My Account Log in

1 option

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks / by Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li.

Springer eBooks EBA - Engineering Collection 2022 Available online

View online
Format:
Book
Author/Creator:
ʻAlī, Ikrām, author.
Series:
Engineering Series
Language:
English
Subjects (All):
Wireless communication systems.
Mobile communication systems.
Computer networks--Security measures.
Computer networks.
Cryptography.
Data encryption (Computer science).
Automotive engineering.
Wireless and Mobile Communication.
Mobile and Network Security.
Cryptology.
Automotive Engineering.
Local Subjects:
Wireless and Mobile Communication.
Mobile and Network Security.
Cryptology.
Automotive Engineering.
Physical Description:
1 online resource (237 pages)
Edition:
1st ed. 2022.
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2022.
Summary:
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
Contents:
Introduction
Preliminaries
IDC-Based Authentication Scheme using Bilinear Pairings for V2I Communications
IDC-Based Authentication Scheme using ECC for V2V Communications
CLC-Based Authentication Scheme using Bilinear Pairings for V2I Communications
CLC-Based Authentication Scheme using ECC for V2V Communications
IDC to PKI-Based Hybrid Signcryption Scheme using Bilinear Pairings for Heterogeneous V2I Communications.
Notes:
Includes bibliographical references.
Other Format:
Print version: Ali, Ikram Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
ISBN:
981-16-8585-1
981-16-8586-X
OCLC:
1292354139

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account