DOI QR코드

DOI QR Code

A PERFORMANCE IMPROVEMENT OF ANEL SCHEME THROUGH MESSAGE MAPPING AND ELLIPTIC CURVE CRYPTOGRAPHY

  • Received : 2023.03.05
  • Published : 2023.03.30

Abstract

The vehicular ad hoc network (VANET) is currently an important approach to improve personal safety and driving comfort. ANEL is a MAC-based authentication scheme that offers all the advantages of MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the given scheme, ANEL, can achieve the security objectives such as authentication, privacy preservation, non-repudiation, etc. In addition, our scheme provides effective bio-password login, system key update, bio-password update, and other security services. Additionally, in the proposed scheme, the Trusted Authority (TA) can disclose the source driver and vehicle of each malicious message. The heavy traffic congestion increases the number of messages transmitted, some of which need to be secretly transmitted between vehicles. Therefore, ANEL requires lightweight mechanisms to overcome security challenges. To ensure security in our ANEL scheme we can use cryptographic techniques such as elliptic curve technique, session key technique, shared key technique and message authentication code technique. This article proposes a new efficient and light authentication scheme (ANEL) which consists in the protection of texts transmitted between vehicles in order not to allow a third party to know the context of the information. A detail of the mapping from text passing to elliptic curve cryptography (ECC) to the inverse mapping operation is covered in detail. Finally, an example of application of the proposed steps with an illustration

Keywords

References

  1. Ghosh M, Varghese A, Kherani A, Gupta A. Distributed misbehavior detection in VANETs. IEEE Wireless Communications and Networking Conference. IEEE, 2009. 
  2. Federal Communications Commission. Amendment of the commission's rules regarding dedicated short-range communication service in the 5.850-5.925 ghz band. https://www.fcc.gov/document/amendment-commissions-rules-regarding-dedicated-short-range accessed January 2022. 
  3. Draft guide for Wireless Access in Vehicular Environment (WAVE) Architecture', https://ieeexplore.ieee.org/document/6531627/ accessed January 2022. 
  4. Benyamina Z, Benahmed K, Bounaama F. ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks. Computer Networks 164 (2019): 106899. 
  5. Li B, Zhang D, Sun L, Chen C. Hunting or waiting? Discovering passenger-finding strategies from a large-scale real-world taxi dataset. 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, 2011. 
  6. Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 1987; 48(177): 201-209.  https://doi.org/10.1090/S0025-5718-1987-0866109-5
  7. Barreto PSLM, Libert B, McCullagh N, Quisquater JJ. Efficient and provably-secure identity-based signatures and sign encryption from bilinear maps. In Advances in Cryptology - ASIACRYPT 2005, vol. 3788, Lecture Notes in Computer Science. Springer: Chennai, India; 515-532. 
  8. Odlyzko AM. Discrete logarithms and their cryptographic significance. In Advances in Cryptology: Proceedings of Eurocrypt 84. Springer-Verlag: New York, 1985; 224-314. 
  9. ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; IT 31: 469-472.  https://doi.org/10.1109/TIT.1985.1057074
  10. Pateriya RK, Vasudevan S. Elliptic curve cryptography in constrained environments: a review. IEEE 2011 International Conference on Communication Systems and Network Technologies, Bhopal,India, Sep-2011 ; 120-124. 
  11. Diffie W, Hellman M. New directions in cryptography. IEEE Transactions on Information Theory 1976; 22: 644-654. DOI:10.1109/tit.1976.1055638. 
  12. Hankerson D, Menezes A, Vanstone S. Guide to Elliptic Curve Cryptography. Springer: New York, 2004. ISBN 978-0-387-21846-5. 
  13. Rosen K. Discrete Mathematics and Its Applications, 8th edition. McGraw Hill Higher Education: New York 2018. ISBN 10: 125967651X. ISBN 13: 9781259676512. 
  14. Sengupta A, Kumar R U. Message mapping and reverse mapping in elliptic curve cryptosystem. Security and communication networks. Security Comm. Networks (2016) 
  15. Lewand R. Cryptological mathematics. The Mathematical Association of America 2000, ISBN-13: 978-0883857199. 
  16. Monika , Tomar T , Kumar V , Kumar Y . Implementation of Elliptic Curve Cryptography. International Journal of Electrical Engineering and Technology (IJEET), Volume 11, Issue 2, March-April 2020 
  17. Christof P, Jan P. Understanding Cryptography: A textbook for Students and Practitioners. Springer-Verlag Berlin Heidelberg 2014. ISBN: 978-3642446498 
  18. Muthukuru J, Sathyanarayana B. Fixed and variable size text based message mapping techniques using ECC. Global Journal of Computer Science and Technology 2012; 12(3): 12-18, Version 1.0. 
  19. Laiphrakpam D S, Khumanthem M S. Implementation of Text Encryption using Elliptic Curve Cryptography. Procedia Computer Science 54 (2015) 73 - 82. Organizing committee of the Eleventh International Multi-Conference on Information Processing-2015. https://doi.org/10.1016/j.procs.2015.06.009