Ullah, Insaf and Khan, Muhammad Asghar and Kumar, Neeraj and Abdullah, Ako Muhammad and AlSanad, Abeer Abdulaziz and Noor, Fazal (2023) A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles. IEEE Transactions on Vehicular Technology, 72 (3). pp. 3989-3998. DOI https://doi.org/10.1109/tvt.2022.3220041
Ullah, Insaf and Khan, Muhammad Asghar and Kumar, Neeraj and Abdullah, Ako Muhammad and AlSanad, Abeer Abdulaziz and Noor, Fazal (2023) A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles. IEEE Transactions on Vehicular Technology, 72 (3). pp. 3989-3998. DOI https://doi.org/10.1109/tvt.2022.3220041
Ullah, Insaf and Khan, Muhammad Asghar and Kumar, Neeraj and Abdullah, Ako Muhammad and AlSanad, Abeer Abdulaziz and Noor, Fazal (2023) A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles. IEEE Transactions on Vehicular Technology, 72 (3). pp. 3989-3998. DOI https://doi.org/10.1109/tvt.2022.3220041
Abstract
The Internet of Vehicles (IoVs) is a wireless network of intelligent and autonomous vehicles and Roadside Units (RSUs), which work together to improve transportation services. On the one hand, this revolutionary mode of transportation optimizes traffic efficiency and reduces congestion and accidents; on the other hand, it raises security and privacy concerns. As a result, keeping the security and privacy aspects of such vital systems should be a top concern, as security and privacy flaws can have devastating implications. In addition, each vehicle's on-board unit (OBU) has a certain amount of processing and storage power. As a result, in areas with high traffic density, vehicles that need to verify messages have a very high computational overhead. In this article, we propose a conditional privacy-preserving heterogeneous signcryption scheme for IoV utilizing Hyperelliptic Curve Cryptography (HECC) operation. The security robustness of the proposed scheme has been evaluated with the Random Oracle Model (ROM), a formal security evaluation method. In addition, relevant existing schemes are compared to the proposed scheme in terms of computation and communication costs. The findings demonstrate that the proposed scheme is both efficient and secure, validating its viability.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Internet of vehicles (IoV); security; authentication; HECC |
Divisions: | Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 20 Aug 2025 16:26 |
Last Modified: | 20 Aug 2025 16:27 |
URI: | http://repository.essex.ac.uk/id/eprint/40765 |