4.4 Article Proceedings Paper

SFVCC: Chaotic map-based security framework for vehicular cloud computing

Journal

IET INTELLIGENT TRANSPORT SYSTEMS
Volume 14, Issue 4, Pages 241-249

Publisher

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-its.2019.0250

Keywords

road safety; telecommunication security; cloud computing; cryptographic protocols; intelligent transportation systems; vehicular ad hoc networks; mobile computing; authorisation; message authentication; Internet of Things; Automated Validation of Internet Security Protocols and Applications; protocol security; security claim; computation efficiency; SFVCC; chaotic map-based security framework; vehicular cloud computing; vehicular networking; sensing capacities; vehicle-to-vehicle; available roadside infrastructure; traffic management; road safety; vehicular communication; vehicular resources; internet of things environment; scalable platform; intelligent transport systems; chaotic map-based mutual authentication framework; secure mutual authentication framework

Ask authors/readers for more resources

Vehicular networking is an emerging research area. It enables the vehicles equipped with communication and sensing capacities to communicate vehicle-to-vehicle or with available roadside infrastructure. It has significant applications in terms of information and traffic management and road safety. To make vehicular communication more effective, vehicular cloud computing (VCC) architecture is introduced by utilising vehicular resources, cloud computing infrastructure and internet of things environment. VCC provides a scalable platform to support intelligent transport systems. However, there is a lack of efficient and secure mutual authentication framework in VCC. This study presents a chaotic map-based mutual authentication framework for VCC to ensure secure and efficient communication along with anonymity. The authors use a simulation tool AVISPA 'Automated Validation of Internet Security Protocols and Applications' to verify the protocol security against active attacks. The study also includes the proof of security in the random oracle model to justify security claim against known attacks. It presents the study of performance to validate the efficiency of the proposed scheme. Moreover, a comparative study of performance attributes with related schemes to identify the improvement in communication and computation efficiency is included.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available