Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.

Author(s): Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li
Publisher: Springer
Year: 2022

Language: English
Pages: 244
City: Singapore

Acknowledgements
Contents
About theĀ Authors
1 Introduction
1.1 Modes of Communication in VANETs
1.2 Challenges in VANETs
1.3 Statement of the Work
1.4 Literature Review
1.4.1 PKI-Based Signature Schemes
1.4.2 IDC-Based Signature Schemes
1.4.3 CLC-Based Schemes
1.5 Objectives of the Book
1.6 Organization of the Book
References
2 Preliminaries
2.1 Public Key Cryptography
2.1.1 Digital Signature
2.1.2 Public Key Infrastructure
2.1.3 Identity-Based Cryptography
2.1.4 Certificateless Cryptography
2.2 Signcryption
2.3 An Overview on VANETs
2.3.1 Types of Attackers
2.3.2 Types of Attacks
2.3.3 Security Requirements
2.3.4 Performance Requirements
2.4 Mathematical Background
2.4.1 Elliptic Curve Cryptosystem (ECC)
2.4.2 Bilinear Pairing
2.4.3 Computational Assumptions
2.4.4 Hash Functions
2.5 Random Oracle Model (ROM)
2.6 Security Notions
2.6.1 Goals of the Adversary
2.6.2 Power of the Adversary
2.7 Cryptographic Libraries
2.8 Summary
References
3 Authentication Scheme for Vehicle-to-Infrastructure Communications using Bilinear Pairing
3.1 System Model
3.2 Security Requirements
3.3 Syntax and Security Notion
3.3.1 Syntax
3.3.2 Security Notion
3.4 ID-CPPA Signature Scheme
3.4.1 Setup
3.4.2 PIDGen
3.4.3 KeyGen
3.4.4 MsgSign
3.4.5 SigVerify
3.4.6 BSigVerify
3.5 Security Analysis
3.5.1 Security Proof
3.5.2 Security Requirements
3.6 Performance Analysis
3.6.1 Computational Cost
3.6.2 Communication/Storage Cost
3.7 Summary
References
4 Authentication Scheme for Vehicle-to-Vehicle Communications using ECC
4.1 System Model
4.2 Security Requirements
4.3 Syntax and Security Notion
4.3.1 Syntax
4.3.2 Security Notion
4.4 IDS-CPPA Scheme
4.4.1 Setup
4.4.2 Vehicle-AID-Generation and Vehicle-Key-Generation
4.4.3 Message-Signing
4.4.4 Individual-Signature-Verification
4.4.5 Batch-Signature-Verification
4.5 Security Analysis
4.5.1 Security Proof
4.5.2 Security Requirements
4.6 Performance Analysis
4.6.1 Computational Cost
4.6.2 Communication/Storage Cost
4.7 Summary
References
5 Certificateless Signature-Based Authentication Scheme for Vehicle-to-Infrastructure Communications Using Bilinear Pairing
5.1 System Model
5.2 Security Requirements
5.3 Syntax and Security Notions
5.3.1 Syntax
5.3.2 Security Notions
5.4 CL-PKS Scheme
5.4.1 Setup
5.4.2 PIDGen
5.4.3 PPKGen
5.4.4 SPKGen
5.4.5 CLSigGen
5.4.6 CLSigVerify
5.5 CL-PKS Aggregation and Verification
5.5.1 ACLSigGen
5.5.2 ACLSigVerify
5.6 Security Analysis
5.6.1 Security Proof
5.6.2 Security Requirements
5.7 Performance Analysis
5.7.1 Computational Cost
5.7.2 Communication/Storage Cost
5.8 Summary
References
6 An ECC-Based Conditional Privacy-Preserving Authentication Scheme for Vehicle-to-Vehicle Communications
6.1 System Model
6.2 Security Requirements
6.3 Framework of the Scheme
6.3.1 Generic Model
6.3.2 Security Notions
6.4 CLSS-CPPA Scheme
6.4.1 Setup
6.4.2 RegAIDGen
6.4.3 PSKGen
6.4.4 SPKGen
6.4.5 CLSGen
6.4.6 CLSVerify
6.4.7 BCLSVerify
6.5 Security Analysis
6.5.1 Security Proof
6.5.2 Security Requirements
6.6 Performance Evaluation
6.6.1 Computational Cost
6.6.2 Communication/Storage Cost
6.7 Conclusion and Future Work
References
7 Bilinear Pairing-Based Signcryption Scheme for Secure Heterogeneous Vehicle-to-Infrastructure Communications in VANETs
7.1 System Model
7.2 Security Requirements
7.2.1 Mathematical Hard Problems and Assumptions
7.3 Formal Framework and Security Notions
7.3.1 Framework
7.3.2 Security Notions
7.4 CPP-HSC Scheme
7.4.1 Setup
7.4.2 IDC-PIDKG
7.4.3 PKI-KG
7.4.4 Signcrypt
7.4.5 Unsigncrypt
7.5 Security Proof
7.6 Performance Analysis
7.6.1 Computational Cost
7.6.2 Communication/Storage Cost
7.7 Conclusion and Future Work
References
8 ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications
8.1 System Model
8.1.1 Security Requirements
8.2 Formal Syntax and Security Notions
8.2.1 Syntax
8.2.2 Security Notions
8.3 ECCHSC Protocol
8.3.1 Setup
8.3.2 IDC-KeyGen
8.3.3 PKI-KeyGen
8.3.4 Signcrypt
8.3.5 De-Signcrypt
8.4 Security Analysis
8.4.1 Security Proof
8.4.2 Security Requirements
8.5 Performance Analysis
8.5.1 Computational Overhead
8.5.2 Communication/Storage Overhead
8.6 Application
8.7 Conclusion and Future Work
References
9 CLC- and PKI-based Hybrid Signcryption Scheme Using Bilinear Pairing for Secure Heterogeneous Vehicle-to-Infrastructure Communications
9.1 System Model
9.2 Security Requirements
9.3 Computational Assumptions
9.4 Formal Framework and Security Notions
9.4.1 Framework
9.4.2 Security Notions
9.5 CP-CPPHSC Scheme
9.5.1 Setup
9.5.2 CLC-AIDPSKG
9.5.3 CLC-SPKG
9.5.4 PKI-SPKG
9.5.5 SC
9.5.6 USC
9.6 Security Proof
9.7 Performance Analysis
9.7.1 Computational Cost
9.7.2 Communication/Storage Cost
9.8 Conclusion and Future Work
References