Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks (original) (raw)

References

  1. Xiong H, Wu Y, Jin C, Kumari S (2020) Efficient and privacy-preserving authentication protocol for heterogeneous systems in iiot. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2020.2999510
    Article Google Scholar
  2. Wang EK, Yu J, Chen CM, Kumari S, Rodrigues JJ (2020) Data augmentation for internet of things dialog system. Mob Netw Appl. https://doi.org/10.1007/s11036-020-01638-9
    Article Google Scholar
  3. Xiong H, Zhao Y, Hou Y, Huang X, Jin C, Wang L, Kumari S (2020) Heterogeneous signcryption with equality test for iiot environment. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2020.3008955
    Article Google Scholar
  4. Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, IEEE, pp 1–8
  5. Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev 44(5):27–32
    Google Scholar
  6. Wang J, Wu W, Liao Z, Sangaiah AK, Sherratt RS (2019) An energy-efficient off-loading scheme for low latency in collaborative edge computing. IEEE Access 7:149182–149190
    Google Scholar
  7. Wang J, Wu W, Liao Z, Sherratt RS, Kim GJ, Alfarraj O, Alzubi A, Tolba A (2020) A probability preferred priori offloading mechanism in mobile edge computing. IEEE Access 8:39758–39767
    Google Scholar
  8. Hou X, Li Y, Chen M, Wu D, Jin D, Chen S (2016) Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873
    Google Scholar
  9. Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155
    Google Scholar
  10. Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Fut Gener Comput Syst 78:850–858
    Google Scholar
  11. Wang P, Chen CM, Kumari S, Shojafar M, Tafazolli R, Liu YN (2020) Hdma: hybrid d2d message authentication scheme for 5g-enabled vanets. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2020.3013928
    Article Google Scholar
  12. Zhu H, Wang X, Chen CM, Kumari S (2020) Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput Electr Eng 86:106714
    Google Scholar
  13. Zhang J, Liu H, Ni L (2020) A secure energy-saving communication and encrypted storage model based on rc4 for ehr. IEEE Access 8:38995–39012
    Google Scholar
  14. Pan JS, Lee CY, Sghaier A, Zeghid M, Xie J (2019) Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix-vector product approach. IEEE Trans Very Large Scale Integr VLSI Syst 27(7):1614–1622
    Google Scholar
  15. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp 13–16
  16. Gia TN, Jiang M, Rahmani AM, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet of things: a case study on ECG feature extraction. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, IEEE, pp 356–363
  17. Okay FY, Ozdemir S (2016) A fog computing based smart grid model. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, pp 1–6
  18. Huang C, Lu R, Choo KKR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun Mag 55(11):105–111
    Google Scholar
  19. Sookhak M, Yu FR, He Y, Talebian H, Safa NS, Zhao N, Khan MK, Kumar N (2017) Fog vehicular computing: augmentation of fog computing using vehicular cloud computing. IEEE Veh Technol Mag 12(3):55–64
    Google Scholar
  20. Kraemer FA, Braten AE, Tamkittikhun N, Palma D (2017) Fog computing in healthcare—a review and discussion. IEEE Access 5:9206–9222
    Google Scholar
  21. Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K (2018) Towards fog-driven iot ehealth: promises and challenges of iot in medicine and healthcare. Fut Gener Comput Syst 78:659–676
    Google Scholar
  22. Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw 25(8):4737–4750
    Google Scholar
  23. Chen CM, Huang Y, Wang KH, Kumari S, Wu ME (2020) A secure authenticated and key exchange scheme for fog computing. Enterpr Inf Syst. https://doi.org/10.1080/17517575.2020.1712746
    Article Google Scholar
  24. Khan AF, Anandharaj G (2019) A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the iot environment: CKMT. SN Appl Sci 1(12):1575
    Google Scholar
  25. Khan AF, Anandharaj G (2020) Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot. Egypt Inform J. https://doi.org/10.1016/j.eij.2020.05.004
    Article Google Scholar
  26. Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(5):8–15
    Google Scholar
  27. Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-the 27th Conference on Computer Communications, IEEE, pp 1229–1237
  28. Wang NW, Huang YM, Chen WM (2008) A novel secure communication scheme in vehicular ad hoc networks. Comput Commun 31(12):2827–2837
    Google Scholar
  29. Chuang MC, Lee JF (2014) Team: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst J 8(3):749–758
    Google Scholar
  30. Zhou Y, Zhao X, Jiang Y, Shang F, Deng S, Wang X (2017) An enhanced privacy-preserving authentication scheme for vehicle sensor networks. Sensors 17(12):2854
    Google Scholar
  31. Wu L, Sun Q, Wang X, Wang J, Yu S, Zou Y, Liu B, Zhu Z (2019) An efficient privacy-preserving mutual authentication scheme for secure v2v communication in vehicular ad hoc network. IEEE Access 7:55050–55063
    Google Scholar
  32. Wu F, Li X, Xu L, Sangaiah AK, Rodrigues JJ (2018) Authentication protocol for distributed cloud computing: an explanation of the security situations for internet-of-things-enabled devices. IEEE Consum Electron Mag 7(6):38–44
    Google Scholar
  33. Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJ, Park YH (2019) Akm-iov: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6(5):8804–8817
    Google Scholar
  34. Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts Telecommun 23(2):56–96
    Google Scholar
  35. Khan AA, Abolhasan M, Ni W (2018) 5G next generation vanets using SDN and fog computing framework. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, pp 1–6
  36. Pereira J, Ricardo L, Luís M, Senna C, Sargento S (2019) Assessing the reliability of fog computing for smart mobility applications in vanets. Fut Gener Comput Syst 94:317–332
    Google Scholar
  37. Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065–8075
    Google Scholar
  38. Chen CM, Xiang B, Liu Y, Wang KH (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057
    Google Scholar
  39. Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans Internet Inf Syst 10(12):5572–5595
    Google Scholar
  40. Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Fut Gener Comput Syst 78:1005–1019
    Google Scholar
  41. Chen CM, Wang KH, Yeh KH, Xiang B, Wu TY (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Amb Intell Hum Comput 10(8):3133–3142
    Google Scholar
  42. Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8:28096–28108
    Google Scholar
  43. Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28
    Google Scholar
  44. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426(1871):233–271
    MathSciNet MATH Google Scholar
  45. Amin R, Biswas G (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80
    Google Scholar
  46. Chen CM, Xu L, Wang KH, Liu S, Wu TY (2018) Cryptanalysis and improvements on three-party-authenticated key agreement protocols based on chaotic maps. J Internet Technol 19(3):679–687
    Google Scholar
  47. Li CT, Wu TY, Chen CM (2018) A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps. IEEE Access 6:66742–66753
    Google Scholar
  48. Giri D, Maitra T (2017) A three factor remote user authentication scheme using collision resist fuzzy extractor in single server environment. In: ITM Web of Conferences, EDP Sciences, vol 13, p 01020
  49. He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37
    Google Scholar
  50. Wu JMT, Lin JCW, Tamrakar A (2019) High-utility itemset mining with effective pruning strategies. ACM Trans Knowl Discov Data TKDD 13(6):1–22
    Google Scholar
  51. Meng Z, Pan JS, Tseng KK (2019) Pade: an enhanced differential evolution algorithm with novel control parameter adaptation schemes for numerical optimization. Knowl-Based Syst 168:80–99
    Google Scholar
  52. Tian AQ, Chu SC, Pan JS, Cui H, Zheng WM (2020) A compact pigeon-inspired optimization for maximum short-term generation mode in cascade hydroelectric power station. Sustainability 12(3):767
    Google Scholar
  53. Chu SC, Xue X, Pan JS, Wu X (2020) Optimizing ontology alignment in vector space. J Internet Technology 21(1):15–22
    Google Scholar
  54. Du ZG, Pan JS, Chu SC, Luo HJ, Hu P (2020) Quasi-affine transformation evolutionary algorithm with communication schemes for application of RSSI in wireless sensor networks. IEEE Access 8:8583–8594
    Google Scholar

Download references