Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cryptography (ECC) for Vehicular Ad hoc Network (VANET)

  • Israa M. Al-dulaimi
  • Ayman Khalil
Keywords: Elliptic Curve Cryptography, Vehicular Ad hoc Network, Security, Privacy

Abstract

Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.

Downloads

Download data is not yet available.

References

M. A. Al-shareeda, M. Anbar, I. H. Hasbullah, & S. Manickam. (2020). Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sens. J., pp. 1.

M. S. Talib, A. Hassan, B. Hussin, & A. A. Hassan. (2018). Vehicular ad-hoc networks: Current challenges and future direction of research. Jour Adv Res. Dyn. Control Syst, 10(2), 2065–2074.

M. M. Hamdi, L. Audah, S. A. Rashid, A. S. Mustafa, & M. S. Abood. (2020). A survey on data dissemination and routing protocol in VANET: Types challenges opportunistic and future role. Int. J. Adv. Sci. Technol, 29(5), 6473–6482.

A. S. Mustafa, M. M. Al-Heeti, M. M. Hamdi, & A. M. Shantaf. (2020). Performance analyzing the effect of network size on routing protocols in MANETs. In: International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–5.

J. Zhang, J. Cui, H. Zhong, Z. Chen, & L. Liu. (2019). PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans. Dependable Secur. Comput.

H. Zhong, B. Huang, J. Cui, Y. Xu, & L. Liu. (2017). Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access, 6, 2241–2250.

M. M. Hamdi, S. A. Rashid, M. Ismail, M. A. Altahrawi, M. F. Mansor, & M. K. AbuFoul. (2018). Performance evaluation of active queue management algorithms in large network. In: IEEE 4th International Symposium on Telecommunication Technologies (ISTT), pp. 1–6.

M. S. Talib, A. Hassan, B. Hussin, Z. A. Abas, Z. S. Talib, & Z. S. Rasoul. (2018). A novel stable clustering approach based on Gaussian distribution and relative velocity in VANETs. Int. J. Adv. Comput. Sci. Appl., 9(4), 216–220.

A. H. Mohammed, M. M. Hamdi, S. A. Rashid, and A. M. Shantaf. (2020). An optimum design of square microstrip patch antenna based on fuzzy logic rules. In: International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–7.

M. A. Al-Shareeda, M. Anbar, S. Manickam, & A. A. Yassin. (2020). VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access, 8, 150914–150928.

M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, S. Manickam, & S. M. Hanshi. (2020). Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access.

M. M. Hamdi, L. Audah, S. A. Rashid, A. H. Mohammed, S. Alani, & A. S. Mustafa. (2020). A review of applications, characteristics and challenges in vehicular ad hoc networks (VANETs). In: International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–7.

M. Al Shareeda, A. Khalil, & W. Fahs. (2018). Towards the optimization of road side unit placement using genetic algorithm. In: International Arab Conference on Information Technology (ACIT), pp. 1–5.

A. Shamir. (1984). Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53.

C. Zhang, R. Lu, X. Lin, P.-H. Ho, & X. Shen. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250.

C. Zhang, P.-H. Ho, & J. Tapolcai. (2011). On batch verification with group testing for vehicular communications. Wirel. Networks, 17(8), 1851, 2011.

Y. Jiang, M. Shi, X. Shen, & C. Lin. (2008). BAT: A robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun., 8(4), 1974–1983.

G. Calandriello, P. Papadimitratos, J.-P. Hubaux, & A. Lioy. (2007). Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28.

T. W. Chim, S.-M. Yiu, L. C. K. Hui, & V. O. K. Li. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.

C.-C. Lee & Y.-M. Lai. (2013). Toward a secure batch verification with group testing for VANET. Wirel. Networks, 19(6), 1441–1449.

M. Bayat, M. Pournaghi, M. Rahimi, & M. Barmshoory. (2019). NERA: A new and efficient RSU based authentication scheme for VANETs. Wirel. Networks, pp. 1–16.

Y. Ming & H. Cheng. (2019). Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Mob. Inf. Syst.

M. Raya & J.-P. Hubaux. (2005). The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11–21.

M. Al Shareeda, A. Khalil, & W. Fahs. (2019). Realistic heterogeneous genetic-based RSU placement solution for V2I networks. Int. Arab J. Inf. Technol., 16(3A), 540–547.

M. A. Al-shareeda, M. Anbar, S. Manickam, & I. H. Hasbullah. (2020). Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks. Available at: https://ijemr.net/ojs/index.php/ojs/article/view/519.

M. A. Al-shareeda, M. Anbar, S. Manickam, & I. H. Hasbullah. (2020). Review of prevention schemes for modification attack in vehicular ad hoc networks. International Journal of Engineering and Management Research, 10(3), 149-152.

Published
2020-08-31
How to Cite
Israa M. Al-dulaimi, & Ayman Khalil. (2020). Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cryptography (ECC) for Vehicular Ad hoc Network (VANET). International Journal of Engineering and Management Research, 10(4), 160-163. https://doi.org/10.31033/ijemr.10.4.23