Skip to main content

Light Weight Authentication and Key Establishment Protocol for Smart Vehicles Communication in Smart City

  • Conference paper
  • First Online:
Book cover Smart City and Informatization (iSCI 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1122))

Included in the following conference series:

Abstract

The smart vehicular technology in the smart city employs intelligent commitments to the passengers to enhance traffic efficiency and safety with more enjoyable riding in the driving environment. However, the tremendous growth of wireless communication technology makes the smart vehicle communication more vulnerable to potential security attacks. Authentication and key agreement protocol is the basic requirement to establish a secure communication among vehicles in the open network. Though several security schemes have been designed in the literature to establish communication among the smart vehicles, each of them have their own limitations such as requirement of heavy computation, limited to maximum of three entities and so on. In this paper, we design a lightweight four party authentication protocol that employs the strong reinforcement of fog and cloud servers. The formal proof of correctness of the designed protocol has been provided using GNY logic. The protocol is compared with the existing related protocols in the aspects security features, communication cost, computational cost and storage cost. In all these aspects, our protocol outperforms the others’ protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anandhi, S., Anitha, R., Sureshkumar, V.: An automatic rfid reader-to-reader delegation protocol for scm in cloud computing environment. J. Supercomput. 74(7), 3148–3167 (2018)

    Article  Google Scholar 

  2. Anandhi, S., Anitha, R., Sureshkumar, V.: IoT enabled RFID authentication and secure object tracking system for smart logistics. Wireless Pers. Commun. 104(2), 543–560 (2019)

    Article  Google Scholar 

  3. Dang, L., et al.: Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks. Int. J. Distrib. Sens. Netw. 14(4), 1–16 (2018)

    Article  Google Scholar 

  4. Dua, A., Kumar, N., Das, A.K., Susilo, W.: Secure message communication protocol among vehicles in smart city. IEEE Trans. Veh. Technol. 67(5), 4359–4373 (2017)

    Article  Google Scholar 

  5. Dua, A., Kumar, N., Singh, M., Obaidat, M.S., Hsiao, K.F.: Secure message communication among vehicles using elliptic curve cryptography in smart cities. In: International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–6. IEEE (2016)

    Google Scholar 

  6. Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Computer Society Symposium on Research in Security and Privacy, pp. 234–248. IEEE (1990)

    Google Scholar 

  7. Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 1–14 (2018)

    Google Scholar 

  8. Liu, Y., Wang, Y., Chang, G.: Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. 18(10), 2740–2749 (2017)

    Article  Google Scholar 

  9. Lu, H., Li, J., Guizani, M.: A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: Conference on Computing, Communications and Applications, pp. 345–350. IEEE (2012)

    Google Scholar 

  10. Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1229–1237. IEEE (2008)

    Google Scholar 

  11. Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6, 8065–8075 (2019)

    Article  Google Scholar 

  12. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Article  Google Scholar 

  13. Sureshkumar, V., Amin, R., Anitha, R.: An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. Int. J. Commun. Syst. 30(17), e3358 (2017)

    Article  Google Scholar 

  14. Sureshkumar, V., Amin, R., Anitha, R.: A robust mutual authentication scheme for session initiation protocol with key establishment. Peer-to-Peer Netw. Appl. 11(5), 900–916 (2018)

    Article  Google Scholar 

  15. Sureshkumar, V., Amin, R., Vijaykumar, V., Rajasekar, S.: Robust secure communication protocol for smart healthcare system with FPGA implementation. Future Gener. Comput. Syst. 100, 938–951 (2019)

    Article  Google Scholar 

  16. Sureshkumar, V., Ramalingam, A., Anandhi, S.: Analysis of accountability property in payment systems using strand space model. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martínez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 424–437. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22915-7_39

    Chapter  Google Scholar 

  17. Wazid, M., Bagga, P., Das, A.K., Shetty, S., Rodrigues, J.J., Park, Y.H.: AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J. 6, 8804–8817 (2019)

    Article  Google Scholar 

  18. Wazid, M., et al.: Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access 5, 14966–14980 (2017)

    Article  Google Scholar 

  19. Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. 65(8), 2562–2574 (2015)

    Article  MathSciNet  Google Scholar 

  20. Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in vanets. IEEE Trans. Intell. Transp. Syst. 18(3), 516–526 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Venkatasamy Sureshkumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sureshkumar, V., Anandhi, S., Madhumathi, R., Selvarajan, N. (2019). Light Weight Authentication and Key Establishment Protocol for Smart Vehicles Communication in Smart City. In: Wang, G., El Saddik, A., Lai, X., Martinez Perez, G., Choo, KK. (eds) Smart City and Informatization. iSCI 2019. Communications in Computer and Information Science, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-15-1301-5_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1301-5_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1300-8

  • Online ISBN: 978-981-15-1301-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics