4.5 Article

A novel and lightweight wireless communication scheme for Vehicular Ad hoc Networks

Journal

AD HOC NETWORKS
Volume 143, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.adhoc.2023.103122

Keywords

VANET; Wireless communication; Chinese remainder theorem

Ask authors/readers for more resources

This paper proposes a lightweight communication scheme (LWCS) suitable for VANET, which includes a lightweight authentication scheme and a one-to-many wireless communication scheme. The authentication model is based on ECDLP and MAC, achieving mutual authentication and improving efficiency. The proposed scheme uses the Chinese remainder theorem (CRT) for one-to-many communication, allowing the receiver to quickly reconstruct the key without affecting the length of the ciphertext. Security analysis shows that the scheme is secure under the assumptions that IFP and ECDLP are intractable, and it satisfies multiple security requirements. Performance analysis demonstrates that the scheme is more efficient compared to related schemes.
Vehicular Ad hoc Network (VANET) has attracted more and more attention from academia and industry because of its self-organization, dynamics, and scalability. However, since the overwhelming majority of communication in VANET adopt wireless communication, which is vulnerable to attack, coupled with the high requirements of communication efficiency for dynamic VANET, the wide application of VANET still faces great challenges. In this paper, we propose a lightweight communication scheme (LWCS) suitable for VANET. The proposed scheme includes a lightweight authentication scheme and a one-to-many wireless communication scheme. The authentication model is based on ECDLP and message authentication code (MAC), which realizes mutual authentication and improves efficiency. The one-to-many communication model is different from the existing scheme using bilinear pairing. Instead, we take advantage of Chinese remainder theorem (CRT), so that the receiver can quickly reconstruct the key. Besides, the length of the ciphertext is not affected by the number of receivers. Security analysis shows that our scheme is secure under the assumptions that the IFP and ECDLP are intractable. Meanwhile, the proposed scheme satisfies multiple security requirements such as forward security, backward security and common attacks resistance. The performance analysis demonstrates theoretically and experimentally that our scheme is efficient compared with related schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available