Secure and Dynamic Route Navigation through RSU-based Authentication in IoV for Smart City
Dr Mohammad Abdussami, Bimal Kumar Meher., Ruhul Amin., Muhammad Khurram Khan., Md Abdul Saifulla., Sanjeev Kumar Dwivedi
Source Title: IEEE Transactions on Network Science and Engineering, Quartile: Q1, DOI Link
View abstract ⏷
One of the significant services provided by IoV in Smart cities is vehicular navigation. Drivers often find it difficult and time-consuming to complete their trip in a crowded city without real-time knowledge about the traffic and road conditions. So, a proper routing mechanism can help drivers reach their destination in minimum time and with less fuel consumption. However, it has been found that such protocols often face security challenges. In this paper, we have proposed an authenticated navigation scheme with the help of pseudonym-based asymmetric-key cryptography that discovers and secures the route to the destination in real time. The architecture embodies a geolocation provider (GLP) to get the possible static routes to a particular destination. Further, it uses the message-forwarding capability of RSUs to develop a dynamic route, after receiving feedback from the respective RSUs about the traffic conditions. While doing so, this protocol ensures proper message integrity, anonymity, unlinkability and robust protection from important security threats. Our approach ensures minimal end-to-end delay and efficient real-time route finding from a source to a destination with no extra overhead on the vehicles. We have simulated our authentication protocol using the Scyther simulator and found it safe from various adversarial attacks
LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment
Dr Mohammad Abdussami, Sanjeev Kumar Dwivedi|Ruhul Amin|Cheng-Chi Lee|Taher Al-Shehari|Taha Alfakih|Hussain Alsalman
Source Title: Peer-to-Peer Networking and Applications, Quartile: Q1, DOI Link
View abstract ⏷
The integration of the Internet of Things (IoT) with fog computing has significantly enhanced the capabilities of IoT applications by extending their reach and reducing latency. Fog nodes, being transient and authorized service providers, necessitate reauthentication of IoT end devices when contact is lost, requiring the device to connect to a new fog node. In this research, we propose an innovative security protocol designed to ensure seamless failover among fog nodes. This protocol facilitates quick and easy failover authentication among IoT devices and fognodes using the key agreement among fog nodes. LEFAM overcomes the requirement for the end device to communicate with the fog node atleast once to get the security token in order to execute failover authentication. This work proposes efficient, scalable and robust scheme required for fog-IoT environment to provide solution in case of failure of the primary fognodes. Our approach effectively mitigates various security threats, as demonstrated through informal analysis. Furthermore, simulation results obtained using the Scyther tool confirm the robustness of our protocol in terms of security. A formal analysis conducted using the RoR model further substantiates the reliability of our protocol. Notably, our protocol involves fewer message exchanges, indicating a lower communication overhead compared to other existing schemes. The key finding indicates that the LEFAM scheme offers an average improvement of 76% and 1188 bits for computation and communication overheads, respectively. Overall, our protocol not only enhances security but also offers superior performance relative to existing protocols
DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation
Dr Mohammad Abdussami, Dwivedi S K., Al-shehari T., Saravanan P., Kadrie M., Alfakih T., Alsalman H., Amin R
Source Title: Computers and Electrical Engineering, Quartile: Q1, DOI Link
View abstract ⏷
The growing reliance on wireless communication in Internet-of-Things (IoT) devices highlights the critical need for secure and efficient communication protocols, especially in environments vulnerable to cyber threats. Existing IoT protocols often lack sufficient security, creating a need for robust authentication and key exchange mechanisms that can resist attacks while maintaining low computational overhead. In this paper, we propose a fog-enabled network architecture integrated with IoT devices (Intra and Inter IoT device) and develop the DEAC-IoT scheme using Elliptic Curve Cryptography (ECC) for secure authentication and key agreement. Our protocol is designed to protect device-to-device communication from security threats in resource-constrained IoT environments. We validate DEAC-IoT's security through both informal analysis and formal verification using the Real-Or-Random (RoR) model, demonstrating its resistance to major attacks. Simulation via the Scyther tool confirms that private parameters remain secure throughout the protocol's execution. For practical feasibility, we implement DEAC-IoT on a Field Programmable Gate Array (FPGA) and conduct performance evaluations. The results show that our protocol surpasses existing protocols in both computational and communication efficiency, making it highly suitable for real-world IoT applications. © 2024 Elsevier Ltd
Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle systems
Dr Mohammad Abdussami, Mohd Shariq., Mauro Conti., Karan Singh., Sanjeev Kumar Dwivedi., Ruhul Amin., Mehedi Masud
Source Title: Computer Communications, Quartile: Q1, DOI Link
View abstract ⏷
Drones also called Unmanned Aerial Vehicles (UAVs) have become more prominent in several applications such as package delivery, real-time object detection, tracking, traffic monitoring, security surveillance systems, and many others. As a key member of IoT, the group of Radio Frequency IDentification (RFID) technologies is referred to as Automatic Identification and Data Capturing (AIDC). In particular, RFID technology is becoming a contactless and wireless technique used to automatically identify and track the tagged objects via radio frequency signals. It also has drawn a lot of attention among researchers, scientists, industries, and practitioners due to its broad range of real-world applications in various fields. However, RFID systems face two key concerns related to security and privacy, where an adversary performs eavesdropping, tampering, modification, and even interception of the secret information of the RFID tags, which may cause forgery and privacy problems. In contrast to security and privacy, RFID tags have very limited computational power capability. To deal with these issues, this paper puts forward an RFID-based Lightweight and Provably Secure Authentication Protocol (LPSAP) for Unmanned Aerial Vehicle Systems. The proposed protocol uses secure Physically Unclonable Functions (PUFs), Elliptic-Curve Cryptography (ECC), secure one-way hash, bitwise XOR, and concatenation operations. We use Ouafi and Phans formal security model for analyzing security and privacy features such as traceability and mutual authentication. The rigorous informal analysis is carried out which ensures that our proposed protocol achieves various security and privacy features as well as resists various known security attacks. The performance analysis demonstrates that our proposed protocol outperforms other existing protocols. In addition, Scyther and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool simulation results demonstrates that there is no security attack possible within bounds. Therefore, our proposed LPSAP protocol achieves an acceptable high level of security with the least computational, communication, and storage costs on passive RFID tags