Light Weight Authentication and Key Establishment Protocol for Smart Vehicles Communication in Smart City

  • Venkatasamy SureshkumarEmail author
  • S. Anandhi
  • R. Madhumathi
  • N. Selvarajan
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1122)


The smart vehicular technology in the smart city employs intelligent commitments to the passengers to enhance traffic efficiency and safety with more enjoyable riding in the driving environment. However, the tremendous growth of wireless communication technology makes the smart vehicle communication more vulnerable to potential security attacks. Authentication and key agreement protocol is the basic requirement to establish a secure communication among vehicles in the open network. Though several security schemes have been designed in the literature to establish communication among the smart vehicles, each of them have their own limitations such as requirement of heavy computation, limited to maximum of three entities and so on. In this paper, we design a lightweight four party authentication protocol that employs the strong reinforcement of fog and cloud servers. The formal proof of correctness of the designed protocol has been provided using GNY logic. The protocol is compared with the existing related protocols in the aspects security features, communication cost, computational cost and storage cost. In all these aspects, our protocol outperforms the others’ protocol.


Smart vehicle Fog computing Authentication GNY logic 


  1. 1.
    Anandhi, S., Anitha, R., Sureshkumar, V.: An automatic rfid reader-to-reader delegation protocol for scm in cloud computing environment. J. Supercomput. 74(7), 3148–3167 (2018)CrossRefGoogle Scholar
  2. 2.
    Anandhi, S., Anitha, R., Sureshkumar, V.: IoT enabled RFID authentication and secure object tracking system for smart logistics. Wireless Pers. Commun. 104(2), 543–560 (2019)CrossRefGoogle Scholar
  3. 3.
    Dang, L., et al.: Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks. Int. J. Distrib. Sens. Netw. 14(4), 1–16 (2018)CrossRefGoogle Scholar
  4. 4.
    Dua, A., Kumar, N., Das, A.K., Susilo, W.: Secure message communication protocol among vehicles in smart city. IEEE Trans. Veh. Technol. 67(5), 4359–4373 (2017)CrossRefGoogle Scholar
  5. 5.
    Dua, A., Kumar, N., Singh, M., Obaidat, M.S., Hsiao, K.F.: Secure message communication among vehicles using elliptic curve cryptography in smart cities. In: International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–6. IEEE (2016)Google Scholar
  6. 6.
    Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Computer Society Symposium on Research in Security and Privacy, pp. 234–248. IEEE (1990)Google Scholar
  7. 7.
    Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 1–14 (2018)Google Scholar
  8. 8.
    Liu, Y., Wang, Y., Chang, G.: Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. 18(10), 2740–2749 (2017)CrossRefGoogle Scholar
  9. 9.
    Lu, H., Li, J., Guizani, M.: A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: Conference on Computing, Communications and Applications, pp. 345–350. IEEE (2012)Google Scholar
  10. 10.
    Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1229–1237. IEEE (2008)Google Scholar
  11. 11.
    Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6, 8065–8075 (2019)CrossRefGoogle Scholar
  12. 12.
    Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRefGoogle Scholar
  13. 13.
    Sureshkumar, V., Amin, R., Anitha, R.: An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. Int. J. Commun. Syst. 30(17), e3358 (2017)CrossRefGoogle Scholar
  14. 14.
    Sureshkumar, V., Amin, R., Anitha, R.: A robust mutual authentication scheme for session initiation protocol with key establishment. Peer-to-Peer Netw. Appl. 11(5), 900–916 (2018)CrossRefGoogle Scholar
  15. 15.
    Sureshkumar, V., Amin, R., Vijaykumar, V., Rajasekar, S.: Robust secure communication protocol for smart healthcare system with FPGA implementation. Future Gener. Comput. Syst. 100, 938–951 (2019)CrossRefGoogle Scholar
  16. 16.
    Sureshkumar, V., Ramalingam, A., Anandhi, S.: Analysis of accountability property in payment systems using strand space model. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martínez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 424–437. Springer, Cham (2015). Scholar
  17. 17.
    Wazid, M., Bagga, P., Das, A.K., Shetty, S., Rodrigues, J.J., Park, Y.H.: AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J. 6, 8804–8817 (2019)CrossRefGoogle Scholar
  18. 18.
    Wazid, M., et al.: Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access 5, 14966–14980 (2017)CrossRefGoogle Scholar
  19. 19.
    Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. 65(8), 2562–2574 (2015)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in vanets. IEEE Trans. Intell. Transp. Syst. 18(3), 516–526 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Venkatasamy Sureshkumar
    • 1
    Email author
  • S. Anandhi
    • 1
  • R. Madhumathi
    • 1
  • N. Selvarajan
    • 1
  1. 1.Department of Applied Mathematics and Computational SciencesPSG College of TechnologyCoimbatoreIndia

Personalised recommendations