2021
DOI: 10.3390/s21092900
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Certificate-Less Aggregate Signature Scheme with Conditional Privacy-Preservation for Vehicular Ad Hoc Networks Enhanced Smart Grid System

Abstract: Vehicular Ad hoc networks (VANETs) as spontaneous wireless communication technology of vehicles has a wide range of applications like road safety, navigation and other electric car technologies, however its practicability is greatly hampered by cyber-attacks. Due to message broadcasting in an open environment during communication, VANETs are inherently vulnerable to security and privacy attacks. However to address the cyber-security issues with optimal computation overhead is a matter of current security resea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 57 publications
0
7
0
Order By: Relevance
“…We mainly focus on the computational overhead of the process of signature verification, while the operations that are very light like the addition operation in Z * q and the multiplication operation in Z * q will not be considered. By using the computation execution times for various dominant time-consuming cryptographic operations summarized in Table 2, we carry out an efficiency analysis of our proposed scheme compared with two related works: one [35] is based on the bilinear pairing operation, and the other [36] is a certificateless scheme based on ECC. We conduct the computation analysis in terms of the three phases of the signature, individual verification, and aggregate verification.…”
Section: Efficiency Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…We mainly focus on the computational overhead of the process of signature verification, while the operations that are very light like the addition operation in Z * q and the multiplication operation in Z * q will not be considered. By using the computation execution times for various dominant time-consuming cryptographic operations summarized in Table 2, we carry out an efficiency analysis of our proposed scheme compared with two related works: one [35] is based on the bilinear pairing operation, and the other [36] is a certificateless scheme based on ECC. We conduct the computation analysis in terms of the three phases of the signature, individual verification, and aggregate verification.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…In a similar manner, the computation costs for the other two related schemes can be calculated. In [35], four scalar multiplication operations, two point addition operations, two map-to-point hash function operations in the bilinear pairing operation, and one hash function operation (4T [36], the overall load is (0.442 + 1.330) ms = 1.772 ms. Subsequently, our scheme has an overall computation load of (0.442 + 0.885) ms = 1.327 ms, which is better than other schemes as shown in Figure 4.…”
Section: Efficiency Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Vallent et al [ 15 ] proposed a certificateless signature scheme based on elliptic curve cryptography that preserves privacy in VANET. Their scheme sorts out the KGC escrow problem and uses time and pseudo-identity to validate communicating vehicles while excluding bilinear pairings.…”
Section: Related Workmentioning
confidence: 99%
“…Source authentication and message integrity of traffic-related data are critical security requirement in VANET. By easily safeguarding moving cars, RSUs, Application Servers, and roadside sensors, compliance with these security criteria ensures the confidence and proper performance of all flexible technologies that come with a VANET system (Vallent et al, 2021). A lot of progress has been made towards VANET, but security challenges still require more research attention (Afzal and Kumar, 2020).…”
Section: Review Of Authentication Schemesmentioning
confidence: 99%