scholarly journals A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT

2021 ◽  
Vol 7 ◽  
pp. e714
Author(s):  
Haqi Khalid ◽  
Shaiful Jahari Hashim ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Fazirulhisyam Hashim ◽  
Muhammad Akmal Chaudhary

In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one territory to another may have the connectivity services down for a while, leading to service interruption because it is pervasive in remote areas and places with multipath obstructions. Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. The proposed scheme utilizes an efficient AES-RSA algorithm to achieve integrity and confidentiality of the message. The offline joining is added to avoid remote network intrusions and the risk of network service interruptions. The proposed work includes two different significant goals to achieve first, then secure message on which the data is transmitted and efficiency in a cryptographic manner. The Burrows Abdi Needham (BAN logic) logic is used to prove that this scheme is mutually authenticated. The system’s security has been tested using the well-known AVISPA tool to evaluate and verify its security formally. The results show that the proposed scheme outperforms the ID-CPPA, AAAS, and HCDA schemes by 53%, 55%, and 47% respectively in terms of computation cost, and 65%, 83%, and 40% respectively in terms of communication cost.

Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1687 ◽  
Author(s):  
Mahmood A. Al-shareeda ◽  
Mohammed Anbar ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group signature, or identity. However, none of these schemes appropriately address the efficient verification of multiple VANET messages in high-density traffic areas. Attackers could obtain sensitive information kept in a tamper-proof device (TPD) by using a side-channel attack. In this paper, we propose an identity-based conditional privacy-preserving authentication scheme that supports a batch verification process for the simultaneous verification of multiple messages by each node. Furthermore, to thwart side-channel attacks, vehicle information in the TPD is periodically and frequently updated. Finally, since the proposed scheme does not utilize the bilinear pairing operation or the Map-To-Point hash function, its performance outperforms other schemes, making it viable for large-scale VANETs deployment.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Yong Xie ◽  
Fang Xu ◽  
Dong Li ◽  
Yu Nie

Vehicular cloud network (VCN) is deemed as the most promising platform for providing transportation safety, road optimization, and valued-added application services. Because VCN is of distinguishing feature with super-large scale and unstable communication, it is a challenging task to study efficient authentication scheme for VCN without losing security and conditional privacy-preserving. To meet the challenge, a new efficient message authentication scheme is proposed in this paper. A batch message verification and signature aggregation are included in the proposed scheme to improve the authentication efficiency and decrease the communication cost. Compared with the similar conditional privacy-preserving authentication schemes, the proposed scheme has superior performance in computation and communication cost. Simulation analysis further proves that the proposed scheme has better advantages in reducing the verification loss rate and message delay in the application of VCN.


2019 ◽  
Vol 15 ◽  
pp. 16-27 ◽  
Author(s):  
Xu Yang ◽  
Xun Yi ◽  
Ibrahim Khalil ◽  
Yali Zeng ◽  
Xinyi Huang ◽  
...  

2018 ◽  
Author(s):  
AHMED ALMULHIM

BACKGROUND During last few years, IoT (IoT) is rapidly gaining ground in the field of networking wireless and communications. The basic idea is the connection between heterogeneous objects such as Mobile phones, Sensors, Radio-Frequency Identification (RFID) tags, etc. Therefore, everything becomes virtual, which means that everything is readable, addressable, and locatable on the Internet. The development of IoT in healthcare field led to several projects, health solutions and publications towards the modernization of healthcare industries worldwide. An E-health system utilizes wireless sensor networking (WSN) technology which consist of wearable and contextual sensors that connect to a Base Station, which in turn communicates with health care facility. There were around three million of patients who are utilizing connected home medical monitoring devices all over the world in 2013. Now, patients can be monitored 24/7 by using sensors in mobile devices such as cell phones or wearable devices. This has led to considerable cost savings through lowered hospital costs, health care provider costs, transportation costs and insurance costs. There is an added advantage of improved quality of care and time saving for patients and hospital staff. However, the increasing use of IoT services has led to increased concerns of security and privacy, especially in healthcare domain. There has been 100 percent increase in cyber security attacks on health care information systems since 2010. The cost of possible attacks on healthcare applications could be as much as 5.6 billion dollars annually. In fact, healthcare applications are prone to data breaches and widening issues in security aspects owing to increasing number of access points to sensitive data through electronic medical records, as well as the rising popularity of wearable technology. OBJECTIVE We aim to discern (1) Design light weight authentication scheme using mainly ECC principles for IoT based E-health applications. (2) Develop an authentication scheme with small key size providing comparable level of security. (3) Introduces group-based authentication scheme\model for secure data transmission from IoT nodes to the base station for IoT based E-health application. (4) Provide efficient, lightweight and secure authentication scheme for IoT based E-health applications. METHODS Our Research activities are relying on the following steps: begin from in depth literature review, problem formation, designing and simulation setup, testing, verification and publishing. RESULTS We intended to propose a lightweight authentication scheme for E-health applications, which authenticates each IoT device and builds secure channels among the sensor nodes and Base Station. So that the scheme will provide authentication of individual nodes and facilitate session key agreement among Base Station and sensor nodes. The proposed scheme will be evaluated against multiple attack scenarios for IoT domain. In order to save energy cost, we plan to apply group- based authentication model which allows all nodes to forward respective data to group head that in turn communicates with the base station. This node may be selected on the basis of the distance to the base station to reduce the communication cost. CONCLUSIONS : In this paper, proposing an efficient secured group-based lightweight authentication scheme for IoT based E-health applications. This scheme authenticates and established secure channels through sensor nodes and Base Station for E-health applications. We had analyzed power consumption of E-health applications by comparing our proposed group-based scheme with other existence lightweight authentication schemes for two different cases of patient. 1) With no mobility where patient lying on the bed and 2) with mobility when patient is on the wheel chair to test the power consumptions for each ultra-sensor node. Our scheme had been evaluated on Contiki simulator. The achieved results showed a significant difference of energy consumption and enhances the chances of security while receiving the authentication key. This all achieved by reducing the distance among the nodes and base station and as well as reducing the chances of external attacks by reducing the number of iterations by n for registering the authentication. Group-based node reduces distance and consume less energy and as will as led to reduce communication cost. Also, it will be resistant against several types of attacks by use elliptic curve cryptography (ECC) techniques on group-based node to increase level of security in IoT based E-health applications


Author(s):  
Manoj Himmatrao Devare

The manufacturing cloud (CMfg) covers the use of three key technologies including cloud computing, the industrial internet of things (IIoT), and collaborative engineering for achieving the productivity and quality challenges in the big manufacturing, which is enabled due to the communication, mobile, and broadcasting network. It is necessary to establish a flexible and adaptive infrastructure for manufacturing industry to share and use various manufacturing resources and services on-demand under the dynamic, complicated, and large-scale business environment. The CMfg makes the industry more agile, responsive, and reconfigurable for exposure to the industry as a global manufacturing enterprise. The chapter considers the CMfg facets and IIoT, use cases in the manufacturing industry, and explains IIoT and CMfg as a complementary technology.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1428
Author(s):  
Haqi Khalid ◽  
Shaiful Jahari Hashim ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Fazirulhisyam Hashim ◽  
Muhammad Akmal Chaudhary

The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.


Sign in / Sign up

Export Citation Format

Share Document