Novel V2V Cross-Domain Communications in Heterogeneous VANETs

被引:1
作者
Li, Yan-Ping [1 ]
Lu, Lai-Feng [1 ,2 ]
Zhang, Kai [1 ]
机构
[1] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710119, Shaanxi, Peoples R China
[2] GuiZhou Univ, Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
关键词
VANETs; PKI; IBC; signcryption; heterogeneous systems; ID-BASED SIGNCRYPTION; EFFICIENT SIGNCRYPTION; SECURITY; SCHEME;
D O I
10.6688/JISE.201807_34(4).0005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now the vehicular ad hoc networks (VANETs) are extremely inhomogeneous because the vehicles come from different manufacturers around the world. It is difficult to realize secure communications between two heterogeneous vehicles. And confidentiality and authentication are the main security goals of secure communications. In order to achieve above two security goals simultaneously in such a heterogeneous vehicular ad hoc network, two efficient signcryption schemes are proposed in this paper. The first scheme allows a vehicle registered in a public key infrastructure (PKI) to send a message to another vehicle registered in an identity-based cryptosystem (IBC). And the second scheme allows a vehicle registered in the IBC to send a message to a vehicle registered in the PKI system. Two vehicles from different public key cryptosystems can freely communicate any authenticated and encrypted message in our proposed schemes. Finally, we prove that both schemes have indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen messages attacks under the hardness assumption of decisional Diffie-Hellman problem in the random oracle model. Performance analyses demonstrate our schemes have great advantages in computation, ciphertext length, communication cost and storage.
引用
收藏
页码:869 / 884
页数:16
相关论文
共 50 条
  • [41] A review of broadcasting safety data in V2V: Weaknesses and requirements
    Basheer, Hanaa S.
    Bassil, Carole
    AD HOC NETWORKS, 2017, 65 : 13 - 25
  • [42] Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets
    Gupta, Maanak
    Benson, James
    Patwa, Farhan
    Sandhu, Ravi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 1912 - 1925
  • [43] V2V Communication and Authentication: The Internet of Things Vehicles(Iotv)
    Peter, Mary N.
    Rani, M. Pushpa
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 231 - 247
  • [44] V2V Communication and Authentication: The Internet of Things Vehicles(Iotv)
    Mary N. Peter
    M. Pushpa Rani
    Wireless Personal Communications, 2021, 120 : 231 - 247
  • [45] Heterogeneous VLC/RF multi-hop cluster V2V channel allocation algorithm based on equivalent SINR
    Yin, RongRong
    Sang, Jun
    Shen, Xingyue
    Jia, Kuankuan
    Zhai, Mengfa
    APPLIED OPTICS, 2023, 62 (06) : 1528 - 1536
  • [46] V2V Routing in VANET Based on Fuzzy Logic and Reinforcement Learning
    Zhang, W. L.
    Yang, X. Y.
    Song, Q. X.
    Zhao, L.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2021, 16 (01) : 1 - 19
  • [47] A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
    Li, Qiang
    FUTURE INTERNET, 2023, 15 (01):
  • [48] V2V Routing in VANET Based on Heuristic Q-Learning
    Yang, X. Y.
    Zhang, W. L.
    Lu, H. M.
    Zhao, L.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2020, 15 (05) : 1 - 17
  • [49] A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment
    Han, Myoung-Seok
    Lee, Sang Jun
    Bae, Woo-Sik
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (01) : 245 - 254
  • [50] A Secure Scheme for Vehicle-to-Vehicle (V2V) Routing Protocol
    Alawieh, Mostafa
    Fahs, Walid
    Haydar, Jamal
    Chbib, Fadlallah
    Fadlallah, Ahmad
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 1 - 8