7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one territory to another may have the connectivity services down for a while, leading to service interruption because it is pervasive in remote areas and places with multipath obstructions. Hence, it is vulnerable to specific attacks ( e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. The proposed scheme utilizes an efficient AES-RSA algorithm to achieve integrity and confidentiality of the message. The offline joining is added to avoid remote network intrusions and the risk of network service interruptions. The proposed work includes two different significant goals to achieve first, then secure message on which the data is transmitted and efficiency in a cryptographic manner. The Burrows Abdi Needham (BAN logic) logic is used to prove that this scheme is mutually authenticated. The system’s security has been tested using the well-known AVISPA tool to evaluate and verify its security formally. The results show that the proposed scheme outperforms the ID-CPPA, AAAS, and HCDA schemes by 53%, 55%, and 47% respectively in terms of computation cost, and 65%, 83%, and 40% respectively in terms of communication cost.

          Related collections

          Most cited references49

          • Record: found
          • Abstract: not found
          • Article: not found

          On the security of public key protocols

          D Dolev, A. Yao (1983)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects

                Bookmark

                Author and article information

                Contributors
                Journal
                PeerJ Comput Sci
                PeerJ Comput Sci
                peerj-cs
                PeerJ Computer Science
                PeerJ Inc. (San Diego, USA )
                2376-5992
                10 December 2021
                2021
                : 7
                : e714
                Affiliations
                [1 ]Department of Computer and Communication & Systems Engineering, Faculty of Engineering, Universiti Putra Malaysia , Serdang, Selangor, Malaysia
                [2 ]Department of Electrical Engineering, College of Engineering, Ajman University , Ajman, United Arab Emirates
                Author information
                http://orcid.org/0000-0003-1880-5643
                Article
                cs-714
                10.7717/peerj-cs.714
                8670398
                e333ae53-1424-444d-a7ae-c09595c6b5e6
                © 2021 Khalid et al.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 7 May 2021
                : 24 August 2021
                Funding
                Funded by: University Putra Malaysia
                Funded by: Ajman University
                The University Putra Malaysia supported this work as part of the “Matching Grant UPM-Kyutech” and Ajman University provided an “Ajman University Graduate Student Grant”. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
                Categories
                Autonomous Systems
                Computer Networks and Communications
                Cryptography
                Security and Privacy

                cross-domain authentication,offline authentication,vanet,security,industrial iot

                Comments

                Comment on this article