首页> 外文期刊>Journal of supercomputing >Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
【24h】

Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks

机译:在车辆ad hoc网络中使用雾节点可提供可证明的安全认证密钥交换方案

获取原文
获取原文并翻译 | 示例
       

摘要

In recent years, with the development of cloud computing, the Internet of Things (IoT), and other technologies, mobile intelligent transportation systems, particularly the vehicular ad hoc network (VANET), have been growing quickly. Researchers have attempted to use fog computing in VANETs in order to meet real-world requirements for their deployment. Fog computing is an extension of cloud computing, and thus, it inevitably inherits the same security challenges. Further, because VANETs are in an open network environment, they will also face several other potential security and privacy issues. In this study, to promote secure interaction in fog-based VANETs, a new authentication key exchange (AKE) scheme that uses fog nodes as relay nodes has been designed. The scheme completes mutual authentication and generates a session key for later confidential communication. The automatic verification tool ProVerif and the BAN (Burrows-Abadi-Needham) logic were used to formally verify the security of the scheme, and an informal analysis shows that it can resist multiple known attacks. The simulation and analysis results show that the proposed scheme is successful. Finally, performance evaluation shows the effectiveness of the approach. Compared with the previously proposed privacy protection authentication protocols, the results of the proposed scheme are more computationally efficient.
机译:近年来,随着云计算的发展,物联网(物联网)和其他技术,移动智能运输系统,特别是车辆临时网络(VANET),迅速增长。研究人员试图在Vanets中使用雾计算,以满足其部署的真实要求。雾计算是云计算的扩展,因此,它不可避免地继承了相同的安全挑战。此外,由于VANET在开放的网络环境中,它们也将面临其他几个潜在的安全性和隐私问题。在本研究中,为了促进基于FOG的VAGETS中的安全交互,设计了使用雾节点作为中继节点的新认证密钥交换(AKE)方案。该方案完成了相互认证,并为稍后的机密通信生成会话密钥。自动验证工具箴言和禁令(Burrows-Abadi-Consureham)逻辑用于正式验证方案的安全性,并且非正式分析表明它可以抵抗多个已知的攻击。模拟和分析结果表明,该方案成功。最后,性能评估显示了这种方法的有效性。与先前提出的隐私保护认证协议相比,所提出的方案的结果更加计算效率。

著录项

  • 来源
    《Journal of supercomputing》 |2021年第7期|6992-7020|共29页
  • 作者单位

    Shandong Univ Sci & Technol Coll Comp Sci & Engn Qingdao Peoples R China;

    Shandong Univ Sci & Technol Coll Comp Sci & Engn Qingdao Peoples R China;

    Shandong Univ Sci & Technol Coll Comp Sci & Engn Qingdao Peoples R China;

    Ming Chuan Univ Dept Informat & Telecommun Taipei Taiwan;

    Natl Chengchi Univ Dept Comp Sci Taipei Taiwan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    IoT; Authentication; Key exchange; VANET;

    机译:IOT;身份验证;关键交换;VANET;
  • 入库时间 2022-08-19 02:31:08

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号