Secure Message Communication Protocol Among Vehicles in Smart City

Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communicat...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on vehicular technology Vol. 67; no. 5; pp. 4359 - 4373
Main Authors: Dua, Amit, Kumar, Neeraj, Das, Ashok Kumar, Susilo, Willy
Format: Journal Article
Language:English
Published: New York IEEE 01.05.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9545, 1939-9359
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communication among the vehicles in a smart city environment, a novel scheme using elliptic curve cryptographic (ECC) technique has been presented in this paper. For this purpose, a two-level authentication key exchange scheme has been designed. In the first level authentication, <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are verified by series of messages exchanged between <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math></inline-formula>. The verified <inline-formula> <tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are responsible for authentication of vehicles in the second level authentication, followed by exchange of messages between <inline-formula><tex-math notation="LaTeX"> \text{CH}</tex-math></inline-formula> and vehicle. The security analysis using widely accepted Burrows-Abadi-Needham logic, formal security analysis using random oracle model and verification using the widely known automated validation of Internet security protocols and applications (AVISPA) tool, and also the informal security analysis have been done with respect to various types of attacks. Moreover, a comparative analysis of the proposed scheme with existing related schemes reveals that it generates low overhead and latency, and high reliability during messages exchange between vehicles and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math> </inline-formula>.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0018-9545
1939-9359
DOI:10.1109/TVT.2017.2780183