An Efficient Elliptic Curve Cryptography-Based Secure Communication with Privacy Preserving for Autonomous Vehicle

被引:0
|
作者
Xiao, Jiongen [1 ,2 ]
Liu, Yi [1 ,2 ,3 ]
Zou, Yi [4 ]
Li, Dacheng [5 ,6 ]
Leng, Tao [7 ,8 ]
机构
[1] Guangdong Univ Finances & Econ, Guangzhou 510320, Peoples R China
[2] Guangzhou Inst Software Applicat Technol, Guangzhou 510320, Peoples R China
[3] Guangdong Password Tech Serv Co Ltd, Guangzhou 511458, Peoples R China
[4] South China Univ Technol, Sch Microelect, Guangzhou 510320, Peoples R China
[5] South China Univ Technol, Guangzhou 510320, Peoples R China
[6] Guangzhou & Gosuncn Technol Grp Co Ltd, Guangzhou 510320, Peoples R China
[7] Chinese Acad Sci, Beijing 100085, Peoples R China
[8] Sichuan Police Coll, Intelligent Policing Key Lab Sichuan Prov, Luzhou 646000, Peoples R China
关键词
AUTHENTICATION SCHEME; INTERNET; PROTOCOL; FRAMEWORK;
D O I
10.1155/2024/5808088
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real-time data processing, an autonomous vehicle can provide barrier-free, safe, and sustainable transportation. At present, the rapid progress of the Internet of Things has promoted the continuous development of a fully autonomous vehicle. However, the autonomous vehicle network uses wireless communication technology, and the openness of its communication channel makes the communication process vulnerable to various security attacks. Therefore, this paper proposes a practical and efficient secure communication in the autonomous vehicle. This scheme utilizes elliptic curve cryptography, which can protect the security of multiparty communication between vehicle, cloud server, and user with lower computation and communication overhead. This paper provides security verification for the scheme by using Scyther. An informal security analysis shows that this scheme can resist multiple attacks. Through a comparative analysis and performance evaluation of the schemes, we found that the scheme improves security while maintaining efficiency.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Secure and Efficient RNS software implementation for Elliptic Curve Cryptography
    Fournaris, Apostolos P.
    Papachristodoulou, Louiza
    Sklavos, Nicolas
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 86 - 93
  • [22] Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment
    Zhai, Haonan
    Deng, Miaolei
    Wu, Huanmei
    SYMMETRY-BASEL, 2024, 16 (07):
  • [23] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [24] A SECURE COMMUNICATION FOR HEALTHCARE SYSTEM USING WEARABLE DEVICES BASED ON ELLIPTIC CURVE CRYPTOGRAPHY
    Pandiaraja, P.
    Subha, S.
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2019, : 3 - 9
  • [25] Hyperelliptic Curve Cryptography-Based Lightweight Privacy-Aware Secure Authentication Scheme for Vehicular Ad Hoc Network
    Yadav, Kirti A.
    Vijayakumar, P.
    INTELLIGENT EMBEDDED SYSTEMS, ICNETS2, VOL II, 2018, 492 : 83 - 90
  • [26] An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography
    Department of Computer Engineering, S. V. National Institute of Technology, Ichhchhanath, Surat, Gujarat, India
    不详
    Int. J. Netw. Secur., 3 (328-339): : 328 - 339
  • [27] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [28] THE IMPLEMENTATION OF A CRYPTOGRAPHY-BASED SECURE OFFICE SYSTEM
    MUELLERSCHLOER, C
    WAGNER, NR
    AFIPS CONFERENCE PROCEEDINGS, 1982, 51 : 487 - +
  • [29] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [30] An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System
    Lee, Chin-I
    Chien, Hung-Yu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,