Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC
Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implement...
Gespeichert in:
Veröffentlicht in: | IEEE access 2024, Vol.12, p.194352-194366 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 194366 |
---|---|
container_issue | |
container_start_page | 194352 |
container_title | IEEE access |
container_volume | 12 |
creator | Kumar, Vinod Hassan, Fauzia Kumar Nishad, Anil Prasad, Ramakant Gupta, Pooja Amir, Mohammad Ahmad, Furkan |
description | Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks. |
doi_str_mv | 10.1109/ACCESS.2024.3511654 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10778490</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10778490</ieee_id><doaj_id>oai_doaj_org_article_0944fc62dae441bf8db18bd3b7235f10</doaj_id><sourcerecordid>3149573022</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-2ed269f96b78a7d3eaa9d488dcda3d57a7f62353b453361aebf39dfe52e423503</originalsourceid><addsrcrecordid>eNpNUctOwzAQjBBIVKVfAAdLnFv8ysNHFFqoVMGhj6vlxOviUmKwU1X8PQ6pUPeyq9HM7GonSW4JnhCCxcNjWU6XywnFlE9YSkiW8otkQEkmxixl2eXZfJ2MQtjhWEWE0nyQbJ4g2G2DnEFLqA8ekGo0mhpjawtNi2ZefcLR-Q9knEcbeLf1Ya88erJb26o9Wh1tg16h7SgBrYNttmhaljfJlVH7AKNTHybr2XRVvowXb8_z8nExrmkh2jEFTTNhRFblhco1A6WE5kWha62YTnOVm4zGwyueMpYRBZVhQhtIKfCIYzZM5r2vdmonv7z9VP5HOmXlH-D8Virf2noPEgvOTZ1RrYBzUplCV6SoNKvy6GRI53Xfe315932A0MqdO_gmni8Z4fFbDFMaWaxn1d6F4MH8byVYdnnIPg_Z5SFPeUTVXa-yAHCmyPOCC8x-AaiZhcA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3149573022</pqid></control><display><type>article</type><title>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Kumar, Vinod ; Hassan, Fauzia ; Kumar Nishad, Anil ; Prasad, Ramakant ; Gupta, Pooja ; Amir, Mohammad ; Ahmad, Furkan</creator><creatorcontrib>Kumar, Vinod ; Hassan, Fauzia ; Kumar Nishad, Anil ; Prasad, Ramakant ; Gupta, Pooja ; Amir, Mohammad ; Ahmad, Furkan</creatorcontrib><description>Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3511654</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Computational modeling ; Curves ; Data privacy ; digital twin ; Digital twins ; Elliptic curve cryptography ; Networks ; Privacy ; Protocols ; random oracle model ; Real-time systems ; Secrecy aspects ; Security ; security and privacy ; Security aspects ; STEM ; Vehicular communication</subject><ispartof>IEEE access, 2024, Vol.12, p.194352-194366</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c289t-2ed269f96b78a7d3eaa9d488dcda3d57a7f62353b453361aebf39dfe52e423503</cites><orcidid>0000-0003-3432-4217 ; 0009-0002-3862-1163 ; 0000-0002-1176-1759 ; 0009-0000-5090-5738 ; 0009-0000-8595-5647</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10778490$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Kumar, Vinod</creatorcontrib><creatorcontrib>Hassan, Fauzia</creatorcontrib><creatorcontrib>Kumar Nishad, Anil</creatorcontrib><creatorcontrib>Prasad, Ramakant</creatorcontrib><creatorcontrib>Gupta, Pooja</creatorcontrib><creatorcontrib>Amir, Mohammad</creatorcontrib><creatorcontrib>Ahmad, Furkan</creatorcontrib><title>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</title><title>IEEE access</title><addtitle>Access</addtitle><description>Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.</description><subject>Authentication</subject><subject>Computational modeling</subject><subject>Curves</subject><subject>Data privacy</subject><subject>digital twin</subject><subject>Digital twins</subject><subject>Elliptic curve cryptography</subject><subject>Networks</subject><subject>Privacy</subject><subject>Protocols</subject><subject>random oracle model</subject><subject>Real-time systems</subject><subject>Secrecy aspects</subject><subject>Security</subject><subject>security and privacy</subject><subject>Security aspects</subject><subject>STEM</subject><subject>Vehicular communication</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUctOwzAQjBBIVKVfAAdLnFv8ysNHFFqoVMGhj6vlxOviUmKwU1X8PQ6pUPeyq9HM7GonSW4JnhCCxcNjWU6XywnFlE9YSkiW8otkQEkmxixl2eXZfJ2MQtjhWEWE0nyQbJ4g2G2DnEFLqA8ekGo0mhpjawtNi2ZefcLR-Q9knEcbeLf1Ya88erJb26o9Wh1tg16h7SgBrYNttmhaljfJlVH7AKNTHybr2XRVvowXb8_z8nExrmkh2jEFTTNhRFblhco1A6WE5kWha62YTnOVm4zGwyueMpYRBZVhQhtIKfCIYzZM5r2vdmonv7z9VP5HOmXlH-D8Virf2noPEgvOTZ1RrYBzUplCV6SoNKvy6GRI53Xfe315932A0MqdO_gmni8Z4fFbDFMaWaxn1d6F4MH8byVYdnnIPg_Z5SFPeUTVXa-yAHCmyPOCC8x-AaiZhcA</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Kumar, Vinod</creator><creator>Hassan, Fauzia</creator><creator>Kumar Nishad, Anil</creator><creator>Prasad, Ramakant</creator><creator>Gupta, Pooja</creator><creator>Amir, Mohammad</creator><creator>Ahmad, Furkan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-3432-4217</orcidid><orcidid>https://orcid.org/0009-0002-3862-1163</orcidid><orcidid>https://orcid.org/0000-0002-1176-1759</orcidid><orcidid>https://orcid.org/0009-0000-5090-5738</orcidid><orcidid>https://orcid.org/0009-0000-8595-5647</orcidid></search><sort><creationdate>2024</creationdate><title>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</title><author>Kumar, Vinod ; Hassan, Fauzia ; Kumar Nishad, Anil ; Prasad, Ramakant ; Gupta, Pooja ; Amir, Mohammad ; Ahmad, Furkan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-2ed269f96b78a7d3eaa9d488dcda3d57a7f62353b453361aebf39dfe52e423503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Authentication</topic><topic>Computational modeling</topic><topic>Curves</topic><topic>Data privacy</topic><topic>digital twin</topic><topic>Digital twins</topic><topic>Elliptic curve cryptography</topic><topic>Networks</topic><topic>Privacy</topic><topic>Protocols</topic><topic>random oracle model</topic><topic>Real-time systems</topic><topic>Secrecy aspects</topic><topic>Security</topic><topic>security and privacy</topic><topic>Security aspects</topic><topic>STEM</topic><topic>Vehicular communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumar, Vinod</creatorcontrib><creatorcontrib>Hassan, Fauzia</creatorcontrib><creatorcontrib>Kumar Nishad, Anil</creatorcontrib><creatorcontrib>Prasad, Ramakant</creatorcontrib><creatorcontrib>Gupta, Pooja</creatorcontrib><creatorcontrib>Amir, Mohammad</creatorcontrib><creatorcontrib>Ahmad, Furkan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumar, Vinod</au><au>Hassan, Fauzia</au><au>Kumar Nishad, Anil</au><au>Prasad, Ramakant</au><au>Gupta, Pooja</au><au>Amir, Mohammad</au><au>Ahmad, Furkan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>194352</spage><epage>194366</epage><pages>194352-194366</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3511654</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-3432-4217</orcidid><orcidid>https://orcid.org/0009-0002-3862-1163</orcidid><orcidid>https://orcid.org/0000-0002-1176-1759</orcidid><orcidid>https://orcid.org/0009-0000-5090-5738</orcidid><orcidid>https://orcid.org/0009-0000-8595-5647</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2024, Vol.12, p.194352-194366 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_10778490 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Authentication Computational modeling Curves Data privacy digital twin Digital twins Elliptic curve cryptography Networks Privacy Protocols random oracle model Real-time systems Secrecy aspects Security security and privacy Security aspects STEM Vehicular communication |
title | Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T13%3A23%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Design%20of%20Secure%20and%20Efficient%20Framework%20for%20Vehicular%20Digital%20Twin%20Networks%20Using%20ECC&rft.jtitle=IEEE%20access&rft.au=Kumar,%20Vinod&rft.date=2024&rft.volume=12&rft.spage=194352&rft.epage=194366&rft.pages=194352-194366&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3511654&rft_dat=%3Cproquest_ieee_%3E3149573022%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3149573022&rft_id=info:pmid/&rft_ieee_id=10778490&rft_doaj_id=oai_doaj_org_article_0944fc62dae441bf8db18bd3b7235f10&rfr_iscdi=true |