LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thu...
Gespeichert in:
Veröffentlicht in: | Telkomnika 2023-08, Vol.21 (4), p.784-796 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 796 |
---|---|
container_issue | 4 |
container_start_page | 784 |
container_title | Telkomnika |
container_volume | 21 |
creator | Alazzawi, Murtadha A. Almalchy, Mohammed Tali Al-Shammari, Ahmed Al-Khaleefa, Ahmed Salih Albehadili, Hayder M. |
description | Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation. |
doi_str_mv | 10.12928/telkomnika.v21i4.24388 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2832845665</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2832845665</sourcerecordid><originalsourceid>FETCH-LOGICAL-c146t-6142c592e126cbbadc120ca02ea687981202ad03ae1d411cd55c2579f4aac653</originalsourceid><addsrcrecordid>eNpFkNtqAjEQhkNpoWJ9hgZ6vTaZ7CHpndiTVOhFvV9iNqtxD7FJ1uLbN2qhAzM_w_zMDB9C95RMKQjgj0G3je1608jpAahJp5Ayzq_QCBiBRIBg12hEc8GSmOQWTbzfkRgFgUzwEWqWXx-zZPH8hGe4NZtt-NGnir1WgzPhiGVf4UZH3TitO90HvHc2WGVbvJZeV9j20YNNFUcnf20dPuitUUMrHVa264beKBmM7e_QTS1bryd_Okar15fV_D1Zfr4t5rNlomiahySnKahMgKaQq_VaVooCUZKAljkvBI8dyIowqWmVUqqqLFOQFaJOpVR5xsbo4bI2Pvo9aB_KnR1cHy-WwBnwNMvPruLiUs5673Rd7p3ppDuWlJRntuU_2_LMtjyzZb9yX3G6</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2832845665</pqid></control><display><type>article</type><title>LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Alazzawi, Murtadha A. ; Almalchy, Mohammed Tali ; Al-Shammari, Ahmed ; Al-Khaleefa, Ahmed Salih ; Albehadili, Hayder M.</creator><creatorcontrib>Alazzawi, Murtadha A. ; Almalchy, Mohammed Tali ; Al-Shammari, Ahmed ; Al-Khaleefa, Ahmed Salih ; Albehadili, Hayder M.</creatorcontrib><description>Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.</description><identifier>ISSN: 1693-6930</identifier><identifier>EISSN: 2302-9293</identifier><identifier>DOI: 10.12928/telkomnika.v21i4.24388</identifier><language>eng</language><publisher>Yogyakarta: Ahmad Dahlan University</publisher><subject>Agreements ; Beacons ; Communication ; Computer science ; Costs ; Cryptography ; Curves ; Engineering ; Forgery ; Lightweight ; Mobile ad hoc networks ; Performance evaluation ; Privacy ; Protocol (computers) ; Public Key Infrastructure ; Traffic ; Vehicles</subject><ispartof>Telkomnika, 2023-08, Vol.21 (4), p.784-796</ispartof><rights>2023. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Alazzawi, Murtadha A.</creatorcontrib><creatorcontrib>Almalchy, Mohammed Tali</creatorcontrib><creatorcontrib>Al-Shammari, Ahmed</creatorcontrib><creatorcontrib>Al-Khaleefa, Ahmed Salih</creatorcontrib><creatorcontrib>Albehadili, Hayder M.</creatorcontrib><title>LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication</title><title>Telkomnika</title><description>Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.</description><subject>Agreements</subject><subject>Beacons</subject><subject>Communication</subject><subject>Computer science</subject><subject>Costs</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Engineering</subject><subject>Forgery</subject><subject>Lightweight</subject><subject>Mobile ad hoc networks</subject><subject>Performance evaluation</subject><subject>Privacy</subject><subject>Protocol (computers)</subject><subject>Public Key Infrastructure</subject><subject>Traffic</subject><subject>Vehicles</subject><issn>1693-6930</issn><issn>2302-9293</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpFkNtqAjEQhkNpoWJ9hgZ6vTaZ7CHpndiTVOhFvV9iNqtxD7FJ1uLbN2qhAzM_w_zMDB9C95RMKQjgj0G3je1608jpAahJp5Ayzq_QCBiBRIBg12hEc8GSmOQWTbzfkRgFgUzwEWqWXx-zZPH8hGe4NZtt-NGnir1WgzPhiGVf4UZH3TitO90HvHc2WGVbvJZeV9j20YNNFUcnf20dPuitUUMrHVa264beKBmM7e_QTS1bryd_Okar15fV_D1Zfr4t5rNlomiahySnKahMgKaQq_VaVooCUZKAljkvBI8dyIowqWmVUqqqLFOQFaJOpVR5xsbo4bI2Pvo9aB_KnR1cHy-WwBnwNMvPruLiUs5673Rd7p3ppDuWlJRntuU_2_LMtjyzZb9yX3G6</recordid><startdate>20230801</startdate><enddate>20230801</enddate><creator>Alazzawi, Murtadha A.</creator><creator>Almalchy, Mohammed Tali</creator><creator>Al-Shammari, Ahmed</creator><creator>Al-Khaleefa, Ahmed Salih</creator><creator>Albehadili, Hayder M.</creator><general>Ahmad Dahlan University</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20230801</creationdate><title>LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication</title><author>Alazzawi, Murtadha A. ; Almalchy, Mohammed Tali ; Al-Shammari, Ahmed ; Al-Khaleefa, Ahmed Salih ; Albehadili, Hayder M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c146t-6142c592e126cbbadc120ca02ea687981202ad03ae1d411cd55c2579f4aac653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Agreements</topic><topic>Beacons</topic><topic>Communication</topic><topic>Computer science</topic><topic>Costs</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Engineering</topic><topic>Forgery</topic><topic>Lightweight</topic><topic>Mobile ad hoc networks</topic><topic>Performance evaluation</topic><topic>Privacy</topic><topic>Protocol (computers)</topic><topic>Public Key Infrastructure</topic><topic>Traffic</topic><topic>Vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alazzawi, Murtadha A.</creatorcontrib><creatorcontrib>Almalchy, Mohammed Tali</creatorcontrib><creatorcontrib>Al-Shammari, Ahmed</creatorcontrib><creatorcontrib>Al-Khaleefa, Ahmed Salih</creatorcontrib><creatorcontrib>Albehadili, Hayder M.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East & South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Telkomnika</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alazzawi, Murtadha A.</au><au>Almalchy, Mohammed Tali</au><au>Al-Shammari, Ahmed</au><au>Al-Khaleefa, Ahmed Salih</au><au>Albehadili, Hayder M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication</atitle><jtitle>Telkomnika</jtitle><date>2023-08-01</date><risdate>2023</risdate><volume>21</volume><issue>4</issue><spage>784</spage><epage>796</epage><pages>784-796</pages><issn>1693-6930</issn><eissn>2302-9293</eissn><abstract>Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.</abstract><cop>Yogyakarta</cop><pub>Ahmad Dahlan University</pub><doi>10.12928/telkomnika.v21i4.24388</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1693-6930 |
ispartof | Telkomnika, 2023-08, Vol.21 (4), p.784-796 |
issn | 1693-6930 2302-9293 |
language | eng |
recordid | cdi_proquest_journals_2832845665 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Agreements Beacons Communication Computer science Costs Cryptography Curves Engineering Forgery Lightweight Mobile ad hoc networks Performance evaluation Privacy Protocol (computers) Public Key Infrastructure Traffic Vehicles |
title | LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T17%3A08%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=LSKA-ID:%20A%20lightweight%20security%20and%20key%20agreement%20protocol%20based%20on%20an%20identity%20for%20vehicular%20communication&rft.jtitle=Telkomnika&rft.au=Alazzawi,%20Murtadha%20A.&rft.date=2023-08-01&rft.volume=21&rft.issue=4&rft.spage=784&rft.epage=796&rft.pages=784-796&rft.issn=1693-6930&rft.eissn=2302-9293&rft_id=info:doi/10.12928/telkomnika.v21i4.24388&rft_dat=%3Cproquest_cross%3E2832845665%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2832845665&rft_id=info:pmid/&rfr_iscdi=true |