𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

✍ Scribed by Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li


Publisher
Springer
Year
2022
Tongue
English
Leaves
237
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.

✦ Table of Contents


Acknowledgements
Contents
About theΒ Authors
1 Introduction
1.1 Modes of Communication in VANETs
1.2 Challenges in VANETs
1.3 Statement of the Work
1.4 Literature Review
1.4.1 PKI-Based Signature Schemes
1.4.2 IDC-Based Signature Schemes
1.4.3 CLC-Based Schemes
1.5 Objectives of the Book
1.6 Organization of the Book
References
2 Preliminaries
2.1 Public Key Cryptography
2.1.1 Digital Signature
2.1.2 Public Key Infrastructure
2.1.3 Identity-Based Cryptography
2.1.4 Certificateless Cryptography
2.2 Signcryption
2.3 An Overview on VANETs
2.3.1 Types of Attackers
2.3.2 Types of Attacks
2.3.3 Security Requirements
2.3.4 Performance Requirements
2.4 Mathematical Background
2.4.1 Elliptic Curve Cryptosystem (ECC)
2.4.2 Bilinear Pairing
2.4.3 Computational Assumptions
2.4.4 Hash Functions
2.5 Random Oracle Model (ROM)
2.6 Security Notions
2.6.1 Goals of the Adversary
2.6.2 Power of the Adversary
2.7 Cryptographic Libraries
2.8 Summary
References
3 Authentication Scheme for Vehicle-to-Infrastructure Communications using Bilinear Pairing
3.1 System Model
3.2 Security Requirements
3.3 Syntax and Security Notion
3.3.1 Syntax
3.3.2 Security Notion
3.4 ID-CPPA Signature Scheme
3.4.1 Setup
3.4.2 PIDGen
3.4.3 KeyGen
3.4.4 MsgSign
3.4.5 SigVerify
3.4.6 BSigVerify
3.5 Security Analysis
3.5.1 Security Proof
3.5.2 Security Requirements
3.6 Performance Analysis
3.6.1 Computational Cost
3.6.2 Communication/Storage Cost
3.7 Summary
References
4 Authentication Scheme for Vehicle-to-Vehicle Communications using ECC
4.1 System Model
4.2 Security Requirements
4.3 Syntax and Security Notion
4.3.1 Syntax
4.3.2 Security Notion
4.4 IDS-CPPA Scheme
4.4.1 Setup
4.4.2 Vehicle-AID-Generation and Vehicle-Key-Generation
4.4.3 Message-Signing
4.4.4 Individual-Signature-Verification
4.4.5 Batch-Signature-Verification
4.5 Security Analysis
4.5.1 Security Proof
4.5.2 Security Requirements
4.6 Performance Analysis
4.6.1 Computational Cost
4.6.2 Communication/Storage Cost
4.7 Summary
References
5 Certificateless Signature-Based Authentication Scheme for Vehicle-to-Infrastructure Communications Using Bilinear Pairing
5.1 System Model
5.2 Security Requirements
5.3 Syntax and Security Notions
5.3.1 Syntax
5.3.2 Security Notions
5.4 CL-PKS Scheme
5.4.1 Setup
5.4.2 PIDGen
5.4.3 PPKGen
5.4.4 SPKGen
5.4.5 CLSigGen
5.4.6 CLSigVerify
5.5 CL-PKS Aggregation and Verification
5.5.1 ACLSigGen
5.5.2 ACLSigVerify
5.6 Security Analysis
5.6.1 Security Proof
5.6.2 Security Requirements
5.7 Performance Analysis
5.7.1 Computational Cost
5.7.2 Communication/Storage Cost
5.8 Summary
References
6 An ECC-Based Conditional Privacy-Preserving Authentication Scheme for Vehicle-to-Vehicle Communications
6.1 System Model
6.2 Security Requirements
6.3 Framework of the Scheme
6.3.1 Generic Model
6.3.2 Security Notions
6.4 CLSS-CPPA Scheme
6.4.1 Setup
6.4.2 RegAIDGen
6.4.3 PSKGen
6.4.4 SPKGen
6.4.5 CLSGen
6.4.6 CLSVerify
6.4.7 BCLSVerify
6.5 Security Analysis
6.5.1 Security Proof
6.5.2 Security Requirements
6.6 Performance Evaluation
6.6.1 Computational Cost
6.6.2 Communication/Storage Cost
6.7 Conclusion and Future Work
References
7 Bilinear Pairing-Based Signcryption Scheme for Secure Heterogeneous Vehicle-to-Infrastructure Communications in VANETs
7.1 System Model
7.2 Security Requirements
7.2.1 Mathematical Hard Problems and Assumptions
7.3 Formal Framework and Security Notions
7.3.1 Framework
7.3.2 Security Notions
7.4 CPP-HSC Scheme
7.4.1 Setup
7.4.2 IDC-PIDKG
7.4.3 PKI-KG
7.4.4 Signcrypt
7.4.5 Unsigncrypt
7.5 Security Proof
7.6 Performance Analysis
7.6.1 Computational Cost
7.6.2 Communication/Storage Cost
7.7 Conclusion and Future Work
References
8 ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications
8.1 System Model
8.1.1 Security Requirements
8.2 Formal Syntax and Security Notions
8.2.1 Syntax
8.2.2 Security Notions
8.3 ECCHSC Protocol
8.3.1 Setup
8.3.2 IDC-KeyGen
8.3.3 PKI-KeyGen
8.3.4 Signcrypt
8.3.5 De-Signcrypt
8.4 Security Analysis
8.4.1 Security Proof
8.4.2 Security Requirements
8.5 Performance Analysis
8.5.1 Computational Overhead
8.5.2 Communication/Storage Overhead
8.6 Application
8.7 Conclusion and Future Work
References
9 CLC- and PKI-based Hybrid Signcryption Scheme Using Bilinear Pairing for Secure Heterogeneous Vehicle-to-Infrastructure Communications
9.1 System Model
9.2 Security Requirements
9.3 Computational Assumptions
9.4 Formal Framework and Security Notions
9.4.1 Framework
9.4.2 Security Notions
9.5 CP-CPPHSC Scheme
9.5.1 Setup
9.5.2 CLC-AIDPSKG
9.5.3 CLC-SPKG
9.5.4 PKI-SPKG
9.5.5 SC
9.5.6 USC
9.6 Security Proof
9.7 Performance Analysis
9.7.1 Computational Cost
9.7.2 Communication/Storage Cost
9.8 Conclusion and Future Work
References


πŸ“œ SIMILAR VOLUMES


Vehicular Ad Hoc Network Security and Pr
✍ Xiaodong Lin, Rongxing Lu πŸ“‚ Library πŸ“… 2015 πŸ› Wiley-IEEE Press 🌐 English

<b>This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks</b> <ul> <li>Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues</li> <li>Explores interdisciplinary methods

Mobility Models for Next Generation Wire
✍ Paolo Santi(auth.), David Hutchison, Serge Fdida, Joe Sventek(eds.) πŸ“‚ Library πŸ“… 2012 🌐 English

<p><i>Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks</i>Β provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also:</p><ul><li>Provides up-to-

Bio-inspired Routing Protocols for Vehic
✍ Salim Bitam, Abdelhamid Mellouk πŸ“‚ Library πŸ“… 2014 πŸ› Wiley-ISTE 🌐 English

<p>Vehicular Ad-Hoc Networks (VANETs) play a key role to develop Intelligent Transportation Systems (ITS) aiming to achieve road safety and to guaranty needs of drivers and passengers, in addition to improve the transportation productivity. One of the most important challenges of this kind of networ

Cloud and IoT-Based Vehicular Ad Hoc Net
✍ Gurinder Singh (editor), Vishal Jain (editor), Jyotir Moy Chatterjee (editor), L πŸ“‚ Library πŸ“… 2021 πŸ› Wiley-Scrivener 🌐 English

<b>CLOUD AND IOT-BASED VEHICULAR AD HOC NETWORKS</b> <p><b>This book details the architecture behind smart cars being fitted and connected with vehicular cloud computing, IoT and VANET as part of the intelligent transport system (ITS).</b> </p><p>As technology continues to weave itself more tightly

Vehicular ad hoc Networks: Standards, So
✍ Claudia Campolo, Antonella Molinaro, Riccardo Scopigno (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

<p><p>This book presents <i>vehicular ad-hoc networks</i> (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and

Studies on Urban Vehicular Ad-hoc Networ
✍ Hongzi Zhu, Minglu Li (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing "smart cities" and addressing many important transportation problems such as road safety, efficiency, and convenience. This brief provides an introduction to the large