AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Mohammad Wazid, Palak Bagga, Ashok Kumar Das, Sachin Shetty, Joel J.P.C. Rodrigues, Youngho Park

Research output: Contribution to journalArticle

Abstract

Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.

Original languageEnglish
Article number8740937
Pages (from-to)8804-8817
Number of pages14
JournalIEEE Internet of Things Journal
Volume6
Issue number5
DOIs
Publication statusPublished - 01-10-2019
Externally publishedYes

Fingerprint

Fog
Internet
Network protocols
Mobile cloud computing
Authentication
Demonstrations
Servers

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Cite this

Wazid, M., Bagga, P., Das, A. K., Shetty, S., Rodrigues, J. J. P. C., & Park, Y. (2019). AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet of Things Journal, 6(5), 8804-8817. [8740937]. https://doi.org/10.1109/JIOT.2019.2923611
Wazid, Mohammad ; Bagga, Palak ; Das, Ashok Kumar ; Shetty, Sachin ; Rodrigues, Joel J.P.C. ; Park, Youngho. / AKM-IoV : Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. In: IEEE Internet of Things Journal. 2019 ; Vol. 6, No. 5. pp. 8804-8817.
@article{b2eb2723456a4aa89d8cd2d56d5ed9f3,
title = "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment",
abstract = "Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.",
author = "Mohammad Wazid and Palak Bagga and Das, {Ashok Kumar} and Sachin Shetty and Rodrigues, {Joel J.P.C.} and Youngho Park",
year = "2019",
month = "10",
day = "1",
doi = "10.1109/JIOT.2019.2923611",
language = "English",
volume = "6",
pages = "8804--8817",
journal = "IEEE Internet of Things Journal",
issn = "2327-4662",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "5",

}

Wazid, M, Bagga, P, Das, AK, Shetty, S, Rodrigues, JJPC & Park, Y 2019, 'AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment', IEEE Internet of Things Journal, vol. 6, no. 5, 8740937, pp. 8804-8817. https://doi.org/10.1109/JIOT.2019.2923611

AKM-IoV : Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. / Wazid, Mohammad; Bagga, Palak; Das, Ashok Kumar; Shetty, Sachin; Rodrigues, Joel J.P.C.; Park, Youngho.

In: IEEE Internet of Things Journal, Vol. 6, No. 5, 8740937, 01.10.2019, p. 8804-8817.

Research output: Contribution to journalArticle

TY - JOUR

T1 - AKM-IoV

T2 - Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

AU - Wazid, Mohammad

AU - Bagga, Palak

AU - Das, Ashok Kumar

AU - Shetty, Sachin

AU - Rodrigues, Joel J.P.C.

AU - Park, Youngho

PY - 2019/10/1

Y1 - 2019/10/1

N2 - Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.

AB - Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.

UR - http://www.scopus.com/inward/record.url?scp=85073472902&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85073472902&partnerID=8YFLogxK

U2 - 10.1109/JIOT.2019.2923611

DO - 10.1109/JIOT.2019.2923611

M3 - Article

AN - SCOPUS:85073472902

VL - 6

SP - 8804

EP - 8817

JO - IEEE Internet of Things Journal

JF - IEEE Internet of Things Journal

SN - 2327-4662

IS - 5

M1 - 8740937

ER -