Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC

Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implement...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2024, Vol.12, p.194352-194366
Hauptverfasser: Kumar, Vinod, Hassan, Fauzia, Kumar Nishad, Anil, Prasad, Ramakant, Gupta, Pooja, Amir, Mohammad, Ahmad, Furkan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 194366
container_issue
container_start_page 194352
container_title IEEE access
container_volume 12
creator Kumar, Vinod
Hassan, Fauzia
Kumar Nishad, Anil
Prasad, Ramakant
Gupta, Pooja
Amir, Mohammad
Ahmad, Furkan
description Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.
doi_str_mv 10.1109/ACCESS.2024.3511654
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10778490</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10778490</ieee_id><doaj_id>oai_doaj_org_article_0944fc62dae441bf8db18bd3b7235f10</doaj_id><sourcerecordid>3149573022</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-2ed269f96b78a7d3eaa9d488dcda3d57a7f62353b453361aebf39dfe52e423503</originalsourceid><addsrcrecordid>eNpNUctOwzAQjBBIVKVfAAdLnFv8ysNHFFqoVMGhj6vlxOviUmKwU1X8PQ6pUPeyq9HM7GonSW4JnhCCxcNjWU6XywnFlE9YSkiW8otkQEkmxixl2eXZfJ2MQtjhWEWE0nyQbJ4g2G2DnEFLqA8ekGo0mhpjawtNi2ZefcLR-Q9knEcbeLf1Ya88erJb26o9Wh1tg16h7SgBrYNttmhaljfJlVH7AKNTHybr2XRVvowXb8_z8nExrmkh2jEFTTNhRFblhco1A6WE5kWha62YTnOVm4zGwyueMpYRBZVhQhtIKfCIYzZM5r2vdmonv7z9VP5HOmXlH-D8Virf2noPEgvOTZ1RrYBzUplCV6SoNKvy6GRI53Xfe315932A0MqdO_gmni8Z4fFbDFMaWaxn1d6F4MH8byVYdnnIPg_Z5SFPeUTVXa-yAHCmyPOCC8x-AaiZhcA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3149573022</pqid></control><display><type>article</type><title>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Kumar, Vinod ; Hassan, Fauzia ; Kumar Nishad, Anil ; Prasad, Ramakant ; Gupta, Pooja ; Amir, Mohammad ; Ahmad, Furkan</creator><creatorcontrib>Kumar, Vinod ; Hassan, Fauzia ; Kumar Nishad, Anil ; Prasad, Ramakant ; Gupta, Pooja ; Amir, Mohammad ; Ahmad, Furkan</creatorcontrib><description>Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3511654</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Computational modeling ; Curves ; Data privacy ; digital twin ; Digital twins ; Elliptic curve cryptography ; Networks ; Privacy ; Protocols ; random oracle model ; Real-time systems ; Secrecy aspects ; Security ; security and privacy ; Security aspects ; STEM ; Vehicular communication</subject><ispartof>IEEE access, 2024, Vol.12, p.194352-194366</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c289t-2ed269f96b78a7d3eaa9d488dcda3d57a7f62353b453361aebf39dfe52e423503</cites><orcidid>0000-0003-3432-4217 ; 0009-0002-3862-1163 ; 0000-0002-1176-1759 ; 0009-0000-5090-5738 ; 0009-0000-8595-5647</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10778490$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Kumar, Vinod</creatorcontrib><creatorcontrib>Hassan, Fauzia</creatorcontrib><creatorcontrib>Kumar Nishad, Anil</creatorcontrib><creatorcontrib>Prasad, Ramakant</creatorcontrib><creatorcontrib>Gupta, Pooja</creatorcontrib><creatorcontrib>Amir, Mohammad</creatorcontrib><creatorcontrib>Ahmad, Furkan</creatorcontrib><title>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</title><title>IEEE access</title><addtitle>Access</addtitle><description>Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.</description><subject>Authentication</subject><subject>Computational modeling</subject><subject>Curves</subject><subject>Data privacy</subject><subject>digital twin</subject><subject>Digital twins</subject><subject>Elliptic curve cryptography</subject><subject>Networks</subject><subject>Privacy</subject><subject>Protocols</subject><subject>random oracle model</subject><subject>Real-time systems</subject><subject>Secrecy aspects</subject><subject>Security</subject><subject>security and privacy</subject><subject>Security aspects</subject><subject>STEM</subject><subject>Vehicular communication</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUctOwzAQjBBIVKVfAAdLnFv8ysNHFFqoVMGhj6vlxOviUmKwU1X8PQ6pUPeyq9HM7GonSW4JnhCCxcNjWU6XywnFlE9YSkiW8otkQEkmxixl2eXZfJ2MQtjhWEWE0nyQbJ4g2G2DnEFLqA8ekGo0mhpjawtNi2ZefcLR-Q9knEcbeLf1Ya88erJb26o9Wh1tg16h7SgBrYNttmhaljfJlVH7AKNTHybr2XRVvowXb8_z8nExrmkh2jEFTTNhRFblhco1A6WE5kWha62YTnOVm4zGwyueMpYRBZVhQhtIKfCIYzZM5r2vdmonv7z9VP5HOmXlH-D8Virf2noPEgvOTZ1RrYBzUplCV6SoNKvy6GRI53Xfe315932A0MqdO_gmni8Z4fFbDFMaWaxn1d6F4MH8byVYdnnIPg_Z5SFPeUTVXa-yAHCmyPOCC8x-AaiZhcA</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Kumar, Vinod</creator><creator>Hassan, Fauzia</creator><creator>Kumar Nishad, Anil</creator><creator>Prasad, Ramakant</creator><creator>Gupta, Pooja</creator><creator>Amir, Mohammad</creator><creator>Ahmad, Furkan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-3432-4217</orcidid><orcidid>https://orcid.org/0009-0002-3862-1163</orcidid><orcidid>https://orcid.org/0000-0002-1176-1759</orcidid><orcidid>https://orcid.org/0009-0000-5090-5738</orcidid><orcidid>https://orcid.org/0009-0000-8595-5647</orcidid></search><sort><creationdate>2024</creationdate><title>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</title><author>Kumar, Vinod ; Hassan, Fauzia ; Kumar Nishad, Anil ; Prasad, Ramakant ; Gupta, Pooja ; Amir, Mohammad ; Ahmad, Furkan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-2ed269f96b78a7d3eaa9d488dcda3d57a7f62353b453361aebf39dfe52e423503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Authentication</topic><topic>Computational modeling</topic><topic>Curves</topic><topic>Data privacy</topic><topic>digital twin</topic><topic>Digital twins</topic><topic>Elliptic curve cryptography</topic><topic>Networks</topic><topic>Privacy</topic><topic>Protocols</topic><topic>random oracle model</topic><topic>Real-time systems</topic><topic>Secrecy aspects</topic><topic>Security</topic><topic>security and privacy</topic><topic>Security aspects</topic><topic>STEM</topic><topic>Vehicular communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumar, Vinod</creatorcontrib><creatorcontrib>Hassan, Fauzia</creatorcontrib><creatorcontrib>Kumar Nishad, Anil</creatorcontrib><creatorcontrib>Prasad, Ramakant</creatorcontrib><creatorcontrib>Gupta, Pooja</creatorcontrib><creatorcontrib>Amir, Mohammad</creatorcontrib><creatorcontrib>Ahmad, Furkan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumar, Vinod</au><au>Hassan, Fauzia</au><au>Kumar Nishad, Anil</au><au>Prasad, Ramakant</au><au>Gupta, Pooja</au><au>Amir, Mohammad</au><au>Ahmad, Furkan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>194352</spage><epage>194366</epage><pages>194352-194366</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3511654</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-3432-4217</orcidid><orcidid>https://orcid.org/0009-0002-3862-1163</orcidid><orcidid>https://orcid.org/0000-0002-1176-1759</orcidid><orcidid>https://orcid.org/0009-0000-5090-5738</orcidid><orcidid>https://orcid.org/0009-0000-8595-5647</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2024, Vol.12, p.194352-194366
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_10778490
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Authentication
Computational modeling
Curves
Data privacy
digital twin
Digital twins
Elliptic curve cryptography
Networks
Privacy
Protocols
random oracle model
Real-time systems
Secrecy aspects
Security
security and privacy
Security aspects
STEM
Vehicular communication
title Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T13%3A23%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Design%20of%20Secure%20and%20Efficient%20Framework%20for%20Vehicular%20Digital%20Twin%20Networks%20Using%20ECC&rft.jtitle=IEEE%20access&rft.au=Kumar,%20Vinod&rft.date=2024&rft.volume=12&rft.spage=194352&rft.epage=194366&rft.pages=194352-194366&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3511654&rft_dat=%3Cproquest_ieee_%3E3149573022%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3149573022&rft_id=info:pmid/&rft_ieee_id=10778490&rft_doaj_id=oai_doaj_org_article_0944fc62dae441bf8db18bd3b7235f10&rfr_iscdi=true