Elliptic Curve Cryptography for Security in Connected Vehicles

被引:1
|
作者
Genc, Yasin [1 ]
Habek, Muhammed [1 ]
Aytas, Nilay [2 ]
Akkoc, Ahmet [1 ]
Afacan, Erkan [1 ]
Yazgan, Erdem [3 ]
机构
[1] Gazi Univ, Elekt Elekt Muhendisligi Bolumu, Ankara, Turkey
[2] Kirikkale Univ, Elekt Elekt Muhendisligi Bolumu, Kirikkale, Turkey
[3] TED Univ, Elekt Elekt Muhendisligi Bolumu, Ankara, Turkey
来源
2022 30TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU | 2022年
关键词
connected vehicles; vehicular ad-hoc network; elliptic curve cryptography; privacy; security;
D O I
10.1109/SIU55565.2022.9864762
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The concept of a connected vehicle refers to the linking of vehicles to each other and to other things. Today, developments in the Internet of Things (IoT) and 5G have made a significant contribution to connected vehicle technology. In addition to many positive contributions, connected vehicle technology also brings with it many security-related problems. In this study, a digital signature algorithm based on elliptic curve cryptography is proposed to verify the message and identity sent to the vehicles. In the proposed model, with the anonymous identification given to the vehicle by the central unit, the vehicle is prevented from being detected by other vehicles and third parties. Thus, even if the personal data produced in the vehicles is shared, it cannot be found which vehicle it belongs to.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [2] The advantages of elliptic curve cryptography for wireless security
    Lauter, K
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67
  • [3] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
    Pandey, Jai Gopal
    Mitharwal, Chhavi
    Karmakar, Abhijit
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
  • [4] Next generation security for wireless: elliptic curve cryptography
    Vanstone, SA
    COMPUTERS & SECURITY, 2003, 22 (05) : 412 - 415
  • [5] Elliptic Curve Cryptography with Security System in Wireless Sensor Networks
    Huang, Xu
    Sharma, Dharmendra
    IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES, VOL 5, 2010, 1285 : 519 - 531
  • [6] TEXCEL: text encryption with elliptic curve cryptography for enhanced security
    P. L. Sharma
    Shalini Gupta
    Himanshu Monga
    Anand Nayyar
    Kritika Gupta
    Arun Kumar Sharma
    Multimedia Tools and Applications, 2025, 84 (13) : 11503 - 11531
  • [7] DES Algorithm Security Fortification Using Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwa
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
  • [8] Improoved MANET security using Elliptic Curve Cryptography and EAACK
    Nikam, Pranjali Deepak
    Raut, Vanita
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1125 - 1129
  • [9] Security in Data Forwarding Through Elliptic Curve Cryptography in Cloud
    Divya, S. V.
    Shaji, R. S.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1083 - 1088
  • [10] Lightweight Cryptography for Connected Vehicles Communication Security on Edge Devices
    Boubaker, Sahbi
    Alsubaei, Faisal S.
    Said, Yahia
    Ahmed, Hossam E.
    ELECTRONICS, 2023, 12 (19)