Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic c...

Full description

Bibliographic Details
Main Authors: Ali, Ikram, Chen, Yong (Author), Faisal, Mohammad (Author), Li, Meng (Author)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2022, 2022
Edition:1st ed. 2022
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02858nmm a2200397 u 4500
001 EB002010543
003 EBX01000000000000001173442
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220201 ||| eng
020 |a 9789811685866 
100 1 |a Ali, Ikram 
245 0 0 |a Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks  |h Elektronische Ressource  |c by Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li 
250 |a 1st ed. 2022 
260 |a Singapore  |b Springer Nature Singapore  |c 2022, 2022 
300 |a XIV, 230 p. 57 illus., 44 illus. in color  |b online resource 
505 0 |a Introduction -- Preliminaries -- IDC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- IDC-Based Authentication Scheme using ECC for V2V Communications -- CLC-Based Authentication Scheme using Bilinear Pairings for V2I Communications -- CLC-Based Authentication Scheme using ECC for V2V Communications -- IDC to PKI-Based Hybrid Signcryption Scheme using Bilinear Pairings for Heterogeneous V2I Communications 
653 |a Wireless communication systems 
653 |a Mobile and Network Security 
653 |a Computer networks / Security measures 
653 |a Wireless and Mobile Communication 
653 |a Mobile communication systems 
653 |a Cryptography 
653 |a Automotive Engineering 
653 |a Automotive engineering 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
700 1 |a Chen, Yong  |e [author] 
700 1 |a Faisal, Mohammad  |e [author] 
700 1 |a Li, Meng  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-981-16-8586-6 
856 4 0 |u https://doi.org/10.1007/978-981-16-8586-6?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.384 
520 |a This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc