Skip to main content
Top
Published in: The Journal of Supercomputing 7/2021

04-01-2021

Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks

Authors: Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Jia-Ning Luo, Raylin Tso

Published in: The Journal of Supercomputing | Issue 7/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, with the development of cloud computing, the Internet of Things (IoT), and other technologies, mobile intelligent transportation systems, particularly the vehicular ad hoc network (VANET), have been growing quickly. Researchers have attempted to use fog computing in VANETs in order to meet real-world requirements for their deployment. Fog computing is an extension of cloud computing, and thus, it inevitably inherits the same security challenges. Further, because VANETs are in an open network environment, they will also face several other potential security and privacy issues. In this study, to promote secure interaction in fog-based VANETs, a new authentication key exchange (AKE) scheme that uses fog nodes as relay nodes has been designed. The scheme completes mutual authentication and generates a session key for later confidential communication. The automatic verification tool ProVerif and the BAN (Burrows–Abadi–Needham) logic were used to formally verify the security of the scheme, and an informal analysis shows that it can resist multiple known attacks. The simulation and analysis results show that the proposed scheme is successful. Finally, performance evaluation shows the effectiveness of the approach. Compared with the previously proposed privacy protection authentication protocols, the results of the proposed scheme are more computationally efficient.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, IEEE, pp 1–8 Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, IEEE, pp 1–8
5.
go back to reference Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev 44(5):27–32 Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev 44(5):27–32
6.
go back to reference Wang J, Wu W, Liao Z, Sangaiah AK, Sherratt RS (2019) An energy-efficient off-loading scheme for low latency in collaborative edge computing. IEEE Access 7:149182–149190 Wang J, Wu W, Liao Z, Sangaiah AK, Sherratt RS (2019) An energy-efficient off-loading scheme for low latency in collaborative edge computing. IEEE Access 7:149182–149190
7.
go back to reference Wang J, Wu W, Liao Z, Sherratt RS, Kim GJ, Alfarraj O, Alzubi A, Tolba A (2020) A probability preferred priori offloading mechanism in mobile edge computing. IEEE Access 8:39758–39767 Wang J, Wu W, Liao Z, Sherratt RS, Kim GJ, Alfarraj O, Alzubi A, Tolba A (2020) A probability preferred priori offloading mechanism in mobile edge computing. IEEE Access 8:39758–39767
8.
go back to reference Hou X, Li Y, Chen M, Wu D, Jin D, Chen S (2016) Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873 Hou X, Li Y, Chen M, Wu D, Jin D, Chen S (2016) Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873
9.
go back to reference Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155 Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155
10.
go back to reference Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Fut Gener Comput Syst 78:850–858 Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Fut Gener Comput Syst 78:850–858
12.
go back to reference Zhu H, Wang X, Chen CM, Kumari S (2020) Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput Electr Eng 86:106714 Zhu H, Wang X, Chen CM, Kumari S (2020) Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput Electr Eng 86:106714
13.
go back to reference Zhang J, Liu H, Ni L (2020) A secure energy-saving communication and encrypted storage model based on rc4 for ehr. IEEE Access 8:38995–39012 Zhang J, Liu H, Ni L (2020) A secure energy-saving communication and encrypted storage model based on rc4 for ehr. IEEE Access 8:38995–39012
14.
go back to reference Pan JS, Lee CY, Sghaier A, Zeghid M, Xie J (2019) Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix-vector product approach. IEEE Trans Very Large Scale Integr VLSI Syst 27(7):1614–1622 Pan JS, Lee CY, Sghaier A, Zeghid M, Xie J (2019) Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix-vector product approach. IEEE Trans Very Large Scale Integr VLSI Syst 27(7):1614–1622
15.
go back to reference Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp 13–16 Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp 13–16
16.
go back to reference Gia TN, Jiang M, Rahmani AM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet of things: a case study on ECG feature extraction. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, IEEE, pp 356–363 Gia TN, Jiang M, Rahmani AM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet of things: a case study on ECG feature extraction. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, IEEE, pp 356–363
17.
go back to reference Okay FY, Ozdemir S (2016) A fog computing based smart grid model. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, pp 1–6 Okay FY, Ozdemir S (2016) A fog computing based smart grid model. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, pp 1–6
18.
go back to reference Huang C, Lu R, Choo KKR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun Mag 55(11):105–111 Huang C, Lu R, Choo KKR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun Mag 55(11):105–111
19.
go back to reference Sookhak M, Yu FR, He Y, Talebian H, Safa NS, Zhao N, Khan MK, Kumar N (2017) Fog vehicular computing: augmentation of fog computing using vehicular cloud computing. IEEE Veh Technol Mag 12(3):55–64 Sookhak M, Yu FR, He Y, Talebian H, Safa NS, Zhao N, Khan MK, Kumar N (2017) Fog vehicular computing: augmentation of fog computing using vehicular cloud computing. IEEE Veh Technol Mag 12(3):55–64
20.
go back to reference Kraemer FA, Braten AE, Tamkittikhun N, Palma D (2017) Fog computing in healthcare—a review and discussion. IEEE Access 5:9206–9222 Kraemer FA, Braten AE, Tamkittikhun N, Palma D (2017) Fog computing in healthcare—a review and discussion. IEEE Access 5:9206–9222
21.
go back to reference Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K (2018) Towards fog-driven iot ehealth: promises and challenges of iot in medicine and healthcare. Fut Gener Comput Syst 78:659–676 Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K (2018) Towards fog-driven iot ehealth: promises and challenges of iot in medicine and healthcare. Fut Gener Comput Syst 78:659–676
22.
go back to reference Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw 25(8):4737–4750 Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw 25(8):4737–4750
24.
go back to reference Khan AF, Anandharaj G (2019) A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the iot environment: CKMT. SN Appl Sci 1(12):1575 Khan AF, Anandharaj G (2019) A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the iot environment: CKMT. SN Appl Sci 1(12):1575
26.
go back to reference Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(5):8–15 Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(5):8–15
27.
go back to reference Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-the 27th Conference on Computer Communications, IEEE, pp 1229–1237 Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-the 27th Conference on Computer Communications, IEEE, pp 1229–1237
28.
go back to reference Wang NW, Huang YM, Chen WM (2008) A novel secure communication scheme in vehicular ad hoc networks. Comput Commun 31(12):2827–2837 Wang NW, Huang YM, Chen WM (2008) A novel secure communication scheme in vehicular ad hoc networks. Comput Commun 31(12):2827–2837
29.
go back to reference Chuang MC, Lee JF (2014) Team: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst J 8(3):749–758 Chuang MC, Lee JF (2014) Team: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst J 8(3):749–758
30.
go back to reference Zhou Y, Zhao X, Jiang Y, Shang F, Deng S, Wang X (2017) An enhanced privacy-preserving authentication scheme for vehicle sensor networks. Sensors 17(12):2854 Zhou Y, Zhao X, Jiang Y, Shang F, Deng S, Wang X (2017) An enhanced privacy-preserving authentication scheme for vehicle sensor networks. Sensors 17(12):2854
31.
go back to reference Wu L, Sun Q, Wang X, Wang J, Yu S, Zou Y, Liu B, Zhu Z (2019) An efficient privacy-preserving mutual authentication scheme for secure v2v communication in vehicular ad hoc network. IEEE Access 7:55050–55063 Wu L, Sun Q, Wang X, Wang J, Yu S, Zou Y, Liu B, Zhu Z (2019) An efficient privacy-preserving mutual authentication scheme for secure v2v communication in vehicular ad hoc network. IEEE Access 7:55050–55063
32.
go back to reference Wu F, Li X, Xu L, Sangaiah AK, Rodrigues JJ (2018) Authentication protocol for distributed cloud computing: an explanation of the security situations for internet-of-things-enabled devices. IEEE Consum Electron Mag 7(6):38–44 Wu F, Li X, Xu L, Sangaiah AK, Rodrigues JJ (2018) Authentication protocol for distributed cloud computing: an explanation of the security situations for internet-of-things-enabled devices. IEEE Consum Electron Mag 7(6):38–44
33.
go back to reference Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJ, Park YH (2019) Akm-iov: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6(5):8804–8817 Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJ, Park YH (2019) Akm-iov: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6(5):8804–8817
34.
go back to reference Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts Telecommun 23(2):56–96 Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts Telecommun 23(2):56–96
35.
go back to reference Khan AA, Abolhasan M, Ni W (2018) 5G next generation vanets using SDN and fog computing framework. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, pp 1–6 Khan AA, Abolhasan M, Ni W (2018) 5G next generation vanets using SDN and fog computing framework. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, pp 1–6
36.
go back to reference Pereira J, Ricardo L, Luís M, Senna C, Sargento S (2019) Assessing the reliability of fog computing for smart mobility applications in vanets. Fut Gener Comput Syst 94:317–332 Pereira J, Ricardo L, Luís M, Senna C, Sargento S (2019) Assessing the reliability of fog computing for smart mobility applications in vanets. Fut Gener Comput Syst 94:317–332
37.
go back to reference Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075 Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075
38.
go back to reference Chen CM, Xiang B, Liu Y, Wang KH (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057 Chen CM, Xiang B, Liu Y, Wang KH (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057
39.
go back to reference Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans Internet Inf Syst 10(12):5572–5595 Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans Internet Inf Syst 10(12):5572–5595
40.
go back to reference Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Fut Gener Comput Syst 78:1005–1019 Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Fut Gener Comput Syst 78:1005–1019
41.
go back to reference Chen CM, Wang KH, Yeh KH, Xiang B, Wu TY (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Amb Intell Hum Comput 10(8):3133–3142 Chen CM, Wang KH, Yeh KH, Xiang B, Wu TY (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Amb Intell Hum Comput 10(8):3133–3142
42.
go back to reference Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8:28096–28108 Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8:28096–28108
43.
go back to reference Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28 Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28
44.
go back to reference Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426(1871):233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426(1871):233–271MathSciNetMATH
45.
go back to reference Amin R, Biswas G (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80 Amin R, Biswas G (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80
46.
go back to reference Chen CM, Xu L, Wang KH, Liu S, Wu TY (2018) Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps. J Internet Technol 19(3):679–687 Chen CM, Xu L, Wang KH, Liu S, Wu TY (2018) Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps. J Internet Technol 19(3):679–687
47.
go back to reference Li CT, Wu TY, Chen CM (2018) A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps. IEEE Access 6:66742–66753 Li CT, Wu TY, Chen CM (2018) A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps. IEEE Access 6:66742–66753
48.
go back to reference Giri D, Maitra T (2017) A three factor remote user authentication scheme using collision resist fuzzy extractor in single server environment. In: ITM Web of Conferences, EDP Sciences, vol 13, p 01020 Giri D, Maitra T (2017) A three factor remote user authentication scheme using collision resist fuzzy extractor in single server environment. In: ITM Web of Conferences, EDP Sciences, vol 13, p 01020
49.
go back to reference He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37 He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37
50.
go back to reference Wu JMT, Lin JCW, Tamrakar A (2019) High-utility itemset mining with effective pruning strategies. ACM Trans Knowl Discov Data TKDD 13(6):1–22 Wu JMT, Lin JCW, Tamrakar A (2019) High-utility itemset mining with effective pruning strategies. ACM Trans Knowl Discov Data TKDD 13(6):1–22
51.
go back to reference Meng Z, Pan JS, Tseng KK (2019) Pade: an enhanced differential evolution algorithm with novel control parameter adaptation schemes for numerical optimization. Knowl-Based Syst 168:80–99 Meng Z, Pan JS, Tseng KK (2019) Pade: an enhanced differential evolution algorithm with novel control parameter adaptation schemes for numerical optimization. Knowl-Based Syst 168:80–99
52.
go back to reference Tian AQ, Chu SC, Pan JS, Cui H, Zheng WM (2020) A compact pigeon-inspired optimization for maximum short-term generation mode in cascade hydroelectric power station. Sustainability 12(3):767 Tian AQ, Chu SC, Pan JS, Cui H, Zheng WM (2020) A compact pigeon-inspired optimization for maximum short-term generation mode in cascade hydroelectric power station. Sustainability 12(3):767
53.
go back to reference Chu SC, Xue X, Pan JS, Wu X (2020) Optimizing ontology alignment in vector space. J Internet Technology 21(1):15–22 Chu SC, Xue X, Pan JS, Wu X (2020) Optimizing ontology alignment in vector space. J Internet Technology 21(1):15–22
54.
go back to reference Du ZG, Pan JS, Chu SC, Luo HJ, Hu P (2020) Quasi-affine transformation evolutionary algorithm with communication schemes for application of RSSI in wireless sensor networks. IEEE Access 8:8583–8594 Du ZG, Pan JS, Chu SC, Luo HJ, Hu P (2020) Quasi-affine transformation evolutionary algorithm with communication schemes for application of RSSI in wireless sensor networks. IEEE Access 8:8583–8594
Metadata
Title
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
Authors
Tsu-Yang Wu
Zhiyuan Lee
Lei Yang
Jia-Ning Luo
Raylin Tso
Publication date
04-01-2021
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 7/2021
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03548-9

Other articles of this Issue 7/2021

The Journal of Supercomputing 7/2021 Go to the issue

Premium Partner