X., He, D., Kumar, N., & Choo, K.-K.R. (2018). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.CrossRef Jia, X., He, D., Kumar, N., & Choo, K.-K.R. (2018). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.CrossRef
6.
go back to reference Basudan, S., Lin, X., & Sankaranarayanan, K. (2017). A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet of Things Journal, 4(3), 772–782.CrossRef Basudan, S., Lin, X., & Sankaranarayanan, K. (2017). A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet of Things Journal, 4(3), 772–782.CrossRef
7.
go back to reference Nkenyereye, L., Liu, C. H., & Song, J. S. (2019). Towards secure and privacy preserving collision avoidance system in 5G fog based internet of vehicles. Future Generation Computer Systems, 95, 488–499.CrossRef Nkenyereye, L., Liu, C. H., & Song, J. S. (2019). Towards secure and privacy preserving collision avoidance system in 5G fog based internet of vehicles. Future Generation Computer Systems, 95, 488–499.CrossRef
8.
go back to reference Ma, M., He, D., Wang, H., Kumar, N., & Choo, K. K. R. (2019). An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet of Things Journal, 6(5), 8065–8075.CrossRef Ma, M., He, D., Wang, H., Kumar, N., & Choo, K. K. R. (2019). An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet of Things Journal, 6(5), 8065–8075.CrossRef
9.
go back to reference Maged Hamada Ibrahim. (2016). Octopus: An edge-fog mutual authentication scheme. IJ Network Security, 18(6), 1089–1101. Maged Hamada Ibrahim. (2016). Octopus: An edge-fog mutual authentication scheme. IJ Network Security, 18(6), 1089–1101.
10.
go back to reference Dolui, K., & Datta, S. K. (2017). Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS), (pp. 1–6). IEEE. Dolui, K., & Datta, S. K. (2017). Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS), (pp. 1–6). IEEE.
11.
go back to reference Shen, J., Yang, H., Wang, A., Zhou, T., & Wang, C. (2019). Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Networking and Applications, 12, 924–933.CrossRef Shen, J., Yang, H., Wang, A., Zhou, T., & Wang, C. (2019). Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Networking and Applications, 12, 924–933.CrossRef
12.
go back to reference Cui, Mingming, Han, Dezhi, & Wang, Jun. (2019). An efficient and safe road condition monitoring authentication scheme based on fog computing. IEEE Internet of Things Journal, 6(5), 9076–9084.CrossRef Cui, Mingming, Han, Dezhi, & Wang, Jun. (2019). An efficient and safe road condition monitoring authentication scheme based on fog computing. IEEE Internet of Things Journal, 6(5), 9076–9084.CrossRef
13.
go back to reference Pengfei, H., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143–1155.CrossRef Pengfei, H., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143–1155.CrossRef
14.
go back to reference Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. J. (2018). Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing, 17(5), 942–956.CrossRef Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. J. (2018). Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing, 17(5), 942–956.CrossRef
15.
go back to reference Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data security and privacy in fog computing. IEEE Network, 99, 1–6. Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data security and privacy in fog computing. IEEE Network, 99, 1–6.
16.
go back to reference Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef
17.
go back to reference Zhong, H., Wen, J., Cui, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in vanet. Tsinghua Science and Technology, 21(6), 620–629.CrossRef Zhong, H., Wen, J., Cui, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in vanet. Tsinghua Science and Technology, 21(6), 620–629.CrossRef
18.
19.
go back to reference Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In: International conference on the theory and applications of cryptographic techniques, pages, (pp. 139–155). Springer. Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In: International conference on the theory and applications of cryptographic techniques, pages, (pp. 139–155). Springer.
20.
go back to reference Jakobsson, M., & Pointcheval, D. (2001). Mutual authentication for low-power mobile devices. In: International conference on financial cryptography, (pp. 178–195). Springer. Jakobsson, M., & Pointcheval, D. (2001). Mutual authentication for low-power mobile devices. In: International conference on financial cryptography, (pp. 178–195). Springer.
21.
go back to reference Lo, N.-W., & Tsai, J.-L. (2015). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.CrossRef Lo, N.-W., & Tsai, J.-L. (2015). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328.CrossRef
22.
go back to reference Jianhong, Z., Min, X., & Liying, L. (2014). On the security of a secure batch verification with group testing for vanet. International Journal of Network Security, 16(5), 351–358. Jianhong, Z., Min, X., & Liying, L. (2014). On the security of a secure batch verification with group testing for vanet. International Journal of Network Security, 16(5), 351–358.
23.
go back to reference Tsai, J.-L., & Lo, N.-W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef Tsai, J.-L., & Lo, N.-W. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef
24.
go back to reference Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for vanets with batch verification. Wireless Networks, 21(5), 1733–1743.CrossRef Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for vanets with batch verification. Wireless Networks, 21(5), 1733–1743.CrossRef
25.
go back to reference Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2018). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9(3), 1900–1910. Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2018). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9(3), 1900–1910.
Metadata
Title
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing
Authors
Saurabh Rana
Dheerendra Mishra
Chhagan Lal
Mauro Conti
Publication date
27-05-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10480-7

Other articles of this Issue 2/2023

Wireless Personal Communications 2/2023 Go to the issue