Knowledge Agora



Similar Articles

Title Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication
ID_Doc 45598
Authors Rathore, MM; Jararweh, Y; Raheel, M; Paul, A
Title Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication
Year 2019
Published
Abstract The smart city is established through continuous analytics of the city data that is harvested from various smart systems and IoT sensors deployed in the city such as, smart homes, buildings, and parking, smart pollution monitoring, transportation sensors, etc., which generates continuous streams of high-speed data. Lack of security and privacy in the smart city system while communicating with the central analysis building gives the control of the city to the cyber criminals. However, offering privacy and security for such a continuous high-speed communication requires an efficient security model without introducing any delay in the real-time communication of the smart city. Thus, to cater with these challenges, in this paper, we proposed an efficient authentication and key management model among the smart city entities such as, remote smart systems (RSS) (i.e., smart homes, smart parkings, smart health systems, environment control system, etc.), remote users (U), and central city analysis building. First, every remote system and citizen have to be registered with the system through secure registration phase. Later, the session keys are generated and shared among the smart city entities that are used in secure routine communication. Moreover, the protocol is enabled with an efficient secure communication mechanism with the ability of parallel processing that makes it possible to work in a real-time environment. Finally, the security of the proposed model is verified informally through mathematical analysis and formally by implementing it using AVISPA tool (Automated Validation of Internet Security Protocols and Applications). Also, the proposed protocol is evaluated in terms of its efficiency and capability to work in a real-time environment. The results show that the protocol is secure against known cyber-attacks, is efficient, and faster than the existing schemes.
PDF

Similar Articles

ID Score Article
36219 Rathore, MM; Paul, A; Ahmad, A; Chilamkurti, N; Hong, WH; Seo, H Real-time secure communication for Smart City in high-speed Big Data environment(2018)
37922 Gupta, S; Alharbi, F; Alshahrani, R; Arya, PK; Vyas, S; Elkamchouchi, DH; Soufiene, B Secure and Lightweight Authentication Protocol for Privacy Preserving Communications in Smart City Applications(2023)Sustainability, 15, 6
37028 AlEisa, HN Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City(2022)International Journal Of Computer Science And Network Security, 22.0, 2
36412 Alfouzan, FA; Kim, K; Alzahrani, NM An Efficient Framework for Securing the Smart City Communication Networks(2022)Sensors, 22, 8
39765 Reddy, AG; Suresh, D; Phaneendra, K; Shin, JS; Odelu, V Provably secure pseudo-identity based device authentication for smart cities environment(2018)
36102 Bera, B; Das, AK; Balzano, W; Medaglia, CM On the design of biometric-based user authentication protocol in smart city environment(2020)
40588 Karaturk, E; Kocyigit, E Security Concepts in Smart Cities(2020)
42743 Toh, CK Security for smart cities(2020)Iet Smart Cities, 2, 2
43398 Asif, M; Aziz, Z; Bin Ahmad, M; Khalid, A; Waris, HA; Gilani, A Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities(2022)Sensors, 22, 7
44136 Li, N; Liu, DX; Nepal, S Lightweight Mutual Authentication for IoT and Its Applications(2017)Ieee Transactions On Sustainable Computing, 2, 4
Scroll