Visible to the public Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks

TitleSecurity Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
Publication TypeConference Paper
Year of Publication2021
AuthorsShamshad, Salman, Obaidat, Mohammad S., Minahil, Saleem, Muhammad Asad, Shamshad, Usman, Mahmood, Khalid
Conference Name2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS)
Date Publishedmar
KeywordsAd Hoc Network Security, Ad hoc networks, authentication protocol, compositionality, intelligent transportation systems, Internet of Things, Metrics, protocol, Protocols, pubcrawl, resilience, Resiliency, security, security protocol, Sensors
AbstractThe maturity of intelligent transportation system, cloud computing and Internet of Things (IoT) technology has encouraged the rapid growth of vehicular ad-hoc networks (VANETs). Currently, vehicles are supposed to carry relatively more storage, on board computing facilities, increased sensing power and communication systems. In order to cope with real world demands such as low latency, low storage cost, mobility, etc., for the deployment of VANETs, numerous attempts have been taken to integrate fog-computing with VANETs. In the recent past, Ma et al. (IEEE Internet of Things, pp 2327-4662, 10. 1109/JIOT.2019.2902840) designed "An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks". Ma et al. claimed that their protocol offers secure communication in fog-based VANETs and is resilient against several security attacks. However, this comment demonstrates that their scheme is defenseless against vehicle-user impersonation attack and reveals secret keys of vehicle-user and fog-node. Moreover, it fails to offer vehicle-user anonymity and has inefficient login phase. This paper also gives some essential suggestions on strengthening resilience of the scheme, which are overlooked by Ma et al.
DOI10.1109/ICAIS50930.2021.9395790
Citation Keyshamshad_security_2021