MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles
Reads0
Chats0
TLDR
This paper proposes a monitoring data batch verification scheme based on an improved certificateless aggregate signature for IoV, named MDBV, which can decrease the computation overhead and is more suitable for Iov.Abstract:
Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ensure the survivability of IoV. Fortunately, this goal can be achieved by quickly verifying real-time monitoring data to avoid network failure. Aggregate signature is an efficient approach to realize quick data verification. In this paper, we propose a monitoring data batch verification scheme based on an improved certificateless aggregate signature for IoV, named MDBV. The size of aggregated verification message is remaining roughly constant even as the increasing number of vehicles in MDBV. Additionally, MDBV is proved to be secure in the random oracle model assuming the intractability of the computational Diffie–Hellman problem. In consideration of the network survivability and performance, the proposed MDBV can decrease the computation overhead and is more suitable for IoV.read more
Citations
More filters
Journal ArticleDOI
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System
TL;DR: A lightweight secure IoT-based health storage system that employs edge server to compute data authenticators and verify data integrity, greatly reduces the system’s computation cost and management burden of third party verifier.
Journal ArticleDOI
Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET
Nishu Gupta,Ravikanti Manaswini,Bongaram Saikrishna,Francisco José da Silva e Silva,Ariel Soares Teles +4 more
TL;DR: An authentication-based protocol (A-MAC) for smart vehicular communication is proposed along with a novel framework towards an IoV architecture model, which demonstrates that A-MAC outshines other protocols in terms of communication cost, execution time, storage cost, and overhead.
Journal ArticleDOI
On the security of privacy‐preserving authentication scheme with full aggregation in vehicular ad hoc network
TL;DR: The authors propose a fix by modifying the sign, verify, and aggregate‐verify algorithms of the CLAS scheme and demonstrate that with this modification, the improved scheme is semantically secure against forgery attacks in the random oracle model under the intractability of the CDH problem.
Journal ArticleDOI
IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles
Trupil Limbasiya,Debasis Das +1 more
TL;DR: This article proposes protected comprehensive data dissemination protocols (say IoVCom) based on one-way hash function and elliptic curve cryptography (ECC) for the IoV structure and discusses performance results in terms of communication overhead, computation time, storage cost, and energy consumption.
Proceedings ArticleDOI
VANET: Towards Security Issues Review
TL;DR: In this review paper of VANet security, the new VANET approaches are summarized by addressing security complexities and the attacks and their effects are identified and clarified and the responses addressed together.
References
More filters
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Book ChapterDOI
Short Signatures from the Weil Pairing
Dan Boneh,Ben Lynn,Hovav Shacham +2 more
TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Journal ArticleDOI
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval,Jacques Stern +1 more
TL;DR: It is proved that a very slight variation of the well-known El Gamal signature scheme resists existential forgeries even against an adaptively chosen-message attack and an appropriate notion of security related to the setting of electronic cash is defined.
Book ChapterDOI
Aggregate and verifiably encrypted signatures from bilinear maps
TL;DR: In this article, Boneh, Lynn, and Shacham introduced the concept of an aggregate signature, presented security models for such signatures, and gave several applications for aggregate signatures.
Proceedings ArticleDOI
Energy analysis of public-key cryptography for wireless sensor networks
TL;DR: Measurements on an Atmel ATmega128L low-power microcontroller platform indicate that public-key cryptography is very viable on 8-bit energy-constrained platforms even if implemented in software.
Related Papers (5)
Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks
Albert Wasef,Xuemin Shen +1 more
A trust model based batch verification of digital signatures in IoT
Apurva S. Kittur,Alwyn R. Pais +1 more