ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)

The motivation for the secured message conveyance in traffic vehicle communication is to exchange information safely through the unreliable wireless medium to apprise the other nodes of a traffic system like the control room, different vehicles upon crisis circumstances like accidents, safety alarms, and area security. The newly designed Message Conveyance protocol would be able to be utilized for secure key exchange and ensuing encryption of the messages. This paper proposes a novel strategy for secure data correspondence between the smart city's vehicular nodes which uses the fundamentals of Elliptic Curve Cryptography (ECC) for key agreement and satellite communication for the transmission of messages over vehicles. The proposed protocol achieves a remarkable level of security among existing works with lower communication bits for the computations in security algorithm and also consumes a moderate speed of encryption.

[1]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[2]  Cheng-Chi Lee,et al.  Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..

[3]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[4]  Peilin Hong,et al.  A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[5]  Vanga Odelu,et al.  Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks , 2017, IEEE Access.

[6]  Shahrokh Valaee,et al.  Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends , 2015, AdHocNets 2015.

[7]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[8]  Qiaoyan Wen,et al.  An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network , 2012, Comput. Commun..

[9]  Gongjun Yan,et al.  Trust On the Security of Wireless Vehicular Ad-hoc Networking , 2015, Ad Hoc Sens. Wirel. Networks.

[10]  Jian Shen,et al.  Hierarchical Trust Level Evaluation for Pervasive Social Networking , 2017, IEEE Access.

[11]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[12]  Ying Leng,et al.  Novel design of intelligent internet-of-vehicles management system based on cloud-computing and Internet-of-Things , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[13]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[14]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[15]  Naveen K. Chilamkurti,et al.  A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..

[16]  Chin-Chen Chang,et al.  Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..

[17]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[18]  Tao Zhang,et al.  Security and Privacy in the Internet of Vehicles , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).

[19]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[20]  Donghoon Lee,et al.  Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.

[21]  Sheng Zhong,et al.  Wormhole Attack Detection Algorithms in Wireless Network Coding Systems , 2015, IEEE Transactions on Mobile Computing.

[22]  Sherali Zeadally,et al.  Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.