期刊论文详细信息
Sensors
SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks
Mohammed Maray1  Sagheer Ahmed Jan2  Noor Ul Amin2  Mazhar Ali3  Junaid Shuja3  Assad Abbas4 
[1] College of Computer Science and Information Systems, King Khalid University, Abha 62529, Saudi Arabia;Department of Computer Science and Information Technology, Hazara University, Mansehra 21300, Pakistan;Department of Computer Science, Abbottabad Campus, COMSATS University Islamabad, Abbottabad 22060, Pakistan;Department of Computer Science, Islamabad Campus, COMSATS University Islamabad, Islamabad 44000, Pakistan;
关键词: authentication;    internet of things;    vehicular and wireless technologies;    privacy;    computational efficiency;   
DOI  :  10.3390/s22114019
来源: DOAJ
【 摘 要 】

In recent decades, Vehicular Ad Hoc Networks (VANET) have emerged as a promising field that provides real-time communication between vehicles for comfortable driving and human safety. However, the Internet of Vehicles (IoV) platform faces some serious problems in the deployment of robust authentication mechanisms in resource-constrained environments and directly affects the efficiency of existing VANET schemes. Moreover, the security of the information becomes a critical issue over an open wireless access medium. In this paper, an efficient and secure lightweight anonymous mutual authentication and key establishment (SELWAK) for IoT-based VANETs is proposed. The proposed scheme requires two types of mutual authentication: V2V and V2R. In addition, SELWAK maintains secret keys for secure communication between Roadside Units (RSUs). The performance evaluation of SELWAK affirms that it is lightweight in terms of computational cost and communication overhead because SELWAK uses a bitwise Exclusive-OR operation and one-way hash functions. The formal and informal security analysis of SELWAK shows that it is robust against man-in-the-middle attacks, replay attacks, stolen verifier attacks, stolen OBU attacks, untraceability, impersonation attacks, and anonymity. Moreover, a formal security analysis is presented using the Real-or-Random (RoR) model.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次