Efficient Offline/Online Heterogeneous-Aggregated Signcryption Protocol for Edge Computing-Based Internet of Vehicles

被引:3
|
作者
Ali, Ikram [1 ,2 ]
Chen, Yong [1 ]
Li, Jianqiang [2 ]
Wakeel, Abdul [3 ]
Pan, Chengwei [1 ]
Ullah, Niamat [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu 611731, Peoples R China
[2] Shenzhen Univ, Natl Engn Lab Big Data Syst Comp Technol, Shenzhen 518060, Peoples R China
[3] Natl Univ Sci & Technol, Mil Coll Signals, Dept Elect Engn, Islamabad 44000, Pakistan
[4] Univ Buner, Dept Comp Sci, Buner 19290, Pakistan
基金
中国国家自然科学基金;
关键词
Protocols; Security; Cryptography; Computational modeling; Cloud computing; Public key; Internet of Vehicles; heterogeneous signcryption; offline; online; edge computing; SCHEME; COMMUNICATION; AUTHENTICATION; SECURITY;
D O I
10.1109/TITS.2023.3296974
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The Internet of Vehicles (IoV), which is an extension of traditional vehicular ad hoc networks (VANETs), ensures the provision of safe and efficient vehicular communications. However, the burgeoning IoV faces several challenges in terms of traffic information security and vehicle identity privacy during wireless transmission. Generally, vehicles move faster on the highway necessitating the use of reliable technology to communicate with infrastructure on the roadside efficiently and securely. Lately, researchers have proposed several different message dissemination methods for vehicle-to-infrastructure (V2I) communications. However, they suffer from different concerns (i.e., security weaknesses, computationally heavy, and high communication/storage overhead); therefore, they are unreliable for delay-sensitive communications. To cope with this, we come up with an enhanced certificateless and identity-based offline/online heterogeneous signcryption (CIOOHSC) protocol for V2I communications in edge computing-based IoV to simultaneously achieve confidentiality, integrity, authentication, non-repudiation, and identity anonymity in a logically single step. The CIOOHSC protocol allows a vehicle in certificateless cryptography to transmit a message to an edge node in identity-based cryptography. In the online phase, there are no point multiplication operations as they are already carried out in the offline phase. This reduces the computational load considerably in the online phase. Furthermore, our protocol enables the edge node to aggregate multiple messages and process them simultaneously to boost performance. The CIOOHSC protocol's security is proved in the random oracle model under the hard problems' assumptions. Our protocol outperforms recent similar schemes in terms of computational complexity, communication/storage overhead, and average transmission delay, according to the performance evaluation findings.
引用
收藏
页码:14506 / 14519
页数:14
相关论文
共 50 条
  • [21] Design of Secure and Efficient Authentication Protocol for Edge Computing-Based Augmented Reality Environments
    Kwon, Deokkyu
    Park, Youngho
    ELECTRONICS, 2024, 13 (03)
  • [22] A security communication model based on certificateless online/offline signcryption for Internet of Things
    Luo, Ming
    Tu, Min
    Xu, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1560 - 1569
  • [23] Edge computing-Based mobile object tracking in internet of things
    Wu, Yalong
    Tian, Pu
    Cao, Yuwei
    Ge, Linqiang
    Yu, Wei
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (01):
  • [24] AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
    Wazid, Mohammad
    Bagga, Palak
    Das, Ashok Kumar
    Shetty, Sachin
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8804 - 8817
  • [25] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Jianchang Lai
    Yi Mu
    Fuchun Guo
    International Journal of Information Security, 2017, 16 : 299 - 311
  • [26] An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles
    Ullah, Insaf
    Khan, Muhammad Asghar
    Khan, Fazlullah
    Jan, Mian Ahmad
    Srinivasan, Ram
    Mastorakis, Spyridon
    Hussain, Saddam
    Khattak, Hizbullah
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2688 - 2697
  • [27] Moisture Computing-Based Internet of Vehicles (IoV) Architecture for Smart Cities
    Tufail, Ali
    Namoun, Abdallah
    Abi Sen, Adnan Ahmed
    Kim, Ki-Hyung
    Alrehaili, Ahmed
    Ali, Arshad
    SENSORS, 2021, 21 (11)
  • [28] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (03) : 299 - 311
  • [29] Edge Computing-Based Internet of Things Framework for Indoor Occupancy Estimation
    Rastogi, Krati
    Lohani, Divya
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2020, 11 (04) : 16 - 37
  • [30] Comments on "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment"
    Saleem, Muhammad Asad
    Mahmood, Khalid
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4671 - 4675