scispace - formally typeset
Open AccessJournal ArticleDOI

MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles

Reads0
Chats0
TLDR
This paper proposes a monitoring data batch verification scheme based on an improved certificateless aggregate signature for IoV, named MDBV, which can decrease the computation overhead and is more suitable for Iov.
Abstract
Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ensure the survivability of IoV. Fortunately, this goal can be achieved by quickly verifying real-time monitoring data to avoid network failure. Aggregate signature is an efficient approach to realize quick data verification. In this paper, we propose a monitoring data batch verification scheme based on an improved certificateless aggregate signature for IoV, named MDBV. The size of aggregated verification message is remaining roughly constant even as the increasing number of vehicles in MDBV. Additionally, MDBV is proved to be secure in the random oracle model assuming the intractability of the computational Diffie–Hellman problem. In consideration of the network survivability and performance, the proposed MDBV can decrease the computation overhead and is more suitable for IoV.

read more

Citations
More filters
Journal ArticleDOI

Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System

TL;DR: A lightweight secure IoT-based health storage system that employs edge server to compute data authenticators and verify data integrity, greatly reduces the system’s computation cost and management burden of third party verifier.
Journal ArticleDOI

Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET

TL;DR: An authentication-based protocol (A-MAC) for smart vehicular communication is proposed along with a novel framework towards an IoV architecture model, which demonstrates that A-MAC outshines other protocols in terms of communication cost, execution time, storage cost, and overhead.
Journal ArticleDOI

On the security of privacy‐preserving authentication scheme with full aggregation in vehicular ad hoc network

TL;DR: The authors propose a fix by modifying the sign, verify, and aggregate‐verify algorithms of the CLAS scheme and demonstrate that with this modification, the improved scheme is semantically secure against forgery attacks in the random oracle model under the intractability of the CDH problem.
Journal ArticleDOI

IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles

TL;DR: This article proposes protected comprehensive data dissemination protocols (say IoVCom) based on one-way hash function and elliptic curve cryptography (ECC) for the IoV structure and discusses performance results in terms of communication overhead, computation time, storage cost, and energy consumption.
Proceedings ArticleDOI

VANET: Towards Security Issues Review

TL;DR: In this review paper of VANet security, the new VANET approaches are summarized by addressing security complexities and the attacks and their effects are identified and clarified and the responses addressed together.
References
More filters
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Book ChapterDOI

Short Signatures from the Weil Pairing

TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Journal ArticleDOI

Security Arguments for Digital Signatures and Blind Signatures

TL;DR: It is proved that a very slight variation of the well-known El Gamal signature scheme resists existential forgeries even against an adaptively chosen-message attack and an appropriate notion of security related to the setting of electronic cash is defined.
Book ChapterDOI

Aggregate and verifiably encrypted signatures from bilinear maps

TL;DR: In this article, Boneh, Lynn, and Shacham introduced the concept of an aggregate signature, presented security models for such signatures, and gave several applications for aggregate signatures.
Proceedings ArticleDOI

Energy analysis of public-key cryptography for wireless sensor networks

TL;DR: Measurements on an Atmel ATmega128L low-power microcontroller platform indicate that public-key cryptography is very viable on 8-bit energy-constrained platforms even if implemented in software.
Related Papers (5)