<b>This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks</b> <ul> <li>Take a cooperative approach towards addressing the technologyβs challenges of security and privacy issues</li> <li>Explores interdisciplinary methods
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
β Scribed by Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 237
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
β¦ Table of Contents
Acknowledgements
Contents
About theΒ Authors
1 Introduction
1.1 Modes of Communication in VANETs
1.2 Challenges in VANETs
1.3 Statement of the Work
1.4 Literature Review
1.4.1 PKI-Based Signature Schemes
1.4.2 IDC-Based Signature Schemes
1.4.3 CLC-Based Schemes
1.5 Objectives of the Book
1.6 Organization of the Book
References
2 Preliminaries
2.1 Public Key Cryptography
2.1.1 Digital Signature
2.1.2 Public Key Infrastructure
2.1.3 Identity-Based Cryptography
2.1.4 Certificateless Cryptography
2.2 Signcryption
2.3 An Overview on VANETs
2.3.1 Types of Attackers
2.3.2 Types of Attacks
2.3.3 Security Requirements
2.3.4 Performance Requirements
2.4 Mathematical Background
2.4.1 Elliptic Curve Cryptosystem (ECC)
2.4.2 Bilinear Pairing
2.4.3 Computational Assumptions
2.4.4 Hash Functions
2.5 Random Oracle Model (ROM)
2.6 Security Notions
2.6.1 Goals of the Adversary
2.6.2 Power of the Adversary
2.7 Cryptographic Libraries
2.8 Summary
References
3 Authentication Scheme for Vehicle-to-Infrastructure Communications using Bilinear Pairing
3.1 System Model
3.2 Security Requirements
3.3 Syntax and Security Notion
3.3.1 Syntax
3.3.2 Security Notion
3.4 ID-CPPA Signature Scheme
3.4.1 Setup
3.4.2 PIDGen
3.4.3 KeyGen
3.4.4 MsgSign
3.4.5 SigVerify
3.4.6 BSigVerify
3.5 Security Analysis
3.5.1 Security Proof
3.5.2 Security Requirements
3.6 Performance Analysis
3.6.1 Computational Cost
3.6.2 Communication/Storage Cost
3.7 Summary
References
4 Authentication Scheme for Vehicle-to-Vehicle Communications using ECC
4.1 System Model
4.2 Security Requirements
4.3 Syntax and Security Notion
4.3.1 Syntax
4.3.2 Security Notion
4.4 IDS-CPPA Scheme
4.4.1 Setup
4.4.2 Vehicle-AID-Generation and Vehicle-Key-Generation
4.4.3 Message-Signing
4.4.4 Individual-Signature-Verification
4.4.5 Batch-Signature-Verification
4.5 Security Analysis
4.5.1 Security Proof
4.5.2 Security Requirements
4.6 Performance Analysis
4.6.1 Computational Cost
4.6.2 Communication/Storage Cost
4.7 Summary
References
5 Certificateless Signature-Based Authentication Scheme for Vehicle-to-Infrastructure Communications Using Bilinear Pairing
5.1 System Model
5.2 Security Requirements
5.3 Syntax and Security Notions
5.3.1 Syntax
5.3.2 Security Notions
5.4 CL-PKS Scheme
5.4.1 Setup
5.4.2 PIDGen
5.4.3 PPKGen
5.4.4 SPKGen
5.4.5 CLSigGen
5.4.6 CLSigVerify
5.5 CL-PKS Aggregation and Verification
5.5.1 ACLSigGen
5.5.2 ACLSigVerify
5.6 Security Analysis
5.6.1 Security Proof
5.6.2 Security Requirements
5.7 Performance Analysis
5.7.1 Computational Cost
5.7.2 Communication/Storage Cost
5.8 Summary
References
6 An ECC-Based Conditional Privacy-Preserving Authentication Scheme for Vehicle-to-Vehicle Communications
6.1 System Model
6.2 Security Requirements
6.3 Framework of the Scheme
6.3.1 Generic Model
6.3.2 Security Notions
6.4 CLSS-CPPA Scheme
6.4.1 Setup
6.4.2 RegAIDGen
6.4.3 PSKGen
6.4.4 SPKGen
6.4.5 CLSGen
6.4.6 CLSVerify
6.4.7 BCLSVerify
6.5 Security Analysis
6.5.1 Security Proof
6.5.2 Security Requirements
6.6 Performance Evaluation
6.6.1 Computational Cost
6.6.2 Communication/Storage Cost
6.7 Conclusion and Future Work
References
7 Bilinear Pairing-Based Signcryption Scheme for Secure Heterogeneous Vehicle-to-Infrastructure Communications in VANETs
7.1 System Model
7.2 Security Requirements
7.2.1 Mathematical Hard Problems and Assumptions
7.3 Formal Framework and Security Notions
7.3.1 Framework
7.3.2 Security Notions
7.4 CPP-HSC Scheme
7.4.1 Setup
7.4.2 IDC-PIDKG
7.4.3 PKI-KG
7.4.4 Signcrypt
7.4.5 Unsigncrypt
7.5 Security Proof
7.6 Performance Analysis
7.6.1 Computational Cost
7.6.2 Communication/Storage Cost
7.7 Conclusion and Future Work
References
8 ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications
8.1 System Model
8.1.1 Security Requirements
8.2 Formal Syntax and Security Notions
8.2.1 Syntax
8.2.2 Security Notions
8.3 ECCHSC Protocol
8.3.1 Setup
8.3.2 IDC-KeyGen
8.3.3 PKI-KeyGen
8.3.4 Signcrypt
8.3.5 De-Signcrypt
8.4 Security Analysis
8.4.1 Security Proof
8.4.2 Security Requirements
8.5 Performance Analysis
8.5.1 Computational Overhead
8.5.2 Communication/Storage Overhead
8.6 Application
8.7 Conclusion and Future Work
References
9 CLC- and PKI-based Hybrid Signcryption Scheme Using Bilinear Pairing for Secure Heterogeneous Vehicle-to-Infrastructure Communications
9.1 System Model
9.2 Security Requirements
9.3 Computational Assumptions
9.4 Formal Framework and Security Notions
9.4.1 Framework
9.4.2 Security Notions
9.5 CP-CPPHSC Scheme
9.5.1 Setup
9.5.2 CLC-AIDPSKG
9.5.3 CLC-SPKG
9.5.4 PKI-SPKG
9.5.5 SC
9.5.6 USC
9.6 Security Proof
9.7 Performance Analysis
9.7.1 Computational Cost
9.7.2 Communication/Storage Cost
9.8 Conclusion and Future Work
References
π SIMILAR VOLUMES
<p><i>Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks</i>Β provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also:</p><ul><li>Provides up-to-
<p>Vehicular Ad-Hoc Networks (VANETs) play a key role to develop Intelligent Transportation Systems (ITS) aiming to achieve road safety and to guaranty needs of drivers and passengers, in addition to improve the transportation productivity. One of the most important challenges of this kind of networ
<b>CLOUD AND IOT-BASED VEHICULAR AD HOC NETWORKS</b> <p><b>This book details the architecture behind smart cars being fitted and connected with vehicular cloud computing, IoT and VANET as part of the intelligent transport system (ITS).</b> </p><p>As technology continues to weave itself more tightly
<p><p>This book presents <i>vehicular ad-hoc networks</i> (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and
<p>With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing "smart cities" and addressing many important transportation problems such as road safety, efficiency, and convenience. This brief provides an introduction to the large