Show simple item record

dc.contributor.authorAlzahrani, Bander A.
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorBarnawi, Ahmed
dc.contributor.authorAl-Barakati, Abdullah
dc.contributor.authorShon, Taeshik
dc.date.accessioned2020-05-17T00:18:00Z
dc.date.available2020-05-17T00:18:00Z
dc.date.issued2020en_US
dc.identifier.issn2079-9292
dc.identifier.urihttps://hdl.handle.net/11363/2143
dc.descriptionDocument Information Language: English Accession Number: WOS:000524079100141en_US
dc.description.abstractTwo party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows-Abadi-Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments.en_US
dc.description.sponsorshipThis Project was funded by the Deanship of Scientific Research (DSR), at King Abdulaziz University, Jeddah, under grant no. (RG-7-611-40). The authors, therefore, acknowledge with thanks DSR for technical and financial support. This research was supported by Energy Cloud R&D Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT (2019M3F2A1073386).en_US
dc.language.isoengen_US
dc.publisherMDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLANDen_US
dc.relation.isversionof10.3390/electronics9030520en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectInternet of Thingsen_US
dc.subjectV2V Securityen_US
dc.subjectInternet of Vehiclesen_US
dc.subjectkey compromise impersonation attacken_US
dc.subject2PAKAen_US
dc.subjectAGREEMENT PROTOCOLen_US
dc.subjectEFFICIENTen_US
dc.subjectSecurityen_US
dc.subjectCRYPTANALYSISen_US
dc.titleAn Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devicesen_US
dc.typearticleen_US
dc.relation.journalELECTRONICSen_US
dc.contributor.departmentMühendislik ve Mimarlık Fakültesien_US
dc.contributor.authorIDhttps://orcid.org/0000-0002-9321-6956en_US
dc.contributor.authorIDhttps://orcid.org/0000-0002-6784-3278en_US
dc.contributor.authorIDhttps://orcid.org/0000-0003-0516-8331en_US
dc.contributor.authorIDhttps://orcid.org/0000-0002-7118-0761en_US
dc.identifier.volume9en_US
dc.identifier.issue3en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

info:eu-repo/semantics/openAccess
Except where otherwise noted, this item's license is described as info:eu-repo/semantics/openAccess