AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another var...
Gespeichert in:
| Veröffentlicht in: | IEEE internet of things journal Jg. 6; H. 5; S. 8804 - 8817 |
|---|---|
| Hauptverfasser: | , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Piscataway
IEEE
01.10.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 2327-4662, 2327-4662 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols. |
|---|---|
| AbstractList | Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols. |
| Author | Shetty, Sachin Bagga, Palak Park, Youngho Das, Ashok Kumar Wazid, Mohammad Rodrigues, Joel J. P. C. |
| Author_xml | – sequence: 1 givenname: Mohammad orcidid: 0000-0001-9898-0921 surname: Wazid fullname: Wazid, Mohammad email: wazidkec2005@gmail.com organization: Department of Computer Science and Engineering, Manipal Academy of Higher Education, Manipal Institute of Technology, Manipal, India – sequence: 2 givenname: Palak surname: Bagga fullname: Bagga, Palak email: palak.bagga@research.iiit.ac.in organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India – sequence: 3 givenname: Ashok Kumar orcidid: 0000-0002-5196-9589 surname: Das fullname: Das, Ashok Kumar email: iitkgp.akdas@gmail.com organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India – sequence: 4 givenname: Sachin orcidid: 0000-0002-8789-0610 surname: Shetty fullname: Shetty, Sachin email: sshetty@odu.edu organization: Department of Modeling, Simulation and Visualization Engineering, Virginia Modeling, Analysis and Simulation Center, Center for Cybersecurity Education and Research, Old Dominion University, Suffolk, VA, USA – sequence: 5 givenname: Joel J. P. C. orcidid: 0000-0001-8657-3800 surname: Rodrigues fullname: Rodrigues, Joel J. P. C. email: joeljr@ieee.org organization: PPG Telecommunications, National Institute of Telecommunications, Santa Rita do Sapucaí, Brazil – sequence: 6 givenname: Youngho orcidid: 0000-0002-0406-6547 surname: Park fullname: Park, Youngho email: parkyh@knu.ac.kr organization: School of Electronics Engineering, Kyungpook National University, Daegu, South Korea |
| BookMark | eNp9kM9PwjAUgBuDiYj8AcZLE8_D_mDt5g1RdALBA3JdSvcGJaPFrhz47x2BGOPBU1-a73sv-a5RyzoLCN1S0qOUpA_v2WzeY4SmPZYyLii9QG3GmYz6QrDWr_kKdet6QwhptJimoo1gMJ5GmVs84sE-rMEGo1WAAo_hgKfKqhVsm0_84V1w2lXYWDxyKzx0290-GLuKnlTd4JkN4C0E7Eq8gLXRFdT4GXaVOxz9G3RZqqqG7vntoM_Ry3z4Fk1mr9lwMIk0j9MQAVCyLKkWZcFYITWLC00VpIqJgnMiC5BSLRNRaihEksRqqRMotS6oVImWCe-g-9PenXdfe6hDvnF7b5uTOeOEp4kUlDSUPFHau7r2UObaBBWMs8ErU-WU5Mes-TFrfsyan7M2Jv1j7rzZKn_417k7OQYAfvhE9knKJf8G6FOGCA |
| CODEN | IITJAU |
| CitedBy_id | crossref_primary_10_1016_j_csa_2023_100027 crossref_primary_10_3390_electronics12214438 crossref_primary_10_3390_su13169241 crossref_primary_10_1002_spy2_365 crossref_primary_10_1109_TVT_2023_3242309 crossref_primary_10_1007_s10207_022_00619_1 crossref_primary_10_1007_s00607_023_01208_3 crossref_primary_10_1109_JSYST_2020_3044309 crossref_primary_10_1109_ACCESS_2020_2983994 crossref_primary_10_1016_j_jisa_2023_103648 crossref_primary_10_1016_j_comnet_2021_107989 crossref_primary_10_1016_j_comnet_2024_110240 crossref_primary_10_1109_ACCESS_2019_2960412 crossref_primary_10_1016_j_vehcom_2023_100683 crossref_primary_10_1109_TITS_2023_3252082 crossref_primary_10_1109_TITS_2023_3338060 crossref_primary_10_1007_s11227_022_04964_9 crossref_primary_10_1109_JIOT_2020_3002221 crossref_primary_10_1109_TIV_2023_3327364 crossref_primary_10_1016_j_vehcom_2023_100604 crossref_primary_10_1016_j_vehcom_2022_100567 crossref_primary_10_1109_ACCESS_2020_2992467 crossref_primary_10_1109_JSYST_2020_3022244 crossref_primary_10_3390_s22186995 crossref_primary_10_1109_ACCESS_2024_3493624 crossref_primary_10_3390_s24020368 crossref_primary_10_1109_JIOT_2025_3566962 crossref_primary_10_1002_dac_4511 crossref_primary_10_3390_s21186039 crossref_primary_10_1016_j_seta_2021_101086 crossref_primary_10_1109_TITS_2021_3138255 crossref_primary_10_32604_cmc_2024_052405 crossref_primary_10_1007_s10586_022_03566_7 crossref_primary_10_1109_JIOT_2020_3004811 crossref_primary_10_1109_TIV_2023_3303312 crossref_primary_10_1109_ACCESS_2021_3071499 crossref_primary_10_1109_JIOT_2023_3325904 crossref_primary_10_1109_ACCESS_2021_3131367 crossref_primary_10_1109_ACCESS_2022_3210117 crossref_primary_10_1109_JIOT_2021_3097535 crossref_primary_10_1109_ACCESS_2019_2962829 crossref_primary_10_1109_TVT_2024_3382971 crossref_primary_10_1007_s11227_023_05499_3 crossref_primary_10_3390_math13132142 crossref_primary_10_1007_s11277_023_10727_3 crossref_primary_10_1109_TITS_2024_3453928 crossref_primary_10_1109_JIOT_2020_2975207 crossref_primary_10_1007_s11227_020_03548_9 crossref_primary_10_1109_JIOT_2025_3587671 crossref_primary_10_1109_ACCESS_2020_3005592 crossref_primary_10_1002_dac_5479 crossref_primary_10_3390_s22197433 crossref_primary_10_1155_2023_9143563 crossref_primary_10_3390_app13106055 crossref_primary_10_1109_ACCESS_2020_2981397 crossref_primary_10_1109_TVT_2021_3050614 crossref_primary_10_1145_3538381 crossref_primary_10_1016_j_jnca_2020_102932 crossref_primary_10_1109_TIV_2024_3388724 crossref_primary_10_1109_TITS_2021_3099488 crossref_primary_10_1109_TITS_2025_3558978 crossref_primary_10_3390_info16010021 crossref_primary_10_1016_j_iot_2025_101684 crossref_primary_10_1016_j_iot_2024_101240 crossref_primary_10_1109_TITS_2022_3207593 crossref_primary_10_3390_s21041488 crossref_primary_10_1016_j_adhoc_2023_103303 crossref_primary_10_1007_s12083_022_01425_1 crossref_primary_10_1016_j_iot_2023_100679 crossref_primary_10_1109_TCSS_2022_3161996 crossref_primary_10_3390_electronics14101953 crossref_primary_10_1002_ett_4751 crossref_primary_10_1155_2022_8689651 crossref_primary_10_1109_TITS_2021_3115171 crossref_primary_10_26599_TST_2024_9010083 crossref_primary_10_1109_TVT_2023_3322637 crossref_primary_10_1109_TDSC_2020_3047872 crossref_primary_10_1016_j_comcom_2022_10_010 crossref_primary_10_1002_spy2_178 crossref_primary_10_1109_TITS_2024_3461838 crossref_primary_10_1016_j_cose_2024_103770 crossref_primary_10_1109_ACCESS_2022_3231189 crossref_primary_10_1108_IJPCC_09_2023_0250 crossref_primary_10_3390_s23042034 crossref_primary_10_1007_s00202_024_02587_2 crossref_primary_10_1007_s11277_020_07834_w crossref_primary_10_1007_s13177_022_00334_0 crossref_primary_10_1016_j_csi_2021_103567 crossref_primary_10_1007_s42044_025_00318_9 crossref_primary_10_1109_ACCESS_2020_3047895 crossref_primary_10_1109_ACCESS_2021_3089871 crossref_primary_10_1109_TNSE_2022_3142287 crossref_primary_10_1109_TVT_2024_3390607 crossref_primary_10_1109_TITS_2024_3428491 crossref_primary_10_1007_s00779_021_01648_8 crossref_primary_10_1109_TITS_2022_3174716 crossref_primary_10_1109_TVT_2024_3368407 crossref_primary_10_3390_s25030982 crossref_primary_10_1007_s11227_020_03350_7 crossref_primary_10_1109_ACCESS_2024_3409361 crossref_primary_10_3390_app10186268 crossref_primary_10_1007_s12243_021_00866_8 crossref_primary_10_3390_electronics11233868 crossref_primary_10_1016_j_jpdc_2022_01_029 crossref_primary_10_1016_j_procs_2023_03_120 crossref_primary_10_3390_sym14071393 crossref_primary_10_1007_s10586_021_03471_5 crossref_primary_10_1051_itmconf_20235402008 crossref_primary_10_1109_ACCESS_2023_3265959 crossref_primary_10_1109_JIOT_2022_3150842 crossref_primary_10_1109_JIOT_2021_3056477 crossref_primary_10_3390_electronics10121417 crossref_primary_10_1109_ACCESS_2025_3608623 crossref_primary_10_1109_ACCESS_2019_2945610 crossref_primary_10_1109_JIOT_2025_3562393 crossref_primary_10_3390_electronics13061026 crossref_primary_10_21015_vtse_v12i3_1806 crossref_primary_10_3390_s21030936 crossref_primary_10_47164_ijngc_v13i5_935 crossref_primary_10_1109_ACCESS_2020_2987065 crossref_primary_10_1109_TITS_2023_3328324 crossref_primary_10_3390_sym17081350 crossref_primary_10_1109_JIOT_2024_3420176 crossref_primary_10_1109_TR_2020_3021794 crossref_primary_10_3390_math13132062 crossref_primary_10_3390_s22187075 crossref_primary_10_1016_j_comnet_2021_108460 crossref_primary_10_1109_TVT_2021_3113652 crossref_primary_10_1109_TNSE_2025_3563297 crossref_primary_10_1016_j_sysarc_2020_101877 crossref_primary_10_3390_electronics14142783 crossref_primary_10_1109_ACCESS_2020_2995917 crossref_primary_10_1109_JIOT_2020_2989761 crossref_primary_10_1109_TIFS_2023_3318952 crossref_primary_10_3390_app11198841 crossref_primary_10_1109_TVT_2023_3334034 crossref_primary_10_1016_j_suscom_2025_101113 crossref_primary_10_1007_s00500_021_06035_2 crossref_primary_10_1016_j_vehcom_2024_100785 crossref_primary_10_1016_j_sysarc_2025_103422 crossref_primary_10_1109_TITS_2021_3098636 crossref_primary_10_1016_j_sysarc_2021_102296 crossref_primary_10_1109_MNET_002_2300009 crossref_primary_10_1002_ett_4317 crossref_primary_10_1002_ett_3900 crossref_primary_10_1145_3491202 crossref_primary_10_32604_cmc_2023_035602 crossref_primary_10_1038_s41598_024_56141_y crossref_primary_10_1109_MCE_2021_3116415 crossref_primary_10_1002_dac_5028 crossref_primary_10_1016_j_sysarc_2023_102937 crossref_primary_10_1109_ACCESS_2020_3036044 crossref_primary_10_1016_j_vehcom_2020_100311 crossref_primary_10_1109_TVT_2020_3038834 crossref_primary_10_1007_s11276_021_02712_0 crossref_primary_10_1177_15501329221105202 crossref_primary_10_1109_ACCESS_2024_3488570 crossref_primary_10_3390_math12233756 crossref_primary_10_1109_JIOT_2025_3577701 crossref_primary_10_1016_j_vehcom_2021_100335 crossref_primary_10_1007_s10207_022_00595_6 crossref_primary_10_1109_TNSE_2021_3093435 crossref_primary_10_1016_j_iot_2020_100249 |
| Cites_doi | 10.1109/TDSC.2016.2616876 10.1109/TITS.2017.2657649 10.1109/ACCESS.2017.2723265 10.1016/B978-0-12-805395-9.00016-2 10.1109/TVT.2017.2780183 10.1109/TII.2017.2773666 10.1109/JIOT.2018.2820039 10.1109/ACCESS.2019.2897615 10.1016/j.comcom.2007.12.003 10.1007/3-540-46035-7_22 10.1109/MCSA.1999.749281 10.1109/JIOT.2018.2878333 10.1109/TVT.2015.2402166 10.1109/ICC.2018.8422447 10.1109/JIOT.2018.2855718 10.1109/TPDS.2014.2308215 10.1109/TVT.2015.2405853 10.1109/ICCCSP.2017.7944096 10.1109/JPROC.2011.2132790 10.1109/TVT.2018.2796443 10.1109/JIOT.2018.2890213 10.1109/JSYST.2016.2585681 10.1109/TIFS.2015.2473820 10.1109/TVT.2013.2257188 10.1109/JIOT.2017.2787800 10.1109/TPDS.2010.14 10.1007/3-540-44987-6_28 10.1109/TSG.2016.2602282 10.1109/JIOT.2017.2714179 10.1016/j.future.2016.04.024 10.1109/TIT.1983.1056650 10.1109/TVT.2014.2358633 10.1109/TDSC.2014.2355850 10.1109/TDSC.2017.2764083 10.1145/77648.77649 10.1109/JIOT.2019.2892009 10.1145/129902.129905 10.1109/TIFS.2018.2850299 10.1016/j.future.2018.09.017 10.1109/MCE.2018.2851744 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/JIOT.2019.2923611 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 8817 |
| ExternalDocumentID | 10_1109_JIOT_2019_2923611 8740937 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Research Foundation of Korea funderid: 10.13039/501100003725 – fundername: Brazilian National Council for Research and Development grantid: 431726/2018-3; 309335/2017-5 – fundername: Fundação para a Ciência e a Tecnologia grantid: UID/EEA/50008/2019 funderid: 10.13039/501100001871 – fundername: Rede Nacional de Pesquisa, with resources from MCTIC through the Centro de Referência em Radiocomunicações project of the Instituto Nacional de Telecomunicações (Inatel), Brazil grantid: 01250.075413/2018-04 – fundername: Ministry of Education, South Korea grantid: 21A20131600011 – fundername: Office of the Assistant Secretary of Defense for Research and Engineering grantid: FA8750-15-2-0120 – fundername: Ministry of Science, ICT and Future Planning grantid: 2017R1A2B1002147 funderid: 10.13039/501100003621 – fundername: BK21 Plus project |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D RIG |
| ID | FETCH-LOGICAL-c359t-ee10bf1c6fd22d7c25dc1ae9a26d3307de77ab86fced6885abc8efccd17a8c783 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 186 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000491295800118&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2327-4662 |
| IngestDate | Mon Jun 30 06:59:30 EDT 2025 Sat Nov 29 06:16:47 EST 2025 Tue Nov 18 22:30:56 EST 2025 Wed Aug 27 02:40:15 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c359t-ee10bf1c6fd22d7c25dc1ae9a26d3307de77ab86fced6885abc8efccd17a8c783 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-9898-0921 0000-0001-8657-3800 0000-0002-5196-9589 0000-0002-8789-0610 0000-0002-0406-6547 |
| PQID | 2303987610 |
| PQPubID | 2040421 |
| PageCount | 14 |
| ParticipantIDs | crossref_citationtrail_10_1109_JIOT_2019_2923611 ieee_primary_8740937 proquest_journals_2303987610 crossref_primary_10_1109_JIOT_2019_2923611 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-10-01 |
| PublicationDateYYYYMMDD | 2019-10-01 |
| PublicationDate_xml | – month: 10 year: 2019 text: 2019-10-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2019 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref35 ref13 ref12 ref37 ref15 sun (ref28) 2010; 21 ref36 ref14 ref31 ref30 ref33 ref2 li (ref34) 2015; 26 ref1 ref39 ref17 ref38 ref19 ref18 kocher (ref16) 1999; 1666 zhao (ref32) 2015; 9 (ref11) 2019 ref24 ref23 ref48 ref26 ref47 ref25 ref20 (ref45) 2019 ref22 ref44 ref21 ref43 ref27 ref29 ref8 ref7 ref9 ref4 ref3 (ref41) 1995 ref6 abdalla (ref10) 2005 ref5 (ref42) 2018 ref40 (ref46) 1995 |
| References_xml | – ident: ref40 doi: 10.1109/TDSC.2016.2616876 – ident: ref1 doi: 10.1109/TITS.2017.2657649 – ident: ref4 doi: 10.1109/ACCESS.2017.2723265 – ident: ref5 doi: 10.1016/B978-0-12-805395-9.00016-2 – ident: ref12 doi: 10.1109/TVT.2017.2780183 – year: 1995 ident: ref46 publication-title: Secure Hash Standard – ident: ref22 doi: 10.1109/TII.2017.2773666 – ident: ref9 doi: 10.1109/JIOT.2018.2820039 – ident: ref7 doi: 10.1109/ACCESS.2019.2897615 – year: 2019 ident: ref11 publication-title: Automated Validation of Internet Security Protocols and Applications – ident: ref27 doi: 10.1016/j.comcom.2007.12.003 – ident: ref18 doi: 10.1007/3-540-46035-7_22 – ident: ref48 doi: 10.1109/MCSA.1999.749281 – ident: ref26 doi: 10.1109/JIOT.2018.2878333 – ident: ref37 doi: 10.1109/TVT.2015.2402166 – ident: ref3 doi: 10.1109/ICC.2018.8422447 – volume: 1666 start-page: 388 year: 1999 ident: ref16 article-title: Differential power analysis publication-title: Proc 19th Annu Int Cryptol Conf (CRYPTO) – ident: ref8 doi: 10.1109/JIOT.2018.2855718 – year: 2018 ident: ref42 publication-title: Descriptions of SHA-256 SHA-384 and SHA-512 – volume: 26 start-page: 938 year: 2015 ident: ref34 article-title: ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2014.2308215 – start-page: 65 year: 2005 ident: ref10 article-title: Password-based authenticated key exchange in the three-party setting publication-title: Public Key Cryptography (PKC'05) – year: 1995 ident: ref41 publication-title: Secure Hash Standard – ident: ref31 doi: 10.1109/TVT.2015.2405853 – ident: ref2 doi: 10.1109/ICCCSP.2017.7944096 – volume: 9 start-page: 4250 year: 2015 ident: ref32 article-title: An efficient revocable group signature scheme in vehicular ad hoc networks publication-title: KSII Trans Internet Inf Syst – ident: ref14 doi: 10.1109/JPROC.2011.2132790 – ident: ref13 doi: 10.1109/TVT.2018.2796443 – ident: ref29 doi: 10.1109/JIOT.2018.2890213 – ident: ref24 doi: 10.1109/JSYST.2016.2585681 – ident: ref30 doi: 10.1109/TIFS.2015.2473820 – ident: ref35 doi: 10.1109/TVT.2013.2257188 – ident: ref21 doi: 10.1109/JIOT.2017.2787800 – volume: 21 start-page: 1227 year: 2010 ident: ref28 article-title: An identity-based security system for user privacy in vehicular ad hoc networks publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2010.14 – ident: ref17 doi: 10.1007/3-540-44987-6_28 – ident: ref19 doi: 10.1109/TSG.2016.2602282 – ident: ref39 doi: 10.1109/JIOT.2017.2714179 – ident: ref33 doi: 10.1016/j.future.2016.04.024 – ident: ref15 doi: 10.1109/TIT.1983.1056650 – ident: ref36 doi: 10.1109/TVT.2014.2358633 – ident: ref43 doi: 10.1109/TDSC.2014.2355850 – ident: ref38 doi: 10.1109/TDSC.2017.2764083 – ident: ref44 doi: 10.1145/77648.77649 – year: 2019 ident: ref45 publication-title: AVISPA SPAN the Security Protocol Animator for AVISPA – ident: ref25 doi: 10.1109/JIOT.2019.2892009 – ident: ref47 doi: 10.1145/129902.129905 – ident: ref23 doi: 10.1109/TIFS.2018.2850299 – ident: ref6 doi: 10.1016/j.future.2018.09.017 – ident: ref20 doi: 10.1109/MCE.2018.2851744 |
| SSID | ssj0001105196 |
| Score | 2.5615602 |
| Snippet | Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 8804 |
| SubjectTerms | Authenticated key management Authentication automated validation of Internet security protocols and application (AVISPA) Cloud computing Comparative studies Computational modeling Computer simulation Dependence Driving fog computing Internet of Things Internet of Vehicles Internet of Vehicles (IoV) Mobile computing NS2 simulation Passenger safety Protocol (computers) Protocols security Servers Traffic safety Wireless communications |
| Title | AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment |
| URI | https://ieeexplore.ieee.org/document/8740937 https://www.proquest.com/docview/2303987610 |
| Volume | 6 |
| WOSCitedRecordID | wos000491295800118&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB508eDF9Ynrixw8idWmaZvE2_pYfOtBxVtJk4kuyFZ2q-C_N2m7K6II3nrIhNAvk3nkmwzAtjZJnss0DxS62CS2hgXCWhZQFWuhWC5jrAqFL_n1tXh8lLdTsDuphUHEinyGe_6zuss3hX7zqbJ93z7OmdNpmOY8rWu1vvIp1DsjaXNxSUO5f352c-e5W3Ivkv6JEfrN9FS9VH4cwJVV6bX_t555mGu8R9Kt4V6AKRwsQnvcmYE0iroE2L24Cs6KhwPiU2CeEOSJT4Zc4Af5IryQ22FRFm4nkP6A9IonUk_kjFlw6IybIXW6EEtSWPKAzxWDjhyj7xHs5Zfhvndyd3QaNA0VAs0SWQaINMwt1ak1UWS4jhKjqUKpotQwp-wGOVe5SK1GkwqRqFwLtFobypXQXLAVaA2KAa4Csbl2niGKJEpUjIaphDnf08TaSsM4mg6E43-d6ea1cd_04iWroo5QZh6ezMOTNfB0YGci8lo_tfHX4CWPx2RgA0UHNsaAZo0yjjIXZTHpTn0arv0utQ6zfu6ao7cBrXL4hpswo9_L_mi4Ve2zT2zb1B0 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwEB2xSXBhR5TVB06IQBxnsbmxVZSWwqEgbpFjj6ESalAJSPw9dpIWIRAStxxsJ8rzeBa_mQHYUzrKMhFnnkTrm4RGM48bwzwqQ8Uly0SIZaJwJ-l2-cODuJ2Ag3EuDCKW5DM8dI_lXb7O1ZsLlR259nFWnU7CdBSGgV9la31FVKgzR-L66pL64uiqddNz7C1xGAhXZIR-Uz5lN5UfR3CpV5oL__uiRZiv7UdyUgG-BBM4WIaFUW8GUovqCuBJ-9pr5ffHxAXBHCXIUZ80aeMH-aK8kNthXuR2L5D-gDTzR1ItZNWZd2rVmyZVwBALkhtyj08lh46co-sS7Oavwl3zond26dUtFTzFIlF4iNTPDFWx0UGgExVEWlGJQgaxZlbcNSaJzHhsFOqY80hmiqNRStNEcpVwtgZTg3yA60BMpqxtiDwKIhmiZjJi1vrUoTJCswR1A_zRv05VXW_ctb14Tku_wxepgyd18KQ1PA3YH095qYpt_DV4xeExHlhD0YCtEaBpLY6vqfWzmLDnPvU3fp-1C7OXvetO2ml125sw595TMfa2YKoYvuE2zKj3ov863Cn33CeawNdk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=AKM-IoV%3A+Authenticated+Key+Management+Protocol+in+Fog+Computing-Based+Internet+of+Vehicles+Deployment&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Wazid%2C+Mohammad&rft.au=Bagga%2C+Palak&rft.au=Das%2C+Ashok+Kumar&rft.au=Shetty%2C+Sachin&rft.date=2019-10-01&rft.pub=IEEE&rft.eissn=2327-4662&rft.volume=6&rft.issue=5&rft.spage=8804&rft.epage=8817&rft_id=info:doi/10.1109%2FJIOT.2019.2923611&rft.externalDocID=8740937 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |