AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another var...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal Jg. 6; H. 5; S. 8804 - 8817
Hauptverfasser: Wazid, Mohammad, Bagga, Palak, Das, Ashok Kumar, Shetty, Sachin, Rodrigues, Joel J. P. C., Park, Youngho
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Piscataway IEEE 01.10.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:2327-4662, 2327-4662
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.
AbstractList Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.
Author Shetty, Sachin
Bagga, Palak
Park, Youngho
Das, Ashok Kumar
Wazid, Mohammad
Rodrigues, Joel J. P. C.
Author_xml – sequence: 1
  givenname: Mohammad
  orcidid: 0000-0001-9898-0921
  surname: Wazid
  fullname: Wazid, Mohammad
  email: wazidkec2005@gmail.com
  organization: Department of Computer Science and Engineering, Manipal Academy of Higher Education, Manipal Institute of Technology, Manipal, India
– sequence: 2
  givenname: Palak
  surname: Bagga
  fullname: Bagga, Palak
  email: palak.bagga@research.iiit.ac.in
  organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India
– sequence: 3
  givenname: Ashok Kumar
  orcidid: 0000-0002-5196-9589
  surname: Das
  fullname: Das, Ashok Kumar
  email: iitkgp.akdas@gmail.com
  organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India
– sequence: 4
  givenname: Sachin
  orcidid: 0000-0002-8789-0610
  surname: Shetty
  fullname: Shetty, Sachin
  email: sshetty@odu.edu
  organization: Department of Modeling, Simulation and Visualization Engineering, Virginia Modeling, Analysis and Simulation Center, Center for Cybersecurity Education and Research, Old Dominion University, Suffolk, VA, USA
– sequence: 5
  givenname: Joel J. P. C.
  orcidid: 0000-0001-8657-3800
  surname: Rodrigues
  fullname: Rodrigues, Joel J. P. C.
  email: joeljr@ieee.org
  organization: PPG Telecommunications, National Institute of Telecommunications, Santa Rita do Sapucaí, Brazil
– sequence: 6
  givenname: Youngho
  orcidid: 0000-0002-0406-6547
  surname: Park
  fullname: Park, Youngho
  email: parkyh@knu.ac.kr
  organization: School of Electronics Engineering, Kyungpook National University, Daegu, South Korea
BookMark eNp9kM9PwjAUgBuDiYj8AcZLE8_D_mDt5g1RdALBA3JdSvcGJaPFrhz47x2BGOPBU1-a73sv-a5RyzoLCN1S0qOUpA_v2WzeY4SmPZYyLii9QG3GmYz6QrDWr_kKdet6QwhptJimoo1gMJ5GmVs84sE-rMEGo1WAAo_hgKfKqhVsm0_84V1w2lXYWDxyKzx0290-GLuKnlTd4JkN4C0E7Eq8gLXRFdT4GXaVOxz9G3RZqqqG7vntoM_Ry3z4Fk1mr9lwMIk0j9MQAVCyLKkWZcFYITWLC00VpIqJgnMiC5BSLRNRaihEksRqqRMotS6oVImWCe-g-9PenXdfe6hDvnF7b5uTOeOEp4kUlDSUPFHau7r2UObaBBWMs8ErU-WU5Mes-TFrfsyan7M2Jv1j7rzZKn_417k7OQYAfvhE9knKJf8G6FOGCA
CODEN IITJAU
CitedBy_id crossref_primary_10_1016_j_csa_2023_100027
crossref_primary_10_3390_electronics12214438
crossref_primary_10_3390_su13169241
crossref_primary_10_1002_spy2_365
crossref_primary_10_1109_TVT_2023_3242309
crossref_primary_10_1007_s10207_022_00619_1
crossref_primary_10_1007_s00607_023_01208_3
crossref_primary_10_1109_JSYST_2020_3044309
crossref_primary_10_1109_ACCESS_2020_2983994
crossref_primary_10_1016_j_jisa_2023_103648
crossref_primary_10_1016_j_comnet_2021_107989
crossref_primary_10_1016_j_comnet_2024_110240
crossref_primary_10_1109_ACCESS_2019_2960412
crossref_primary_10_1016_j_vehcom_2023_100683
crossref_primary_10_1109_TITS_2023_3252082
crossref_primary_10_1109_TITS_2023_3338060
crossref_primary_10_1007_s11227_022_04964_9
crossref_primary_10_1109_JIOT_2020_3002221
crossref_primary_10_1109_TIV_2023_3327364
crossref_primary_10_1016_j_vehcom_2023_100604
crossref_primary_10_1016_j_vehcom_2022_100567
crossref_primary_10_1109_ACCESS_2020_2992467
crossref_primary_10_1109_JSYST_2020_3022244
crossref_primary_10_3390_s22186995
crossref_primary_10_1109_ACCESS_2024_3493624
crossref_primary_10_3390_s24020368
crossref_primary_10_1109_JIOT_2025_3566962
crossref_primary_10_1002_dac_4511
crossref_primary_10_3390_s21186039
crossref_primary_10_1016_j_seta_2021_101086
crossref_primary_10_1109_TITS_2021_3138255
crossref_primary_10_32604_cmc_2024_052405
crossref_primary_10_1007_s10586_022_03566_7
crossref_primary_10_1109_JIOT_2020_3004811
crossref_primary_10_1109_TIV_2023_3303312
crossref_primary_10_1109_ACCESS_2021_3071499
crossref_primary_10_1109_JIOT_2023_3325904
crossref_primary_10_1109_ACCESS_2021_3131367
crossref_primary_10_1109_ACCESS_2022_3210117
crossref_primary_10_1109_JIOT_2021_3097535
crossref_primary_10_1109_ACCESS_2019_2962829
crossref_primary_10_1109_TVT_2024_3382971
crossref_primary_10_1007_s11227_023_05499_3
crossref_primary_10_3390_math13132142
crossref_primary_10_1007_s11277_023_10727_3
crossref_primary_10_1109_TITS_2024_3453928
crossref_primary_10_1109_JIOT_2020_2975207
crossref_primary_10_1007_s11227_020_03548_9
crossref_primary_10_1109_JIOT_2025_3587671
crossref_primary_10_1109_ACCESS_2020_3005592
crossref_primary_10_1002_dac_5479
crossref_primary_10_3390_s22197433
crossref_primary_10_1155_2023_9143563
crossref_primary_10_3390_app13106055
crossref_primary_10_1109_ACCESS_2020_2981397
crossref_primary_10_1109_TVT_2021_3050614
crossref_primary_10_1145_3538381
crossref_primary_10_1016_j_jnca_2020_102932
crossref_primary_10_1109_TIV_2024_3388724
crossref_primary_10_1109_TITS_2021_3099488
crossref_primary_10_1109_TITS_2025_3558978
crossref_primary_10_3390_info16010021
crossref_primary_10_1016_j_iot_2025_101684
crossref_primary_10_1016_j_iot_2024_101240
crossref_primary_10_1109_TITS_2022_3207593
crossref_primary_10_3390_s21041488
crossref_primary_10_1016_j_adhoc_2023_103303
crossref_primary_10_1007_s12083_022_01425_1
crossref_primary_10_1016_j_iot_2023_100679
crossref_primary_10_1109_TCSS_2022_3161996
crossref_primary_10_3390_electronics14101953
crossref_primary_10_1002_ett_4751
crossref_primary_10_1155_2022_8689651
crossref_primary_10_1109_TITS_2021_3115171
crossref_primary_10_26599_TST_2024_9010083
crossref_primary_10_1109_TVT_2023_3322637
crossref_primary_10_1109_TDSC_2020_3047872
crossref_primary_10_1016_j_comcom_2022_10_010
crossref_primary_10_1002_spy2_178
crossref_primary_10_1109_TITS_2024_3461838
crossref_primary_10_1016_j_cose_2024_103770
crossref_primary_10_1109_ACCESS_2022_3231189
crossref_primary_10_1108_IJPCC_09_2023_0250
crossref_primary_10_3390_s23042034
crossref_primary_10_1007_s00202_024_02587_2
crossref_primary_10_1007_s11277_020_07834_w
crossref_primary_10_1007_s13177_022_00334_0
crossref_primary_10_1016_j_csi_2021_103567
crossref_primary_10_1007_s42044_025_00318_9
crossref_primary_10_1109_ACCESS_2020_3047895
crossref_primary_10_1109_ACCESS_2021_3089871
crossref_primary_10_1109_TNSE_2022_3142287
crossref_primary_10_1109_TVT_2024_3390607
crossref_primary_10_1109_TITS_2024_3428491
crossref_primary_10_1007_s00779_021_01648_8
crossref_primary_10_1109_TITS_2022_3174716
crossref_primary_10_1109_TVT_2024_3368407
crossref_primary_10_3390_s25030982
crossref_primary_10_1007_s11227_020_03350_7
crossref_primary_10_1109_ACCESS_2024_3409361
crossref_primary_10_3390_app10186268
crossref_primary_10_1007_s12243_021_00866_8
crossref_primary_10_3390_electronics11233868
crossref_primary_10_1016_j_jpdc_2022_01_029
crossref_primary_10_1016_j_procs_2023_03_120
crossref_primary_10_3390_sym14071393
crossref_primary_10_1007_s10586_021_03471_5
crossref_primary_10_1051_itmconf_20235402008
crossref_primary_10_1109_ACCESS_2023_3265959
crossref_primary_10_1109_JIOT_2022_3150842
crossref_primary_10_1109_JIOT_2021_3056477
crossref_primary_10_3390_electronics10121417
crossref_primary_10_1109_ACCESS_2025_3608623
crossref_primary_10_1109_ACCESS_2019_2945610
crossref_primary_10_1109_JIOT_2025_3562393
crossref_primary_10_3390_electronics13061026
crossref_primary_10_21015_vtse_v12i3_1806
crossref_primary_10_3390_s21030936
crossref_primary_10_47164_ijngc_v13i5_935
crossref_primary_10_1109_ACCESS_2020_2987065
crossref_primary_10_1109_TITS_2023_3328324
crossref_primary_10_3390_sym17081350
crossref_primary_10_1109_JIOT_2024_3420176
crossref_primary_10_1109_TR_2020_3021794
crossref_primary_10_3390_math13132062
crossref_primary_10_3390_s22187075
crossref_primary_10_1016_j_comnet_2021_108460
crossref_primary_10_1109_TVT_2021_3113652
crossref_primary_10_1109_TNSE_2025_3563297
crossref_primary_10_1016_j_sysarc_2020_101877
crossref_primary_10_3390_electronics14142783
crossref_primary_10_1109_ACCESS_2020_2995917
crossref_primary_10_1109_JIOT_2020_2989761
crossref_primary_10_1109_TIFS_2023_3318952
crossref_primary_10_3390_app11198841
crossref_primary_10_1109_TVT_2023_3334034
crossref_primary_10_1016_j_suscom_2025_101113
crossref_primary_10_1007_s00500_021_06035_2
crossref_primary_10_1016_j_vehcom_2024_100785
crossref_primary_10_1016_j_sysarc_2025_103422
crossref_primary_10_1109_TITS_2021_3098636
crossref_primary_10_1016_j_sysarc_2021_102296
crossref_primary_10_1109_MNET_002_2300009
crossref_primary_10_1002_ett_4317
crossref_primary_10_1002_ett_3900
crossref_primary_10_1145_3491202
crossref_primary_10_32604_cmc_2023_035602
crossref_primary_10_1038_s41598_024_56141_y
crossref_primary_10_1109_MCE_2021_3116415
crossref_primary_10_1002_dac_5028
crossref_primary_10_1016_j_sysarc_2023_102937
crossref_primary_10_1109_ACCESS_2020_3036044
crossref_primary_10_1016_j_vehcom_2020_100311
crossref_primary_10_1109_TVT_2020_3038834
crossref_primary_10_1007_s11276_021_02712_0
crossref_primary_10_1177_15501329221105202
crossref_primary_10_1109_ACCESS_2024_3488570
crossref_primary_10_3390_math12233756
crossref_primary_10_1109_JIOT_2025_3577701
crossref_primary_10_1016_j_vehcom_2021_100335
crossref_primary_10_1007_s10207_022_00595_6
crossref_primary_10_1109_TNSE_2021_3093435
crossref_primary_10_1016_j_iot_2020_100249
Cites_doi 10.1109/TDSC.2016.2616876
10.1109/TITS.2017.2657649
10.1109/ACCESS.2017.2723265
10.1016/B978-0-12-805395-9.00016-2
10.1109/TVT.2017.2780183
10.1109/TII.2017.2773666
10.1109/JIOT.2018.2820039
10.1109/ACCESS.2019.2897615
10.1016/j.comcom.2007.12.003
10.1007/3-540-46035-7_22
10.1109/MCSA.1999.749281
10.1109/JIOT.2018.2878333
10.1109/TVT.2015.2402166
10.1109/ICC.2018.8422447
10.1109/JIOT.2018.2855718
10.1109/TPDS.2014.2308215
10.1109/TVT.2015.2405853
10.1109/ICCCSP.2017.7944096
10.1109/JPROC.2011.2132790
10.1109/TVT.2018.2796443
10.1109/JIOT.2018.2890213
10.1109/JSYST.2016.2585681
10.1109/TIFS.2015.2473820
10.1109/TVT.2013.2257188
10.1109/JIOT.2017.2787800
10.1109/TPDS.2010.14
10.1007/3-540-44987-6_28
10.1109/TSG.2016.2602282
10.1109/JIOT.2017.2714179
10.1016/j.future.2016.04.024
10.1109/TIT.1983.1056650
10.1109/TVT.2014.2358633
10.1109/TDSC.2014.2355850
10.1109/TDSC.2017.2764083
10.1145/77648.77649
10.1109/JIOT.2019.2892009
10.1145/129902.129905
10.1109/TIFS.2018.2850299
10.1016/j.future.2018.09.017
10.1109/MCE.2018.2851744
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/JIOT.2019.2923611
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 8817
ExternalDocumentID 10_1109_JIOT_2019_2923611
8740937
Genre orig-research
GrantInformation_xml – fundername: National Research Foundation of Korea
  funderid: 10.13039/501100003725
– fundername: Brazilian National Council for Research and Development
  grantid: 431726/2018-3; 309335/2017-5
– fundername: Fundação para a Ciência e a Tecnologia
  grantid: UID/EEA/50008/2019
  funderid: 10.13039/501100001871
– fundername: Rede Nacional de Pesquisa, with resources from MCTIC through the Centro de Referência em Radiocomunicações project of the Instituto Nacional de Telecomunicações (Inatel), Brazil
  grantid: 01250.075413/2018-04
– fundername: Ministry of Education, South Korea
  grantid: 21A20131600011
– fundername: Office of the Assistant Secretary of Defense for Research and Engineering
  grantid: FA8750-15-2-0120
– fundername: Ministry of Science, ICT and Future Planning
  grantid: 2017R1A2B1002147
  funderid: 10.13039/501100003621
– fundername: BK21 Plus project
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
RIG
ID FETCH-LOGICAL-c359t-ee10bf1c6fd22d7c25dc1ae9a26d3307de77ab86fced6885abc8efccd17a8c783
IEDL.DBID RIE
ISICitedReferencesCount 186
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000491295800118&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2327-4662
IngestDate Mon Jun 30 06:59:30 EDT 2025
Sat Nov 29 06:16:47 EST 2025
Tue Nov 18 22:30:56 EST 2025
Wed Aug 27 02:40:15 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c359t-ee10bf1c6fd22d7c25dc1ae9a26d3307de77ab86fced6885abc8efccd17a8c783
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-9898-0921
0000-0001-8657-3800
0000-0002-5196-9589
0000-0002-8789-0610
0000-0002-0406-6547
PQID 2303987610
PQPubID 2040421
PageCount 14
ParticipantIDs crossref_citationtrail_10_1109_JIOT_2019_2923611
ieee_primary_8740937
proquest_journals_2303987610
crossref_primary_10_1109_JIOT_2019_2923611
PublicationCentury 2000
PublicationDate 2019-10-01
PublicationDateYYYYMMDD 2019-10-01
PublicationDate_xml – month: 10
  year: 2019
  text: 2019-10-01
  day: 01
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref12
ref37
ref15
sun (ref28) 2010; 21
ref36
ref14
ref31
ref30
ref33
ref2
li (ref34) 2015; 26
ref1
ref39
ref17
ref38
ref19
ref18
kocher (ref16) 1999; 1666
zhao (ref32) 2015; 9
(ref11) 2019
ref24
ref23
ref48
ref26
ref47
ref25
ref20
(ref45) 2019
ref22
ref44
ref21
ref43
ref27
ref29
ref8
ref7
ref9
ref4
ref3
(ref41) 1995
ref6
abdalla (ref10) 2005
ref5
(ref42) 2018
ref40
(ref46) 1995
References_xml – ident: ref40
  doi: 10.1109/TDSC.2016.2616876
– ident: ref1
  doi: 10.1109/TITS.2017.2657649
– ident: ref4
  doi: 10.1109/ACCESS.2017.2723265
– ident: ref5
  doi: 10.1016/B978-0-12-805395-9.00016-2
– ident: ref12
  doi: 10.1109/TVT.2017.2780183
– year: 1995
  ident: ref46
  publication-title: Secure Hash Standard
– ident: ref22
  doi: 10.1109/TII.2017.2773666
– ident: ref9
  doi: 10.1109/JIOT.2018.2820039
– ident: ref7
  doi: 10.1109/ACCESS.2019.2897615
– year: 2019
  ident: ref11
  publication-title: Automated Validation of Internet Security Protocols and Applications
– ident: ref27
  doi: 10.1016/j.comcom.2007.12.003
– ident: ref18
  doi: 10.1007/3-540-46035-7_22
– ident: ref48
  doi: 10.1109/MCSA.1999.749281
– ident: ref26
  doi: 10.1109/JIOT.2018.2878333
– ident: ref37
  doi: 10.1109/TVT.2015.2402166
– ident: ref3
  doi: 10.1109/ICC.2018.8422447
– volume: 1666
  start-page: 388
  year: 1999
  ident: ref16
  article-title: Differential power analysis
  publication-title: Proc 19th Annu Int Cryptol Conf (CRYPTO)
– ident: ref8
  doi: 10.1109/JIOT.2018.2855718
– year: 2018
  ident: ref42
  publication-title: Descriptions of SHA-256 SHA-384 and SHA-512
– volume: 26
  start-page: 938
  year: 2015
  ident: ref34
  article-title: ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2014.2308215
– start-page: 65
  year: 2005
  ident: ref10
  article-title: Password-based authenticated key exchange in the three-party setting
  publication-title: Public Key Cryptography (PKC'05)
– year: 1995
  ident: ref41
  publication-title: Secure Hash Standard
– ident: ref31
  doi: 10.1109/TVT.2015.2405853
– ident: ref2
  doi: 10.1109/ICCCSP.2017.7944096
– volume: 9
  start-page: 4250
  year: 2015
  ident: ref32
  article-title: An efficient revocable group signature scheme in vehicular ad hoc networks
  publication-title: KSII Trans Internet Inf Syst
– ident: ref14
  doi: 10.1109/JPROC.2011.2132790
– ident: ref13
  doi: 10.1109/TVT.2018.2796443
– ident: ref29
  doi: 10.1109/JIOT.2018.2890213
– ident: ref24
  doi: 10.1109/JSYST.2016.2585681
– ident: ref30
  doi: 10.1109/TIFS.2015.2473820
– ident: ref35
  doi: 10.1109/TVT.2013.2257188
– ident: ref21
  doi: 10.1109/JIOT.2017.2787800
– volume: 21
  start-page: 1227
  year: 2010
  ident: ref28
  article-title: An identity-based security system for user privacy in vehicular ad hoc networks
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2010.14
– ident: ref17
  doi: 10.1007/3-540-44987-6_28
– ident: ref19
  doi: 10.1109/TSG.2016.2602282
– ident: ref39
  doi: 10.1109/JIOT.2017.2714179
– ident: ref33
  doi: 10.1016/j.future.2016.04.024
– ident: ref15
  doi: 10.1109/TIT.1983.1056650
– ident: ref36
  doi: 10.1109/TVT.2014.2358633
– ident: ref43
  doi: 10.1109/TDSC.2014.2355850
– ident: ref38
  doi: 10.1109/TDSC.2017.2764083
– ident: ref44
  doi: 10.1145/77648.77649
– year: 2019
  ident: ref45
  publication-title: AVISPA SPAN the Security Protocol Animator for AVISPA
– ident: ref25
  doi: 10.1109/JIOT.2019.2892009
– ident: ref47
  doi: 10.1145/129902.129905
– ident: ref23
  doi: 10.1109/TIFS.2018.2850299
– ident: ref6
  doi: 10.1016/j.future.2018.09.017
– ident: ref20
  doi: 10.1109/MCE.2018.2851744
SSID ssj0001105196
Score 2.5615602
Snippet Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 8804
SubjectTerms Authenticated key management
Authentication
automated validation of Internet security protocols and application (AVISPA)
Cloud computing
Comparative studies
Computational modeling
Computer simulation
Dependence
Driving
fog computing
Internet of Things
Internet of Vehicles
Internet of Vehicles (IoV)
Mobile computing
NS2 simulation
Passenger safety
Protocol (computers)
Protocols
security
Servers
Traffic safety
Wireless communications
Title AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
URI https://ieeexplore.ieee.org/document/8740937
https://www.proquest.com/docview/2303987610
Volume 6
WOSCitedRecordID wos000491295800118&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE
  customDbUrl:
  eissn: 2327-4662
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001105196
  issn: 2327-4662
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB508eDF9Ynrixw8idWmaZvE2_pYfOtBxVtJk4kuyFZ2q-C_N2m7K6II3nrIhNAvk3nkmwzAtjZJnss0DxS62CS2hgXCWhZQFWuhWC5jrAqFL_n1tXh8lLdTsDuphUHEinyGe_6zuss3hX7zqbJ93z7OmdNpmOY8rWu1vvIp1DsjaXNxSUO5f352c-e5W3Ivkv6JEfrN9FS9VH4cwJVV6bX_t555mGu8R9Kt4V6AKRwsQnvcmYE0iroE2L24Cs6KhwPiU2CeEOSJT4Zc4Af5IryQ22FRFm4nkP6A9IonUk_kjFlw6IybIXW6EEtSWPKAzxWDjhyj7xHs5Zfhvndyd3QaNA0VAs0SWQaINMwt1ak1UWS4jhKjqUKpotQwp-wGOVe5SK1GkwqRqFwLtFobypXQXLAVaA2KAa4Csbl2niGKJEpUjIaphDnf08TaSsM4mg6E43-d6ea1cd_04iWroo5QZh6ezMOTNfB0YGci8lo_tfHX4CWPx2RgA0UHNsaAZo0yjjIXZTHpTn0arv0utQ6zfu6ao7cBrXL4hpswo9_L_mi4Ve2zT2zb1B0
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwEB2xSXBhR5TVB06IQBxnsbmxVZSWwqEgbpFjj6ESalAJSPw9dpIWIRAStxxsJ8rzeBa_mQHYUzrKMhFnnkTrm4RGM48bwzwqQ8Uly0SIZaJwJ-l2-cODuJ2Ag3EuDCKW5DM8dI_lXb7O1ZsLlR259nFWnU7CdBSGgV9la31FVKgzR-L66pL64uiqddNz7C1xGAhXZIR-Uz5lN5UfR3CpV5oL__uiRZiv7UdyUgG-BBM4WIaFUW8GUovqCuBJ-9pr5ffHxAXBHCXIUZ80aeMH-aK8kNthXuR2L5D-gDTzR1ItZNWZd2rVmyZVwBALkhtyj08lh46co-sS7Oavwl3zond26dUtFTzFIlF4iNTPDFWx0UGgExVEWlGJQgaxZlbcNSaJzHhsFOqY80hmiqNRStNEcpVwtgZTg3yA60BMpqxtiDwKIhmiZjJi1vrUoTJCswR1A_zRv05VXW_ctb14Tku_wxepgyd18KQ1PA3YH095qYpt_DV4xeExHlhD0YCtEaBpLY6vqfWzmLDnPvU3fp-1C7OXvetO2ml125sw595TMfa2YKoYvuE2zKj3ov863Cn33CeawNdk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=AKM-IoV%3A+Authenticated+Key+Management+Protocol+in+Fog+Computing-Based+Internet+of+Vehicles+Deployment&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Wazid%2C+Mohammad&rft.au=Bagga%2C+Palak&rft.au=Das%2C+Ashok+Kumar&rft.au=Shetty%2C+Sachin&rft.date=2019-10-01&rft.pub=IEEE&rft.eissn=2327-4662&rft.volume=6&rft.issue=5&rft.spage=8804&rft.epage=8817&rft_id=info:doi/10.1109%2FJIOT.2019.2923611&rft.externalDocID=8740937
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon