4.7 Article

A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles

期刊

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
卷 72, 期 3, 页码 3989-3998

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2022.3220041

关键词

Security; Privacy; Elliptic curve cryptography; Authentication; Encryption; Receivers; Public key; Internet of vehicles (IoV); security; authentica- tion; HECC

向作者/读者索取更多资源

The Internet of Vehicles (IoVs) is a wireless network that consists of intelligent and autonomous vehicles and Roadside Units (RSUs), with the aim of improving transportation services. It offers benefits such as traffic optimization and reduction of congestion and accidents, but also raises concerns regarding security and privacy. Therefore, ensuring the security and privacy of these vital systems is crucial, as flaws can have serious implications. Additionally, in areas with high traffic density, vehicles that need to verify messages face a significant computational overhead.
The Internet of Vehicles (IoVs) is a wireless network of intelligent and autonomous vehicles and Roadside Units (RSUs), which work together to improve transportation services. On the one hand, this revolutionary mode of transportation optimizes traffic efficiency and reduces congestion and accidents; on the other hand, it raises security and privacy concerns. As a result, keeping the security and privacy aspects of such vital systems should be a top concern, as security and privacy flaws can have devastating implications. In addition, each vehicle's on-board unit (OBU) has a certain amount of processing and storage power. As a result, in areas with high traffic density, vehicles that need to verify messages have a very high computational overhead. In this article, we propose a conditional privacy-preserving heterogeneous signcryption scheme for IoV utilizing Hyperelliptic Curve Cryptography (HECC) operation. The security robustness of the proposed scheme has been evaluated with the Random Oracle Model (ROM), a formal security evaluation method. In addition, relevant existing schemes are compared to the proposed scheme in terms of computation and communication costs. The findings demonstrate that the proposed scheme is both efficient and secure, validating its viability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据