Skip to main content

2022 | OriginalPaper | Buchkapitel

9. CLC- and PKI-based Hybrid Signcryption Scheme Using Bilinear Pairing for Secure Heterogeneous Vehicle-to-Infrastructure Communications

verfasst von : Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li

Erschienen in: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) enable vehicles to exchange safety information with the surrounding vehicles and infrastructure in order to ensure safety and efficiency in traffic management. At the present time, vehicles and infrastructures come with different hardware parts (i.e., on-board units). These may use different wireless communication technologies. These wireless communication technologies may further use different cryptographic mechanisms for the safety of messages in VANETs. When a vehicle with a cryptographic mechanism transmits a safety message to a nearby infrastructure that runs a different cryptographic mechanism, communication between them becomes heterogeneous. This kind of communication is known as heterogeneous vehicular communication [35]. However, there are some challenges in heterogeneous vehicular communications with respect to security and privacy as well as performance [5].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7):1162–1182, 2011.CrossRef J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7):1162–1182, 2011.CrossRef
2.
Zurück zum Zitat Y. J. Li. An overview of the DSRC/WAVE technology. International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Springer, Berlin, Heidelberg, pages 544–558, 2012. Y. J. Li. An overview of the DSRC/WAVE technology. International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Springer, Berlin, Heidelberg, pages 544–558, 2012.
3.
Zurück zum Zitat K. Zheng, L. Hou, H. Meng, Q. Zheng, N. Lu, and L. Lei. Soft-defined heterogeneous vehicular network: architecture and challenges. IEEE Network, 30(4):72–80, 2016.CrossRef K. Zheng, L. Hou, H. Meng, Q. Zheng, N. Lu, and L. Lei. Soft-defined heterogeneous vehicular network: architecture and challenges. IEEE Network, 30(4):72–80, 2016.CrossRef
4.
Zurück zum Zitat K. Zheng, Q. Zheng, P. Chatzimisios, W. Xiang, and Y. Zhou. Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions. IEEE Communications Surveys Tutorials, 17(4):2377–2396, 2015.CrossRef K. Zheng, Q. Zheng, P. Chatzimisios, W. Xiang, and Y. Zhou. Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions. IEEE Communications Surveys Tutorials, 17(4):2377–2396, 2015.CrossRef
5.
Zurück zum Zitat I. Ali, T. Lawrence, A. A. Omala, and F. Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10):11266–11280, 2020.CrossRef I. Ali, T. Lawrence, A. A. Omala, and F. Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10):11266–11280, 2020.CrossRef
6.
Zurück zum Zitat I. Ali, Y. Chen, N. Ullah, M. Afzal, and Wen HE. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Transactions on Vehicular Technology, 70(6):5974–5989, 2021. I. Ali, Y. Chen, N. Ullah, M. Afzal, and Wen HE. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Transactions on Vehicular Technology, 70(6):5974–5989, 2021.
7.
Zurück zum Zitat Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption). Annual International Cryptology Conference. Springer, Berlin, Heidelberg, pages 165–179, 1997. Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption). Annual International Cryptology Conference. Springer, Berlin, Heidelberg, pages 165–179, 1997.
8.
Zurück zum Zitat A. Shamir. Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, pages 47–53, 1984. A. Shamir. Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, pages 47–53, 1984.
9.
Zurück zum Zitat S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, pages 452–473, 2003. S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, pages 452–473, 2003.
10.
Zurück zum Zitat I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291 2021.CrossRef I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291 2021.CrossRef
11.
Zurück zum Zitat I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020. I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.
12.
Zurück zum Zitat D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef
13.
Zurück zum Zitat F. Li, Y. Han, and C. Jin. Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 89(4):1391–1412, 2016.CrossRef F. Li, Y. Han, and C. Jin. Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 89(4):1391–1412, 2016.CrossRef
14.
Zurück zum Zitat J. Cheng, G. Yuan, M. Zhou, S. Gao, C. Liu, and H. Duan. A fluid mechanics-based data flow model to estimate VANET capacity. IEEE Transactions on Intelligent Transportation Systems, 21(6):2603–2614, 2019.CrossRef J. Cheng, G. Yuan, M. Zhou, S. Gao, C. Liu, and H. Duan. A fluid mechanics-based data flow model to estimate VANET capacity. IEEE Transactions on Intelligent Transportation Systems, 21(6):2603–2614, 2019.CrossRef
15.
Zurück zum Zitat Y. Li, C. Wang, Y. Zhang, and S. Niu. Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. Security and Communication Networks, 9(17):4574–4584, 2016.CrossRef Y. Li, C. Wang, Y. Zhang, and S. Niu. Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. Security and Communication Networks, 9(17):4574–4584, 2016.CrossRef
16.
Zurück zum Zitat S. Niu, Z. Li, and C. Wang. Privacy-preserving multi-party aggregate signcryption for heterogeneous systems. International Conference on Cloud Computing and Security. Springer, Cham, pages 216–229, 2017. S. Niu, Z. Li, and C. Wang. Privacy-preserving multi-party aggregate signcryption for heterogeneous systems. International Conference on Cloud Computing and Security. Springer, Cham, pages 216–229, 2017.
17.
Zurück zum Zitat L. Shijin, F. Tao, and S. Ting. Security analysis and improvement of hybrid signcryption scheme based on heterogeneous system. 14th International Conference on Computer Science & Education (ICCSE). IEEE, Toronto, ON, Canada, pages 840–845, 2019. L. Shijin, F. Tao, and S. Ting. Security analysis and improvement of hybrid signcryption scheme based on heterogeneous system. 14th International Conference on Computer Science & Education (ICCSE). IEEE, Toronto, ON, Canada, pages 840–845, 2019.
18.
Zurück zum Zitat A. A. Omala, I. Ali, and F. Li. Heterogeneous signcryption with keyword search for wireless body area network. Security and Privacy, 1(5):p. e25, 2018. A. A. Omala, I. Ali, and F. Li. Heterogeneous signcryption with keyword search for wireless body area network. Security and Privacy, 1(5):p. e25, 2018.
19.
Zurück zum Zitat M. Luo, Y. Wen, and X. Hu. Practical data transmission scheme for wireless sensor networks in heterogeneous IoT environment. Wireless Personal Communications, 109(1):505–519, 2019.CrossRef M. Luo, Y. Wen, and X. Hu. Practical data transmission scheme for wireless sensor networks in heterogeneous IoT environment. Wireless Personal Communications, 109(1):505–519, 2019.CrossRef
20.
Zurück zum Zitat J. Malone-Lee and W. Mao. Two birds one stone: signcryption using RSA. Cryptographers’ Track at the RSA Conference. Springer, Berlin, Heidelberg, pages 211–226, 2003. J. Malone-Lee and W. Mao. Two birds one stone: signcryption using RSA. Cryptographers’ Track at the RSA Conference. Springer, Berlin, Heidelberg, pages 211–226, 2003.
21.
Zurück zum Zitat L. Chen and J. Malone-Lee. Improved identity-based signcryption. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, pages 362–379, 2005. L. Chen and J. Malone-Lee. Improved identity-based signcryption. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, pages 362–379, 2005.
22.
Zurück zum Zitat F. Li, H. Zhang, and T. Takagi. Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 7(3):420–429, 2013.CrossRef F. Li, H. Zhang, and T. Takagi. Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 7(3):420–429, 2013.CrossRef
23.
Zurück zum Zitat Y. Li, Y. Qi, and L. Lu. Secure and efficient V2V communications for heterogeneous vehicle ad hoc networks. International Conference on Networking and Network Applications (NaNA). IEEE, Kathmandu, Nepal, pages 93–99, 2017. Y. Li, Y. Qi, and L. Lu. Secure and efficient V2V communications for heterogeneous vehicle ad hoc networks. International Conference on Networking and Network Applications (NaNA). IEEE, Kathmandu, Nepal, pages 93–99, 2017.
24.
Zurück zum Zitat J. Liu, A. Ren, L. Zhang, R. Sun, X. Du, and M. Guizani. A novel secure authentication scheme for heterogeneous Internet of things. ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, Shanghai, China, pages 1–6, 2019. J. Liu, A. Ren, L. Zhang, R. Sun, X. Du, and M. Guizani. A novel secure authentication scheme for heterogeneous Internet of things. ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, Shanghai, China, pages 1–6, 2019.
25.
Zurück zum Zitat M. Barbosa and P. Farshim. Certificateless signcryption. Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, pages 369–372, 2008. M. Barbosa and P. Farshim. Certificateless signcryption. Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, pages 369–372, 2008.
26.
Zurück zum Zitat J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pages 83–107, 2002. J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pages 83–107, 2002.
27.
Zurück zum Zitat J. Camenisch, S. Hohenberger, and M. Ø. Pedersen. Batch verification of short signatures. Journal of Cryptology, 25(4):723–747, 2012.MathSciNetCrossRef J. Camenisch, S. Hohenberger, and M. Ø. Pedersen. Batch verification of short signatures. Journal of Cryptology, 25(4):723–747, 2012.MathSciNetCrossRef
28.
Zurück zum Zitat D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361–396, 2000.CrossRef D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361–396, 2000.CrossRef
29.
Zurück zum Zitat A. Dua, N. Kumar, A. K. Das, and W. Susilo. Secure message communication protocol among vehicles in smart city. IEEE Transactions on Vehicular Technology, 67(5):4359–4373, 2018.CrossRef A. Dua, N. Kumar, A. K. Das, and W. Susilo. Secure message communication protocol among vehicles in smart city. IEEE Transactions on Vehicular Technology, 67(5):4359–4373, 2018.CrossRef
30.
Zurück zum Zitat D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 21(2):149–177, 2008.MathSciNetCrossRef D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 21(2):149–177, 2008.MathSciNetCrossRef
31.
Zurück zum Zitat A. De Caro and V. Iovino. jPBC: Java pairing based cryptography. 2011 IEEE symposium on computers and communications (ISCC). IEEE, Kerkyra, Greece, pages 850–855, 2011. A. De Caro and V. Iovino. jPBC: Java pairing based cryptography. 2011 IEEE symposium on computers and communications (ISCC). IEEE, Kerkyra, Greece, pages 850–855, 2011.
32.
Zurück zum Zitat J. Daemen and V. Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin, Heidelberg, 2013. J. Daemen and V. Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin, Heidelberg, 2013.
33.
Zurück zum Zitat K.-A. Shim. CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4):1874–1883, 2012.CrossRef K.-A. Shim. CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4):1874–1883, 2012.CrossRef
Metadaten
Titel
CLC- and PKI-based Hybrid Signcryption Scheme Using Bilinear Pairing for Secure Heterogeneous Vehicle-to-Infrastructure Communications
verfasst von
Ikram Ali
Yong Chen
Mohammad Faisal
Meng Li
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8586-6_9

Neuer Inhalt