4.7 Article

A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Information Systems

Swarm of UAVs for Network Management in 6G: A Technical Review

Muhammad Asghar Khan et al.

Summary: Fifth-generation (5G) cellular networks have led to beyond 5G (B5G) networks that can incorporate autonomous services into swarms of unmanned aerial vehicles (UAVs). These networks provide capacity expansion strategies to address massive connectivity issues and ensure high throughput and low latency in extreme or emergency situations. On the other hand, 6G technology integrates AI/ML, IoT, and blockchain to establish reliable, intelligent, secure, and ubiquitous UAV networks, but also poses new challenges for swarm UAVs due to new enabling technologies and unique network design.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Computer Science, Hardware & Architecture

ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications

Udit Bansal et al.

Summary: Traffic management is crucial in both public and private transportation. Vehicular Ad-Hoc Networks (VANETs) play a wireless role in exchanging traffic information to enhance safety and efficiency. However, security and privacy issues arise during the broadcasting process. To address this, a proposed authentication scheme, Identity-based Computationally Efficient Privacy-Preserving Authentication (ID-CEPPA), ensures source authentication, message integrity, non-repudiation, and vehicle identity anonymity efficiently in vehicle-to-vehicle (V2V) communication. The scheme demonstrates lower computational and communication/storage costs compared to similar schemes.

JOURNAL OF SYSTEMS ARCHITECTURE (2022)

Article Computer Science, Information Systems

An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles

Insaf Ullah et al.

Summary: The Internet of Vehicles (IoV) is an enhancement of vehicular ad-hoc networks that connects mobile vehicles to the Internet of Things (IoT) using 5G networks. This article proposes a new signcryption scheme for the multicast channel in a certificateless setting, which solves the key escrow problem and offers smaller key sizes compared to other encryption methods.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Automation & Control Systems

A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems

Muhammad Asghar Khan et al.

Summary: This article discusses the application of UAVs in transportation systems, highlights security and privacy concerns, and proposes a privacy-preserving authentication scheme using specific technologies.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications

Ikram Ali et al.

Summary: Vehicular ad hoc networks (VANETs), an application of the Internet of Things (IoT), provide a better intelligent transportation system (ITS). Security issues and efficiency problems exist in this domain. We propose an elliptic curve cryptosystem-based hybrid signcryption (ECCHSC) protocol that satisfies the security requirements for vehicle-to-infrastructure communications and improves performance.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

An efficient signcryption of heterogeneous systems for Internet of Vehicles

Ahmed Elkhalil et al.

Summary: The rapid development of Internet of Vehicles has led to an increase in connected vehicles, requiring secure communication protocols like HSC-IoV to ensure confidentiality, key revocation, integrity, authentication, and non-repudiation for efficient communication without pairing.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Computer Science, Information Systems

An efficient heterogeneous blockchain-based online/offline signcryption systems for internet of vehicles

Ahmed Elkhalil et al.

Summary: The proposed Online/Offline signcryption scheme based on blockchain aims to secure data sharing between Internet of Vehicles (IoV) and internet servers by addressing security issues. The protocol satisfies the security requirements of IoV and reduces computational cost and energy consumption significantly.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks

Muhammad Asghar Khan et al.

Summary: The evolution of Flying Ad-hoc Networks (FANETs) involves a shift from a single large drone to multiple small drones connected in an ad-hoc manner. While FANETs efficiently utilize resources to maintain Quality of Service (QoS) in multi-hop networking, they are vulnerable to malicious nodes, emphasizing the need for secure access control and key agreement mechanisms. The proposed certificate-based access control and key agreement scheme, utilizing Hyperelliptic Curve Cryptography (HECC) technique and collision-resistant one-way cryptographic hash function, is shown to be superior through formal and informal security analysis techniques.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Information Systems

Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing

AbdelRahman Eldosouky et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Engineering, Electrical & Electronic

An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs

Ikram Ali et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network

Muhammad Asghar Khan et al.

IEEE ACCESS (2020)

Article Telecommunications

A survey on internet of vehicles: Applications, security issues & solutions

Surbhi Sharma et al.

VEHICULAR COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments

Arijit Karati et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

A certificateless aggregate signature scheme for healthcare wireless sensor network

Pankaj Kumar et al.

SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks

Vankamamidi S. Naresh et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)

Article Computer Science, Information Systems

Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

Caixue Zhou et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Computer Science, Information Systems

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Debiao He et al.

WIRELESS NETWORKS (2016)

Article Engineering, Electrical & Electronic

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou et al.

PROCEEDINGS OF THE IEEE (2016)

Article Computer Science, Theory & Methods

Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud

Neeraj Kumar et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Computer Science, Information Systems

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption

Guiyi Wei et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Hardware & Architecture

An intelligent approach for building a secure decentralized public key infrastructure in VANET

Neeraj Kumar et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2015)

Article Computer Science, Information Systems

An efficient signcryption scheme with key privacy and its extension to ring signcryption

Chung Li et al.

JOURNAL OF COMPUTER SECURITY (2010)