Book ChapterDOI
An Efficient Message Transmission and Verification Scheme for VANETs
Kunal Bajaj,Trupil Limbasiya,Debasis Das +2 more
- pp 127-143
TLDR
An identity-based signature protocol using the batch verification concept for VANETs is proposed, and the proposed scheme resists various security attacks, i.e., man-in-the-middle, impersonation, replay, Sybil, and password guessing.Abstract:
The vehicular ad-hoc network (VANET) is used for communication between vehicles in the same vicinity and road-side-units (RSUs). Since they communicate over a public channel, a secure data transmission protocol is necessary to exchange confidential information. Moreover, the number of vehicles is increasing day-by-day and thus, the receiver gets myriad messages from nearby RSUs and vehicles. As a result, the verification time plays a major role in vehicular communication scheme. Further, providing anonymous communication between vehicles is also a challenging task. To overcome these concerns, in this paper, we propose an identity-based signature protocol using the batch verification concept for VANETs. This paper aims to decrease the computational time (during the communication), and the proposed scheme resists various security attacks, i.e., man-in-the-middle, impersonation, replay, Sybil, and password guessing. Moreover, the proposed protocol achieves better performance results (for computational time, communication overhead, and storage cost) on Raspberry Pi 3B+ compared to other existing data transmission schemes.read more
Citations
More filters
Journal ArticleDOI
SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs
TL;DR: A deep computational cost and communicational overhead analysis indicates that SD2PA is better than related schemes, as well as efficiently meeting VANET’s security and privacy needs.
References
More filters
Book
Guide to Elliptic Curve Cryptography
TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Journal ArticleDOI
Securing vehicular ad hoc networks
Maxim Raya,Jean-Pierre Hubaux +1 more
TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Proceedings ArticleDOI
IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments
Daniel Jiang,Luca Delgrossi +1 more
TL;DR: An overview of the latest draft proposed for IEEE 802.11p, named wireless access in vehicular environment, also known as WAVE, is provided to provide an insight into the reasoning and approaches behind the document.
Journal ArticleDOI
A comprehensive survey on vehicular Ad Hoc network
TL;DR: In this article, the authors present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles.
Proceedings ArticleDOI
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks
TL;DR: An efficient batch signature verification scheme for communications between vehicles and RSUs (or termed vehicle- to-Infrastructure (V2I) communications), in which an RSU can verify multiple received signatures at the same time such that the total verification time can be dramatically reduced.