2022
DOI: 10.21203/rs.3.rs-2310655/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Secured V2x Communication Using Optimized Prime Field Ecc Architecture

Abstract: In today's world, wireless communication pervades every part of life and is currently advancing to include transportation. Vehicles can communicate with one another, with pedestrians, with roadside infrastructure, and other moving objects using the basic type of vehicular communication known as vehicle-to-everything (V2X) communication. In addition to road safety, security and privacy issues must be taken into consideration in V2X activities. The objective of this research is to ensure a high level of security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 30 publications
0
0
0
Order By: Relevance
“…Moreover, Fuzzy logic can struggle with complex data relationships that may require more sophisticated models to accurately capture the underlying patterns. The study in [94] proposed a Karatsuba-based ECC (Elliptic Curve Cryptography) processor for security architecture to ensure a high level of data integrity and privacy in various forms of V2X communication. Karatsuba-based ECC requires more memory than traditional ECC techniques, as it involves precomputing some values and storing them in memory for later use.…”
Section: Integrity In V2xmentioning
confidence: 99%
“…Moreover, Fuzzy logic can struggle with complex data relationships that may require more sophisticated models to accurately capture the underlying patterns. The study in [94] proposed a Karatsuba-based ECC (Elliptic Curve Cryptography) processor for security architecture to ensure a high level of data integrity and privacy in various forms of V2X communication. Karatsuba-based ECC requires more memory than traditional ECC techniques, as it involves precomputing some values and storing them in memory for later use.…”
Section: Integrity In V2xmentioning
confidence: 99%