ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications

被引:20
作者
Ali, Ikram [1 ,2 ]
Chen, Yong [1 ,2 ,3 ]
Pan, Chengwei [1 ,2 ]
Zhou, Anjian [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu 611731, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Inst Elect Vehicle Driving Sys, Chengdu 611731, Sichuan, Peoples R China
[3] Univ Elect Sci & Technol China, Yangtze Delta Region Inst Huzhou, Huzhou 313001, Peoples R China
[4] Chongqing Changan New Energy Automobile Technol C, Chongqing 401120, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Security; Safety; Protocols; Receivers; Internet of Things; Vehicle-to-infrastructure; Authentication; Bandwidth; computational cost; elliptic curve cryptosystem (ECC); heterogeneous vehicle-to-infrastructure (V2I) communications; Internet of Things (IoT); AUTHENTICATION; SCHEMES;
D O I
10.1109/JIOT.2021.3104010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs), an application of the Internet of Things (IoT) providing a better intelligent transportation system (ITS), has received substantial attention from both industry and academia. Heterogeneous vehicular communications in VANETs occur when both vehicles and the infrastructure use different cryptographic technologies to exchange safety messages. However, the safety messages between vehicles and the infrastructure are communicated wirelessly; therefore, security issues are a serious concern in this domain. The existing schemes secure the transmission of safety messages with respect to confidentiality, authentication, and nonrepudiation. However, they are inappropriate with respect to efficiency. They cause computational overhead on the receiver and bandwidth overhead in the communications. To cope with this, we propose an elliptic curve cryptosystem-based hybrid signcryption (ECCHSC) protocol that satisfies the security requirements (i.e., message confidentiality, message's source authentication, message integrity, nonrepudiation, and identity-anonymity) for heterogeneous vehicle-to-infrastructure (V2I) communications in a single logical step. This protocol allows secure transmission of a safety message from a vehicle using identity-based cryptography (IDC) to a roadside unit (RSU) using public-key infrastructure (PKI). In addition, the ECCHSC protocol enables the RSU to receive multiple ciphertexts, aggregate them, and de-signcrypt them simultaneously through the batch de-signcryption method, which further improves the performance. The ECCHSC protocol has indistinguishability against adaptive chosen ciphertext attacks (IND-CCA2) and existential unforgeability against adaptive chosen message attacks (EUF-CMAs) in the random oracle model (ROM). The performance analysis of our protocol demonstrates a significant reduction in computational overhead and in communication/storage overhead as compared to the state-of-the-art schemes.
引用
收藏
页码:4435 / 4450
页数:16
相关论文
共 50 条
[1]   An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Omala, Anyembe Andrew ;
Li, Fagen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (10) :11266-11280
[2]   An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 103
[3]   A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs [J].
Ali, Ikram ;
Gervais, Mwitende ;
Ahene, Emmanuel ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 99
[4]   Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey [J].
Ali, Ikram ;
Hassan, Alzubair ;
Li, Fagen .
VEHICULAR COMMUNICATIONS, 2019, 16 :45-61
[5]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[6]  
[Anonymous], 1985, P WORKSH THEOR APPL
[7]  
[Anonymous], 2010, QUALITY RELIABILITY
[8]  
Camenisch J, 2007, LECT NOTES COMPUT SC, V4515, P246
[9]   A Fluid Mechanics-Based Data Flow Model to Estimate VANET Capacity [J].
Cheng, Jiujun ;
Yuan, Guiyuan ;
Zhou, Mengchu ;
Gao, Shangce ;
Liu, Cong ;
Duan, Hua .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (06) :2603-2614
[10]  
Demler M., 2020, C-V2X Drives Intelligent Transportation