AKAP-IoV: Facilitating an intelligent transportation infrastructure

Internet of VehiclesIntelligent transport systems embedded with latest technology is the future of automotive industry and can revolutionise the very infrastructure and architecture of transportation. The principles of intelligent transportation systems have manifested in the development of Internet of vehicles (IoV), a novel technological network that enables autonomous and connected mobile commutation facility. Dr Sriramulu Bojjagani, Assistant Professor, Department of Computer Science and Engineering, has published a paper on this seminal topic titled “Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems” in the prestigious journal, IEEE Transactions on Intelligent Transport Systems (Q1 journal) having an Impact factor of 9.551. The paper highlights the development and significance of the pioneering AKAP-IoV system in successfully tackling cyber threats and security vulnerabilities.

Abstract

Intelligent transport systems amalgamated with advanced technologies are an important element of the automotive industry, including critical infrastructure and transportation. Internet of Vehicles (IoV) is the modern technological framework designed for intelligent transportation. IoV creates a network of information relations among vehicles, thus contributing to reduced congestion, roadside infrastructure, driver/traveller safety, and traffic efficiency through wireless communication and sensing technology. However, a significant challenge in IoV applications is security, as criminals could potentially exploit these applications. Despite increasing industry awareness, the potential danger posed by security vulnerabilities and cyber threats remains high. In this study, we have designed a new system called AKAP-IoV, which supports secure communication, mutual authentication, and key management among vehicles, roadside units, and fog and cloud servers. AKAP-IoV was tested and verified using Scyther and Tamarin to ensure its resistance to cyber threats. Furthermore, we conducted a formal security analysis using the Real-or-Random (RoR) oracle model to assess security properties logically. In addition, a detailed, comprehensive comparative study was considered to evaluate the performance, functionality, efficiency, and security features supported by AKAP-IoV compared to those of recently developed schemes.

Read full article

Leave a Reply

Your email address will not be published. Required fields are marked *