A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles

被引:16
作者
Ullah, Insaf [1 ]
Khan, Muhammad Asghar [1 ,2 ]
Kumar, Neeraj [3 ,4 ,5 ,6 ]
Abdullah, Ako Muhammad [7 ,8 ]
AlSanad, Abeer Abdulaziz [9 ]
Noor, Fazal [10 ]
机构
[1] Hamdard Inst Engn & Technol, Islamabad 44000, Pakistan
[2] Prince Sultan Univ, Smart Syst Engn Lab, Riyadh 11432, Saudi Arabia
[3] Thapar Inst Engn & Technol, CSED, Patiala 250002, India
[4] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun 250002, India
[5] Lebanese Amer Univ, Dept Elect & Comp Engn, Beirut, Lebanon
[6] King Abdulaziz Univ, Fac Comp & IT, Jeddah, Saudi Arabia
[7] Univ Sulaimani, Coll Basic Educ, Comp Sci Dept, Sulaimani 00964, Iraq
[8] Univ Coll Goizha, Dept Informat Technol, Sulaimaniyah 00964, Iraq
[9] Imam Mohammad Ibn Saud Islamic Univ, Coll Comp & informat Sci, Informat Syst Dept, Riyadh 11432, Saudi Arabia
[10] Islamic Univ Madinah, Fac Comp & Informat Syst, Madinah 400411, Saudi Arabia
关键词
Security; Privacy; Elliptic curve cryptography; Authentication; Encryption; Receivers; Public key; Internet of vehicles (IoV); security; authentica-; tion; HECC; IDENTITY-BASED SIGNCRYPTION; AUTHENTICATION SCHEME; EFFICIENT; INFRASTRUCTURE;
D O I
10.1109/TVT.2022.3220041
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Vehicles (IoVs) is a wireless network of intelligent and autonomous vehicles and Roadside Units (RSUs), which work together to improve transportation services. On the one hand, this revolutionary mode of transportation optimizes traffic efficiency and reduces congestion and accidents; on the other hand, it raises security and privacy concerns. As a result, keeping the security and privacy aspects of such vital systems should be a top concern, as security and privacy flaws can have devastating implications. In addition, each vehicle's on-board unit (OBU) has a certain amount of processing and storage power. As a result, in areas with high traffic density, vehicles that need to verify messages have a very high computational overhead. In this article, we propose a conditional privacy-preserving heterogeneous signcryption scheme for IoV utilizing Hyperelliptic Curve Cryptography (HECC) operation. The security robustness of the proposed scheme has been evaluated with the Random Oracle Model (ROM), a formal security evaluation method. In addition, relevant existing schemes are compared to the proposed scheme in terms of computation and communication costs. The findings demonstrate that the proposed scheme is both efficient and secure, validating its viability.
引用
收藏
页码:3989 / 3998
页数:10
相关论文
共 33 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]   ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications [J].
Ali, Ikram ;
Chen, Yong ;
Pan, Chengwei ;
Zhou, Anjian .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06) :4435-4450
[3]   An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Omala, Anyembe Andrew ;
Li, Fagen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (10) :11266-11280
[4]   ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications [J].
Bansal, Udit ;
Kar, Jayaprakash ;
Ali, Ikram ;
Naik, Kshirasagar .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 123
[5]  
Eldosouky A., DRONES DISTRESS GAME
[6]   An efficient signcryption of heterogeneous systems for Internet of Vehicles [J].
Elkhalil, Ahmed ;
Zhang, Jiashu ;
Elhabob, Rashad ;
Eltayieb, Nabeil .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 113
[7]  
Elkhalil A, 2021, CLUSTER COMPUT, V24, P2051, DOI [10.1155/2021/1961509, 10.1007/s10586-021-03246-y]
[8]  
Gamage C, 1999, LECT NOTES COMPUT SC, V1560, P69
[9]  
github, SHAMUS SOFWARE LTD M
[10]   Privacy-preserving data aggregation scheme against internal attackers in smart grids [J].
He, Debiao ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
WIRELESS NETWORKS, 2016, 22 (02) :491-502