Loading...
Please wait, while we are loading the content...
Similar Documents
SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks
Content Provider | MDPI |
---|---|
Author | Jan, Sagheer Ahmed Amin, Noor Ul Shuja, Junaid Abbas, Assad Maray, Mohammed Ali, Mazhar |
Copyright Year | 2022 |
Description | In recent decades, Vehicular Ad Hoc Networks (VANET) have emerged as a promising field that provides real-time communication between vehicles for comfortable driving and human safety. However, the Internet of Vehicles (IoV) platform faces some serious problems in the deployment of robust authentication mechanisms in resource-constrained environments and directly affects the efficiency of existing VANET schemes. Moreover, the security of the information becomes a critical issue over an open wireless access medium. In this paper, an efficient and secure lightweight anonymous mutual authentication and key establishment (SELWAK) for IoT-based VANETs is proposed. The proposed scheme requires two types of mutual authentication: V2V and V2R. In addition, SELWAK maintains secret keys for secure communication between Roadside Units $(RSU_{s}$). The performance evaluation of SELWAK affirms that it is lightweight in terms of computational cost and communication overhead because SELWAK uses a bitwise Exclusive-OR operation and one-way hash functions. The formal and informal security analysis of SELWAK shows that it is robust against man-in-the-middle attacks, replay attacks, stolen verifier attacks, stolen OBU attacks, untraceability, impersonation attacks, and anonymity. Moreover, a formal security analysis is presented using the Real-or-Random (RoR) model. |
Starting Page | 4019 |
e-ISSN | 14248220 |
DOI | 10.3390/s22114019 |
Journal | Sensors |
Issue Number | 11 |
Volume Number | 22 |
Language | English |
Publisher | MDPI |
Publisher Date | 2022-05-26 |
Access Restriction | Open |
Subject Keyword | Sensors Transportation Science and Technology Authentication Internet of Things Vehicular and Wireless Technologies Privacy Computational Efficiency |
Content Type | Text |
Resource Type | Article |