Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
Jindal Global Business School, O. P. Jindal Global University, Haryana 131001, India.
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India.ORCID iD: 0000-0002-5196-9589
Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248 002, India.ORCID iD: 0000-0001-9898-0921
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. School of Electrical and Data Engineering, University Technology Sydney, Australia; Department of Computer Science and Technology, Fuzhou University, Fuzhou 350116, China.ORCID iD: 0000-0003-1902-9877
2021 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 9, p. 7727-7744Article in journal (Refereed) Published
Abstract [en]

Secure access of the real-time data from the IoT smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for Big Data collection in Internet of Things (IoT)-based Intelligent Transportation System (ITS). To deal with this important issue, we design a new three-factor user authentication scheme, called UAP-BCIoT, which relies on Elliptic Curve Cryptography (ECC). The mutual authentication between the user and an IoT device happens via the semi-trusted Cloud-Gateway (CG) node in UAP-BCIoT. UAP-BCIoT supports several functionality features needed for IoT-based ITS environment including IoT smart device credential validation and Big Data analytics. A detailed security analysis is conducted based on the defined threat model to show that UAP-BCIoT is resilient against many known attacks. A thorough comparative study reveals that UAP-BCIoT supports better security, offers various functionality attributes, and also provides similar costs in communication as well computation as compared to other relevant schemes Finally, the practical demonstration of the proposed UAP-BCIoT is also provided to measure its impact on the network performance parameters.

Place, publisher, year, edition, pages
IEEE, 2021. Vol. 8, no 9, p. 7727-7744
Keywords [en]
Secure Big Data collection, IoT-based ITS, user authentication, key agreement, formal security, AVISPA, NS2 simulation study
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
URN: urn:nbn:se:ltu:diva-81862DOI: 10.1109/JIOT.2020.3040938ISI: 000642765500050Scopus ID: 2-s2.0-85102970509OAI: oai:DiVA.org:ltu-81862DiVA, id: diva2:1506732
Note

Validerad;2021;Nivå 2;2021-05-10 (johcin)

Available from: 2020-12-04 Created: 2020-12-04 Last updated: 2023-09-14Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Vasilakos, Athanasios V.

Search in DiVA

By author/editor
Das, Ashok KumarWazid, MohammadVasilakos, Athanasios V.
By organisation
Computer Science
In the same journal
IEEE Internet of Things Journal
Media and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 101 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf