Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Construction of Authentication Scheme using ECC for Vehicular Cloud Computing

by Kamal Kumar, Vinod Kumar, Renu, Adesh Kumari, Rajiv Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 41
Year of Publication: 2024
Authors: Kamal Kumar, Vinod Kumar, Renu, Adesh Kumari, Rajiv Sharma
10.5120/ijca2024924007

Kamal Kumar, Vinod Kumar, Renu, Adesh Kumari, Rajiv Sharma . Construction of Authentication Scheme using ECC for Vehicular Cloud Computing. International Journal of Computer Applications. 186, 41 ( Sep 2024), 19-25. DOI=10.5120/ijca2024924007

@article{ 10.5120/ijca2024924007,
author = { Kamal Kumar, Vinod Kumar, Renu, Adesh Kumari, Rajiv Sharma },
title = { Construction of Authentication Scheme using ECC for Vehicular Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2024 },
volume = { 186 },
number = { 41 },
month = { Sep },
year = { 2024 },
issn = { 0975-8887 },
pages = { 19-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number41/construction-of-authentication-scheme-using-ecc-for-vehicular-cloud-computing/ },
doi = { 10.5120/ijca2024924007 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-09-30T23:02:31.992033+05:30
%A Kamal Kumar
%A Vinod Kumar
%A Renu
%A Adesh Kumari
%A Rajiv Sharma
%T Construction of Authentication Scheme using ECC for Vehicular Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 41
%P 19-25
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular cloud computing (VCC) is a combination of cloud computing, Internet of Things (IoT), vehicular networking, and other technologies. The term VCC Communication refers to the communication between automobiles that have communication sensing capabilities. This includes vehicle-to-vehicle (V2V), vehicleto- infrastructure (V2I), and vehicle-to-device (V2D) interactions. Cloud computing, IoTs, and vehicle resources are all utilized by VCC. However, VCC highlights how crucial communication security and privacy are for communicators. We offer an ECC based authentication framework for VCC, which is equipped with vehicle user and cloud server, with the goal of enabling safe communication while maintaining anonymity. We use security analysis as evidence for the safe communication assertion. We justify and assess the recommended framework’s performance in terms of acceptable performance metrics and draw comparisons with other systems of a like nature. Based on our findings, the suggested architecture allows for efficient communication while meeting the necessary security requirements.

References
  1. S. Olariu, I. Khalil, M. Abuelela, Taking vanet to the clouds, International Journal of Pervasive Computing and Communications 7 (1) (2011) 7–21.
  2. S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, Vehicular ad hoc networks (vanets): status, results, and challenges, Telecommunication Systems 50 (4) (2012) 217–241.
  3. N. Tekbiyik, E. Uysal-Biyikoglu, Energy efficient wireless unicast routing alternatives for machine-to-machine networks, Journal of Network and Computer Applications 34 (5) (2011) 1587–1614.
  4. M. Whaiduzzaman, M. Sookhak, A. Gani, R. Buyya, A survey on vehicular cloud computing, Journal of Network and Computer Applications 40 (2014) 325–344.
  5. S. Singh, Y.-S. Jeong, J. H. Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications 75 (2016) 200–222.
  6. J. Wang, Y. Liu, Y. Jiao, Building a trusted route in a mobile ad hoc network considering communication reliability and path length, Journal of Network and Computer Applications 34 (4) (2011) 1138–1149.
  7. G. Yan, D. B. Rawat, B. B. Bista, Towards secure vehicular clouds, in: 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems, IEEE, 2012, pp. 370–375.
  8. J.-L. Tsai, N.-W. Lo, A privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE systems journal 9 (3) (2015) 805–815.
  9. Y. Liu, Y. Wang, G. Chang, Efficient privacy-preserving dual authentication and key agreement scheme for secure v2v communications in an iov paradigm, IEEE Transactions on Intelligent Transportation Systems 18 (10) (2017) 2740– 2749.
  10. Q. Jiang, J. Ni, J.Ma, L. Yang, X. Shen, Integrated authentication and key agreement framework for vehicular cloud computing, IEEE Network 32 (3) (2018) 28–35.
  11. W. Shi, P. Gong, A new user authentication protocol for wireless sensor networks using elliptic curves cryptography, International Journal of Distributed Sensor Networks 9 (4) (2013) 730831.
  12. Y. Choi, D. Lee, J. Kim, J. Jung, J. Nam, D. Won, Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors 14 (6) (2014) 10081–10106.
  13. M. A. Pandi Vijayakumar, A. Kannan, L. J. Deborah, Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems 17 (4) (2016).
  14. Y. Xiao, X. Shen, B. Sun, L. Cai, Security and privacy in rfid and applications in telemedicine, IEEE communications magazine 44 (4) (2006) 64–72.
  15. N. Kumar, K. Kaur, S. C. Misra, R. Iqbal, An intelligent rfidenabled authentication scheme for healthcare applications in vehicular mobile cloud, Peer-to-Peer Networking and Applications 9 (5) (2016) 824–840.
  16. F. Wu, L. Xu, S. Kumari, X. Li, A. K. Das, J. Shen, A lightweight and anonymous rfid tag authentication protocol with cloud assistance for e-healthcare applications, Journal of Ambient Intelligence and Humanized Computing 9 (4) (2018) 919–930.
  17. Y. Chen, J.-S. Chou, Ecc-based untraceable authentication for large-scale active-tag rfid systems, Electronic Commerce Research 15 (1) (2015) 97–120.
  18. K. Srivastava, A. K. Awasthi, S. D. Kaul, R. Mittal, A hash based mutual rfid tag authentication protocol in telecare medicine information system, Journal of medical systems 39 (1) (2015) 153.
  19. C.-T. Li, C.-Y. Weng, C.-C. Lee, A secure rfid tag authentication protocol with privacy preserving in telecare medicine information system, Journal of medical systems 39 (8) (2015) 77.
  20. N. Dinarvand, H. Barati, An efficient and secure rfid authentication protocol using elliptic curve cryptography, Wireless Networks 25 (1) (2019) 415–428.
  21. V. Kumar, M. Ahmad, P. Kumar, An identity-based authentication framework for big data security, in: Proceedings of 2nd International Conference on Communication, Computing and Networking, Springer, 2019, pp. 63–71.
  22. Y.-C. Chen, H.-M. Sun, R.-S. Chen, Design and implementation of wearable rfid tag for real-time ubiquitous medical care, in: Biomedical Wireless Technologies, Networks, and Sensing Systems (BioWireleSS), 2014 IEEE Topical Conference on, IEEE, 2014, pp. 25–27.
  23. D. He, N. Kumar, M. K. Khan, L. Wang, J. Shen, Efficient privacy-aware authentication scheme for mobile cloud computing services, IEEE Systems Journal 12 (2) (2016) 1621– 1631.
  24. F. Wang, Y. Xu, H. Zhang, Y. Zhang, L. Zhu, 2flip: A twofactor lightweight privacy-preserving authentication scheme for vanet, IEEE Transactions on Vehicular Technology 65 (2) (2015) 896–911.
  25. R. Amin, S. H. Islam, G. Biswas, M. K. Khan, N. Kumar, A robust and anonymous patient monitoring system using wireless medical sensor networks, Future Generation Computer Systems 80 (2018) 483–495.
  26. P. Chandrakar, H. Om, A secure and robust anonymous threefactor remote user authentication scheme for multi-server environment using ecc, Computer Communications 110 (2017) 26–34.
  27. R. Amin, G. Biswas, A secure three-factor user authentication and key agreement protocol for tmis with user anonymity, Journal of medical systems 39 (8) (2015) 78.
Index Terms

Computer Science
Information Sciences

Keywords

ECC Authentication Vehicular cloud computing Security and Privacy