512 446
Full Length Article
Fusion: Practice and Applications
Volume 12 , Issue 1, PP: 38-52 , 2023 | Cite this article as | XML | Html |PDF

Title

Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles

  Antony Taurshia 1 * ,   Jaspher Willsie Kathrine 2 ,   Venkatesan 3

1  Karunya Institute of Technology and Sciences, India
    (antony18@karunya.edu.in)

2  Karunya Institute of Technology and Sciences, India
    (kathrine@karunya.edu)

3  Karunya Institute of Technology and Sciences, India
    (rlvenkei_2000@karunya.edu)


Doi   :   https://doi.org/10.54216/FPA.120103

Received: January 06, 2023 Revised: April 10, 2023 Accepted: June 05, 2023

Abstract :

Smart applications came into existence with technological advancements like Software Defined Networks (SDN), Cloud computing, Network Function Virtualization (NFV), and the Internet of Things (IoT). Internet of Vehicles (IoV) is a highly dynamic application with limited tolerance to latency since a small delay can lead to drastic disasters. For efficient network and vehicle management clusters are formed in IoV. Secure key management is unavoidable to secure communication between the vehicles in the cluster. In this article, a sustainable cluster key management approach is proposed to handle the dynamic and latency-sensitive nature of IoV. Security analysis proves that the proposed approach holds secrecy in group key management. The proposed approach reduces the communication complexity to a single broadcast for re-keying. The analysis proves that the computation and storage complexity is also minimal, hence proving that the scheme is sustainable with limited resource usage and efficient for usage in latency-sensitive IoV environments.

Keywords :

secure fusion communication; internet of things; internet of vehicles; group key management; security

References :

[1] Smarandache, F., Neutrosophic set a generalization of the intuitionistic fuzzy sets. Inter. J. Pure Appl. Math., 24, 287 – 297, 2005.

[2] S. Li, “Security Requirements in IoT Architecture,” in Securing the Internet of Things, Elsevier Inc., 2017, pp. 97–108.

[3] R. Gasmi and M. Aliouat, “Vehicular Ad Hoc NETworks versus Internet of Vehicles-A Comparative View,” in Proceedings - ICNAS 2019: 4th International Conference on Networking and Advanced Systems, 2019, pp. 1–6, doi: 10.1109/ICNAS.2019.8807870.

[4] X. Duan, X. Wang, Y. Liu, and K. Zheng, “SDN enabled dual cluster head selection and adaptive clustering in 5G-VANET,” in IEEE Vehicular Technology Conference, 2016, no. December 2018, doi: 10.1109/VTCFall.2016.7881214.

[5] S. Sezer et al., “Are we ready for SDN? Implementation challenges for software-defined networks,” IEEE Commun. Mag., vol. 51, no. 7, pp. 36–43, 2013, doi: 10.1109/MCOM.2013.6553676.

[6] M. N. Mejri, N. Achir, and M. Hamdi, “A new group Diffie-Hellman key generation proposal for secure VANET communications,” in 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016, 2016, no. January, pp. 992–995, doi: 10.1109/CCNC.2016.7444925.

[7] [M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and Y. Park, “AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment,” IEEE Internet Things J., vol. 6, no. 5, pp. 8804–8817, 2019, doi: 10.1109/JIOT.2019.2923611.

[8] A. Hesham, A. Abdel-Hamid, and M. A. El-Nasr, “A dynamic key distribution protocol for PKI-based VANETs,” in IFIP Wireless Days, 2011, vol. 1, no. 1, doi: 10.1109/WD.2011.6098221.

[9] R. Muthalagu and S. Jain, “Modifying LFSR of ZUC to reduce time for key-stream generation,” J. Cyber Secur. Mobil., vol. 5, no. 4, pp. 257–268, 2016, doi: 10.13052/jcsm2245-1439.541.

[10] [M. A. Philip and V. Vaithiyanathan, “A survey on lightweight ciphers for IoT devices,” in Proceedings of 2017 IEEE International Conference on Technological Advancements in Power and Energy: Exploring Energy Solutions for an Intelligent Power Grid, TAP Energy 2017, 2018, no. December, pp. 1–4, doi: 10.1109/TAPENERGY.2017.8397271.

[11] S. Mukhopadhyay and P. Sarkar, “Application of LFSRs for parallel sequence generation in cryptologic algorithms,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, vol. 3982 LNCS, pp. 436–445, doi: 10.1007/11751595_47.

[12] A. B. F. Khan and G. Anandharaj, “A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment :,” SN Appl. Sci., vol. 1, no. 12, pp. 1–7, 2019, doi: 10.1007/s42452-019-1628-4.

[13] Y. Z. Zeng, B. K. Zhao, J. S. Su, X. Yan, and Z. Shao, “A loop-based key management scheme for wireless sensor networks,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2007, vol. 4809 LNCS, pp. 103–114.

[14] L. Zhu and Z. Zhan, “A random key management scheme for heterogeneous wireless sensor network,” 2015, doi: 10.1109/SSIC.2015.7245677.

[15] J. Jang, T. Kwon, and J. Song, “A Time-Based Key Management Protocol for,” pp. 314–328, 2007.

[16] S. Ali et al., “SGKMP: A scalable group key management protocol,” Sustain. Cities Soc., vol. 39, no. November 2017, pp. 37–42, 2018, doi: 10.1016/j.scs.2018.01.003.

[17] E. Festijo, Y. Jung, and M. Peradilla, “Software-defined security controller-based group management and end-to-end security management,” J. Ambient Intell. Humaniz. Comput., vol. 10, no. 9, pp. 3365–3382, 2019, doi: 10.1007/s12652-018-0678-6.

[18] Y. H. Kung and H. C. Hsiao, “GroupIt: Lightweight Group Key Management for Dynamic IoT Environments,” IEEE Internet Things J., vol. 5, no. 6, pp. 5155–5165, 2018, doi: 10.1109/JIOT.2018.2840321.

[19] A. Taurshia et al., “Software-defined network aided lightweight group key management for resource-constrained Internet of Things devices,” Sustain. Comput. Informatics Syst., vol. 36, no. June, p. 100807, 2022, doi: 10.1016/j.suscom.2022.100807.

[20] N. Ruan, T. Nishide, and Y. Hori, “Elliptic curve ELGamal threshold-based key management scheme against compromise of distributed RSUs for VANETs,” J. Inf. Process., vol. 20, no. 4, pp. 846–853, 2012, doi: 10.2197/ipsjjip.20.846.

[21] G. Duan, Y. Xiao, R. Ju, and H. Song, “A novel key management scheme in VANETs,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, vol. 8630 LNCS, no. PART 1, pp. 587–595, doi: 10.1007/978-3-319-11197-1_45.

[22] K. K. Chauhan, S. Kumar, and S. Kumar, “The design of a secure key management system in vehicular ad hoc networks,” in 2017 Conference on Information and Communication Technology, CICT 2017, 2018, vol. 2018-April, pp. 1–6, doi: 10.1109/INFOCOMTECH.2017.8340636.

[23] C. Gonzalez, S. M. Charfadine, O. Flauzac, and F. Nolot, “SDN-based security framework for the IoT in distributed grid,” 2016 Int. Multidiscip. Conf. Comput. Energy Sci. Split. 2016, 2016, doi: 10.1109/SpliTech.2016.7555946.

[24] O. Flauzac, C. Gonzalez, A. Hachani, and F. Nolot, “SDN Based Architecture for IoT and Improvement of the Security,” Proc. - IEEE 29th Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2015, no. February 2018, pp. 688–693, 2015, doi: 10.1109/WAINA.2015.110.

[25] M. A. Saleem et al., “Expansion of Cluster Head Stability Using Fuzzy in Cognitive Radio CR-VANET,” IEEE Access, vol. 7, pp. 173185–173195, 2019, doi: 10.1109/ACCESS.2019.2956478.

[26] S. A. Latif et al., “AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems,” Comput. Commun., vol. 181, no. August 2021, pp. 274–283, 2022, doi: 10.1016/j.comcom.2021.09.029.

[27] G. Heo, K. Chae, and I. Doh, “Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing,” IEEE Access, vol. 10, pp. 27990–28003, 2022, doi: 10.1109/ACCESS.2022.3157753.

[28] X. Shen, C. Huang, W. Pu, and D. Wang, “A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET,” Secur. Commun. Networks, vol. 2022, 2022, doi: 10.1155/2022/9779670.

[29] E. Dubrova, M. Näslund, G. Selander, and F. Lindqvist, “Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test,” Cryptogr. Commun., vol. 10, no. 2, pp. 383–399, 2018, doi: 10.1007/s12095-017-0227-8.

[30] H. Krawczyk, “LFSR-based hashing and authentication,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1994, vol. 839 LNCS, pp. 129–139, doi: 10.1007/3-540-48658-5_15.

[31] [L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari, “Ad Hoc Networks A novel batch-based group key management protocol applied to the Internet of Things,” AD HOC NETWORKS, 2013, doi: 10.1016/j.adhoc.2013.05.009.

[32] A. Mehdizadeh, F. Hashim, and M. Othman, “Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks,” J. Netw. Comput. Appl., vol. 42, pp. 59–69, 2014, doi: 10.1016/j.jnca.2014.03.013.

[33] Fabiana Meijon Fadul, “済無No Title No Title No Title,” 2019.

[34] M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref, “A secure authentication scheme for VANETs with batch verification,” Wirel. Networks, vol. 21, no. 5, pp. 1733–1743, 2015, doi: 10.1007/s11276-014-0881-0.

[35] [P. Vijayakumar, M. Azees, V. Chang, J. Deborah, and B. Balusamy, “Computationally efficient privacy-preserving authentication and key distribution techniques for vehicular ad hoc networks,” Cluster Comput., vol. 20, no. 3, pp. 2439–2450, 2017, doi: 10.1007/s10586-017-0848-x.

[36] A. T. Sherman and D. A. McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444–458, 2003, doi: 10.1109/TSE.2003.1199073.

[37] Y. Sun, M. Chen, A. Bacchus, and X. Lin, “Towards collusion-attack-resilient group key management using one-way function tree,” Comput. Networks, vol. 104, pp. 16–26, 2016, doi: 10.1016/j.comnet.2016.04.014.

[38] C. S. Manigandaa,V. D. Ambeth Kumar,G. Ragunath,R. Venkatesan,N. Senthil Kumar. "De-Noising and Segmentation of Medical Images using Neutrophilic Sets." Fusion: Practice and Applications, Vol. 11, No. 2, 2023 ,PP. 111-123.

[39] S. Hemamalini ,V. D. Ambeth Kumar ,R. Venkatesan,S. Malathi. "Relevance Mapping based CNN model with OSR-FCA Technique for Multi-label DR Classification." Fusion: Practice and Applications, Vol. 11, No. 2, 2023 ,PP. 90-110.


Cite this Article as :
Style #
MLA Antony Taurshia, Jaspher Willsie Kathrine, Venkatesan. "Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles." Fusion: Practice and Applications, Vol. 12, No. 1, 2023 ,PP. 38-52 (Doi   :  https://doi.org/10.54216/FPA.120103)
APA Antony Taurshia, Jaspher Willsie Kathrine, Venkatesan. (2023). Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles. Journal of Fusion: Practice and Applications, 12 ( 1 ), 38-52 (Doi   :  https://doi.org/10.54216/FPA.120103)
Chicago Antony Taurshia, Jaspher Willsie Kathrine, Venkatesan. "Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles." Journal of Fusion: Practice and Applications, 12 no. 1 (2023): 38-52 (Doi   :  https://doi.org/10.54216/FPA.120103)
Harvard Antony Taurshia, Jaspher Willsie Kathrine, Venkatesan. (2023). Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles. Journal of Fusion: Practice and Applications, 12 ( 1 ), 38-52 (Doi   :  https://doi.org/10.54216/FPA.120103)
Vancouver Antony Taurshia, Jaspher Willsie Kathrine, Venkatesan. Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles. Journal of Fusion: Practice and Applications, (2023); 12 ( 1 ): 38-52 (Doi   :  https://doi.org/10.54216/FPA.120103)
IEEE Antony Taurshia, Jaspher Willsie Kathrine, Venkatesan, Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles, Journal of Fusion: Practice and Applications, Vol. 12 , No. 1 , (2023) : 38-52 (Doi   :  https://doi.org/10.54216/FPA.120103)