scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

An Efficient Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV).

01 Jun 2020-pp 1266-1271
TL;DR: The performance analysis proves that the proposed improvised authentication and lightweight batch verification method is more reliable that reduces the computational delay and has a better performance in the delay-sensitive network as compared to the existing schemes.
Abstract: Ensuring secure transmission over the communication channel is a fundamental responsibility to achieve the implementation objective of universal internet of vehicles (UIoV) efficiently. Characteristics like highly dynamic topology and scalability of UIoV makes it more vulnerable to different types of privacy and security attacks. Considerable scope of improvement in terms of time complexity and performance can be observed within the existing schemes that address the privacy and security aspects of UIoV. In this paper, we present an improvised authentication and lightweight batch verification method for security and privacy in UIoV. The suggested method reduces the message loss rate, which occurred due to the response time delay by implementing some low-cost cryptographic operations like one-way hash function, concatenation, XOR, and bilinear map. Furthermore, the performance analysis proves that the proposed method is more reliable that reduces the computational delay and has a better performance in the delay-sensitive network as compared to the existing schemes. The experimental results are obtained by implementing the proposed scheme on a desktop-based configuration as well as Raspberry Pi 4.
References
More filters
Journal ArticleDOI
TL;DR: The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Abstract: In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating `things'. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. In this survey, the definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed. Firstly, various definitions of IoT are introduced; secondly, emerging techniques for the implementation of IoT are discussed; thirdly, some open issues related to the IoT applications are explored; finally, the major challenges which need addressing by the research community and corresponding potential solutions are investigated.

5,295 citations

Book ChapterDOI
15 Aug 2004
TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Abstract: We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security. Security of our group signature is based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption. We prove security of our system, in the random oracle model, using a variant of the security definition for group signatures recently given by Bellare, Micciancio, and Warinschi.

1,956 citations

Journal Article
TL;DR: In this paper, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Abstract: We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security. Security of our group signature is based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption. We prove security of our system, in the random oracle model, using a variant of the security definition for group signatures recently given by Bellare, Micciancio, and Warinschi.

1,562 citations

Journal ArticleDOI
TL;DR: In this article, the authors present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles.

1,216 citations


"An Efficient Lightweight Authentica..." refers background in this paper

  • ...In the UIoV environment, the communication can be accomplished instinctively between the vehicles and other homogeneous and heterogeneous components of the network, unlike the vehicular ad hoc networks (VANETs) [3]....

    [...]

Proceedings ArticleDOI
26 Jul 2007
TL;DR: In this paper, the ITS (intelligent transport system) includes two big function modules: Information processing application system and Road condition information transferring system, which is in charge of the information exchange of the car inside, car to car and car to road.
Abstract: Ad hoc networks are a new wireless networking paradigm for mobile hosts. In this paper, we designed an intelligent transport system. The ITS (intelligent transport system) includes two big function modules: Information processing application system and Road condition information transferring system. The main task of the road condition information transferring module is in charge of the information exchange of the car inside, car to car and car to road. The module works in ad hoc network, we call the network VANET (vehicular ad-hoc network) . Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. For the sake of insuring the system can run normally, the information can be transferring correctly and fleetly, the security of VANET (vehicular ad-hoc network) of the road condition information transferring system is crucial. So integrate the characteristics of ad hoc network itself, in the ITS of this paper, we concern the security issues of VANETs from some aspects and provide the appropriate solving measures. To make sure the ITS can be used under the security pattern.

573 citations


"An Efficient Lightweight Authentica..." refers background in this paper

  • ...[7] describe the implementation of standard public key infrastructure (PKI) and the idea of anonymous certificates to protect the user’s real identities in its work....

    [...]