2,066
Views
5
CrossRef citations to date
0
Altmetric
Articles

A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles

&
Pages 1089-1118 | Received 09 Jan 2022, Accepted 17 Feb 2022, Published online: 09 Mar 2022

References

  • Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99. https://doi.org/10.1016/j.sysarc.2019.101636
  • Amit, D., Neeraj, K., Mukesh, S., Mohammad, S. O., & Kuei, F. H. (2016). Secure message communication among vehicles using elliptic curve cryptography in smart cities. International Conference on Computer, Information and Telecommunication Systems. https://ieeexplore.ieee.org/document/7546385
  • Daisy, P. B. T., Albert, R. S., & Vimal, J. A. (2015). Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing. International Journal of Computer Science and Technology, https://www.researchgate.net/publication/305913586
  • Dan, B. X., Boyen, H., & Shacham. (2004). Short group signatures. Lecture Notes in Computer Science, 3152, 41–55. https://doi.org/10.1007/978-3-540-28628-8_3
  • Dhanashree, T., Rohan, S., Het, S., Nikita, N., & Vishal, P. (2018). Prominence of ECDSA over RSA Digital Signature Algorithm. 2nd International Conference on IoT in Social, Mobile, Analytics and Cloud. https://ieeexplore.ieee.org/document/8653689/
  • Hong, Z., Jingyu, W., Jie, C., & Shun, Z. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620–629. https://ieeexplore.ieee.org/document/7787005 https://doi.org/10.1109/TST.2016.7787005
  • Hu, J., Liang, W., Hosam, O., Hsieh, M. Y., & Su, X. (2021). 5GSS: A framework for 5G-secure-smart healthcare monitoring. Connection Science, 1–23. https://doi.org/10.1080/09540091.2021.1977243
  • Hu, X., Guobin, Z., Zhong, C., & Fagen, L. (2013). Efficient communication scheme with confidentiality and privacy for vehicular networks. Computers and Electrical Engineering, 39(6), 1717–1725. https://doi.org/10.1016/j.compeleceng.2012.11.009
  • Hua, Y. L. (2021). Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. Connection Science, 1–27. https://doi.org/10.1080/09540091.2021.1990212.
  • Insaf, U., Muhammad, A. K., & Mohammed, H. A. (2021). Anonymous certificateless Signcryption Scheme for secure and efficient deployment of Internet of vehicles. Sustainability Journal MDPI, 13(19), 10891. https://doi.org/10.3390/su131910891
  • Jia, W., Jianqiang, L., Hui, H. W., Leo, Y. Z., Lee, M. C., & Qiuzhen, L. (2019). Dynamic scalable elliptic curve cryptographic scheme and its application to in-vehicle security. IEEE Internet of Things Journal, 6(4), 5892–5901. https://ieeexplore.ieee.org/document/8463502
  • Joon, Y. L., Sung, J. Y., Myeong, H. K., Young, H. P., Sang, W. L., & Bo, H. C. (2020). Secure key agreement and authentication protocol for message confirmation in vehicular cloud computing. Applied Sciences, 10, 18. https://doi.org/10.3390/app10186268
  • Kulathunge, A., & Dayarathna, H. (2019). Communication framework for vehicular ad-hoc networks using Blockchain: Case study of Metro Manila Electric Shuttle automation project. In Proceedings of the 2019 International Research Conference on Smart Computing and Systems Engineering. pp. 85–90. https://ieeexplore.ieee.org/document/8842814
  • Kuljeet, K., Sahil, G., Georges, K., François, G., Syed Hassan, A., & Mohsen, G. (2019). A secure, lightweight, and privacy preserving authentication scheme for V2G connections in Smart Grid. IEEE Conference on Computer Communications Workshops. https://ieeexplore.ieee.org/document/8845140
  • Lin, H. Y., Hsieh, M. Y., & Li, K. C. (2016). Flexible group key management and secure data transmission in mobile device communications using elliptic curve Diffie-Hellman cryptographic system. International Journal of Computational Science and Engineering, 12(1), 47. https://doi.org/10.1504/IJCSE.2016.074558
  • Maxim, R., & Jean, P. H. (2007). Securing vehicular ad hoc networks. Journal of Computer Security. Special Issue on Security of Ad Hoc and Sensor Networks, 15(1), 39–68. https://doi.org/10.5555/1370616.1370618
  • Mu, H., Mengli, Z., Pengzhou, C., Zhikun, Y., & Haixin, Q. (2021). Implementing an efficient secure attribute based encryption system for IoV using association rules. Symmetry Journal MDPI, 13(7), https://doi.org/10.3390/sym13071177
  • Mukti, R., Nigar, S., Himel, D., & Hossain, A. (2018). A new version of Kerberos authentication protocol using ECC and Threshold Cryptography for Cloud Security. Joint 7th International Conference on Informatics, Electronics & Vision and 2nd International Conference on Imaging, Vision & Pattern Recognition. https://ieeexplore.ieee.org/document/8641010
  • Nils, G., Arun, P., Avinderpal, W., Hans, E., & Sheueling, C. S. (2004). Comparing elliptic Curve Cryptography and RSA on 8-Bit CPUs. Lecture Notes in Computer Science, 3156, 119–132. https://doi.org/10.1007/978-3-540-28632-5_9
  • Nisha, M., Priyadarsi, N., Arushi, A., Xiangjian, H., Deepak, P., & Puthal, D. (2018). Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering. pp. 674–679. https://ieeexplore.ieee.org/document/8455967
  • Pandi, V., Maria, A., Sergei, A. K., & Joel, J. P. C. R. (2022). An anonymous batch authentication and key exchange protocols for 6G enabled VANETs. IEEE Transactions on Intelligent Transportation Systems, 23(2), 1630–1638. https://doi.org/10.1109/TITS.2021.3099488
  • Ram, R. A., & Manoj, A. (2013). Elliptic curve Diffie-Hellman Key Exchange Algorithm for securing hypertext information on Wide Area Network. International Journal of Computer Science and Information Technologies, 4(2), 363–368. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.9663
  • Sathishkumar, N., & Rajakumar, K. (2017). A study on vehicle to vehicle collision prevention using Fog, Cloud, Big Data and Elliptic Curve Security based on Threshold Energy Efficient Protocol. Second International Conference on Recent Trends and Challenges in Computational Models. https://ieeexplore.ieee.org/document/8057548
  • Shoma, K., Yasuyuki, N., Shunsuke, M., & Thomas, A. (2015). Volunteer computing for solving an Elliptic Curve Discrete Logarithm Problem. Third International Symposium on Computing and Networking. https://ieeexplore.ieee.org/document/7424699
  • Subodh, C., & Rajesh, D. (2020). Secured map building using Elliptic Curve Integrated Encryption Scheme and Kerberos for Cloud-based Robots. Fourth International Conference on Computing Methodologies and Communication. https://ieeexplore.ieee.org/document/9076465
  • Vijayakumar, P., Azees, M., Chang, V., Deborah, J., & Balamurugan, B. (2017). Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Computing, 20(3), 2439–2450. https://doi.org/10.1007/s10586-017-0848-x
  • Xia, X., Ji, S., Vijayakumar, P., Shen, J., & Rodrigues, J. (2021). An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities. International Journal of Distributed Sensor Networks, 17(6). https://doi.org/10.1177/15501477211026804.
  • Xiao, L., Xie, S., Han, D., Liang, W., Guo, J., & Chou, W. K. (2021). A lightweight authentication scheme for telecare medical information system. Connection Science, 33(1), 1–17. https://doi.org/10.1080/09540091.2021.1889976
  • Xiaodong, L., & Rongxing, L.. (2015). GSIS: Group signature and ID-based signature-based secure and privacy preserving protocol. In Vehicular Ad Hoc network security and privacy (pp. 21–49). Wiley-IEEE Press. https://onlinelibrary.wiley.com/doi/10.1002/9781119082163.ch2
  • Xiaodong, L., Xiaoting, S., Pin, H. H., & Xuemin, S. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442–3456. https://ieeexplore.ieee.org/document/4357367 https://doi.org/10.1109/TVT.2007.906878
  • Xu, Z., Liang, W., Li, K. C., Xu, J., & Jin, H. (2021). A blockchain-based roadside unit-assisted authentication and key agreement protocol for Internet of vehicles. Journal of Parallel and Distributed Computing, 149, 29–39. https://doi.org/10.1016/j.jpdc.2020.11.003
  • Yasin, G., & Erkan, A. (2021). Design and implementation of an efficient Elliptic Curve Digital Signature Algorithm (ECDSA). IEEE International IOT, Electronics and Mechatronics Conference. https://ieeexplore.ieee.org/document/9422589
  • Yong, J. K., Yong, M. K., Yong, J. C., & Hyong, C. O. (2013). An efficient bilinear pairing-free certificateless two-party authenticated Key Agreement Protocol in the eCK model. Journal of Theoretical Physics and Cryptography, 3, 1–10. https://arxiv.org/abs/1304.0383
  • Zhang, C., Ho, P., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Network, 7(8), 1851–1865. https://doi.org/10.1007/s11276-011-0383-2
  • Zhang, L., Xu, J., Obaidat, M., Li, X., & Vijayakumar, P. (2021). A PUF-based lightweight authentication and key agreement protocol for smart UAV networks. IET Communications, 1–18. https://doi.org/10.1049/cmu2.12295
  • Zhe, L., Jian, W., Zhi, H., & Hwajeong, S. (2017). Efficient Elliptic Curve Cryptography for embedded devices. ACM Transactions on Embedded Computing Systems, 16(2). https://doi.org/10.1145/2967103