scispace - formally typeset
Book ChapterDOI

An Efficient Message Transmission and Verification Scheme for VANETs

TLDR
An identity-based signature protocol using the batch verification concept for VANETs is proposed, and the proposed scheme resists various security attacks, i.e., man-in-the-middle, impersonation, replay, Sybil, and password guessing.
Abstract
The vehicular ad-hoc network (VANET) is used for communication between vehicles in the same vicinity and road-side-units (RSUs). Since they communicate over a public channel, a secure data transmission protocol is necessary to exchange confidential information. Moreover, the number of vehicles is increasing day-by-day and thus, the receiver gets myriad messages from nearby RSUs and vehicles. As a result, the verification time plays a major role in vehicular communication scheme. Further, providing anonymous communication between vehicles is also a challenging task. To overcome these concerns, in this paper, we propose an identity-based signature protocol using the batch verification concept for VANETs. This paper aims to decrease the computational time (during the communication), and the proposed scheme resists various security attacks, i.e., man-in-the-middle, impersonation, replay, Sybil, and password guessing. Moreover, the proposed protocol achieves better performance results (for computational time, communication overhead, and storage cost) on Raspberry Pi 3B+ compared to other existing data transmission schemes.

read more

Citations
More filters
Journal ArticleDOI

SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs

TL;DR: A deep computational cost and communicational overhead analysis indicates that SD2PA is better than related schemes, as well as efficiently meeting VANET’s security and privacy needs.
References
More filters
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Journal ArticleDOI

Securing vehicular ad hoc networks

TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Proceedings ArticleDOI

IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments

TL;DR: An overview of the latest draft proposed for IEEE 802.11p, named wireless access in vehicular environment, also known as WAVE, is provided to provide an insight into the reasoning and approaches behind the document.
Journal ArticleDOI

A comprehensive survey on vehicular Ad Hoc network

TL;DR: In this article, the authors present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles.
Proceedings ArticleDOI

An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks

TL;DR: An efficient batch signature verification scheme for communications between vehicles and RSUs (or termed vehicle- to-Infrastructure (V2I) communications), in which an RSU can verify multiple received signatures at the same time such that the total verification time can be dramatically reduced.
Related Papers (5)