SFVCC: Chaotic map-based security framework for vehicular cloud computing

Vehicular networking is an emerging research area. It enables the vehicles equipped with communication and sensing capacities to communicate vehicle-to-vehicle or with available roadside infrastructure. It has significant applications in terms of information and traffic management and road safety. To make vehicular communication more effective, vehicular cloud computing (VCC) architecture is introduced by utilising vehicular resources, cloud computing infrastructure and internet of things environment. VCC provides a scalable platform to support intelligent transport systems. However, there is a lack of efficient and secure mutual authentication framework in VCC. This study presents a chaotic map-based mutual authentication framework for VCC to ensure secure and efficient communication along with anonymity. The authors use a simulation tool AVISPA ‘Automated Validation of Internet Security Protocols and Applications’ to verify the protocol security against active attacks. The study also includes the proof of security in the random oracle model to justify security claim against known attacks. It presents the study of performance to validate the efficiency of the proposed scheme. Moreover, a comparative study of performance attributes with related schemes to identify the improvement in communication and computation efficiency is included.

[1]  Elif Uysal-Biyikoglu,et al.  Energy efficient wireless unicast routing alternatives for machine-to-machine networks , 2011, J. Netw. Comput. Appl..

[2]  Nursyarizal Mohd Nor,et al.  Limitation and Solution for Healthcare Network Using RFID Technology: A Review☆ , 2013 .

[3]  Ingrid Verbauwhede,et al.  Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.

[4]  Yalin Chen,et al.  ECC-based untraceable authentication for large-scale active-tag RFID systems , 2015, Electron. Commer. Res..

[5]  Musheer Ahmad,et al.  A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.

[6]  Ben-Jye Chang,et al.  Performance Analysis with Traffic Accident for Cooperative Active Safety Driving in VANET/ITS , 2014, Wirel. Pers. Commun..

[7]  Hari Om,et al.  A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC , 2017, Comput. Commun..

[8]  Bidi Ying,et al.  Anonymous and Lightweight Authentication for Secure Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.

[9]  Subhas C. Misra,et al.  An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..

[10]  Yining Liu,et al.  A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.

[11]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[12]  Y. Zhang,et al.  Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems , 2011, IET Commun..

[13]  Musheer Ahmad,et al.  An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing , 2018, Journal of Medical Systems.

[14]  ParkJong Hyuk,et al.  A survey on cloud computing security , 2016 .

[15]  Cheng-Chi Lee,et al.  A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.

[16]  Debiao He,et al.  Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.

[17]  R. C. Mittal,et al.  A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.

[18]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[19]  Jianfeng Ma,et al.  Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing , 2018, IEEE Network.

[20]  Rakesh Kumar,et al.  A Framework For Handling Local Broadcast Storm Using Probabilistic Data Aggregation In VANET , 2013, Wirel. Pers. Commun..

[21]  Arun Kumar Sangaiah,et al.  Secure CLS and CL-AS schemes designed for VANETs , 2019, The Journal of Supercomputing.

[22]  Jian Shen,et al.  Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services , 2018, IEEE Systems Journal.

[23]  Gaetano Marrocco,et al.  RFID Technology for IoT-Based Personal Healthcare in Smart Spaces , 2014, IEEE Internet of Things Journal.

[24]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[25]  Nei Kato,et al.  A Deep-Learning-Based Radio Resource Assignment Technique for 5G Ultra Dense Networks , 2018, IEEE Network.

[26]  Xinyi Huang,et al.  Provably secure authenticated key agreement scheme for distributed mobile cloud computing services , 2017, Future Gener. Comput. Syst..

[27]  Muhammad Khurram Khan,et al.  A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..

[28]  W. B. Lee,et al.  Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization , 2011, Journal of Medical Systems.

[29]  Chih-Shun Hsu,et al.  An IP passing protocol for vehicular ad hoc networks with network fragmentation , 2012, Comput. Math. Appl..

[30]  Pablo Pavón-Mariño,et al.  Simulation scalability issues in wireless sensor networks , 2006, IEEE Communications Magazine.

[31]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[32]  Jian Shen,et al.  A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications , 2018, J. Ambient Intell. Humaniz. Comput..

[33]  Ruhul Amin,et al.  Design of authentication protocol for wireless sensor network-based smart vehicular system , 2017, Veh. Commun..

[34]  Stephan Olariu,et al.  Taking VANET to the clouds , 2011, Int. J. Pervasive Comput. Commun..

[35]  Imran Memon,et al.  Efficient User Based Authentication Protocol for Location Based Services Discovery Over Road Networks , 2017, Wirel. Pers. Commun..

[36]  H. T. Mouftah,et al.  Privacy preserving broadcast message authentication protocol for VANETs , 2013, J. Netw. Comput. Appl..