TY - JOUR
T1 - Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC
AU - Kumar, Vinod
AU - Hassan, Fauzia
AU - Kumar Nishad, Anil
AU - Prasad, Ramakant
AU - Gupta, Pooja
AU - Amir, Mohammad
AU - Ahmad, Furkan
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2024/12/5
Y1 - 2024/12/5
N2 - Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.
AB - Digital twins (DT) are digital copies of tangible assets and operations utilised in some industries to improve efficiency and foster creativity, accuracy, and decision making. Although beneficial, they have brought up some of the most critical security issues due to the complexity of their implementation and how they are incorporated into strategic systems. In this study, the security aspects of DTs that deal with challenges relating to data integrity, privacy, and secrecy are covered: potential vulnerabilities. For example, data used for malicious reasons, gaining unauthorised access, and interference with authorised network activities are considered in the planned attempt. In this study, the authors provide a secure and efficient protocol based on elliptic curve cryptography (ECC) to address security, privacy, and associated concerns in vehicular digital twins (VDT) networks. In addition, the paper discusses formal and informal security analysis based on the random oracle model, Burrows-Abadi Needham (BAN) logic, and Scyther verification tool. The proposed protocol ensures security, privacy, and other related security attacks and attributes in VDT networks. Furthermore, in the performance analysis section, we compare the communication and computation costs of the proposed protocol and related protocols. The proposed framework is secure and efficient in VDT network systems. Our analysis shows that the proposed protocol may apply to future VDT networks.
KW - Vehicular communication
KW - digital twin
KW - elliptic curve cryptography
KW - random oracle model
KW - security and privacy
UR - http://www.scopus.com/inward/record.url?scp=85211623727&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2024.3511654
DO - 10.1109/ACCESS.2024.3511654
M3 - Article
AN - SCOPUS:85211623727
SN - 2169-3536
VL - 12
SP - 194352
EP - 194366
JO - IEEE Access
JF - IEEE Access
ER -