Abstract
The motivation for the secured message conveyance in traffic vehicle communication is to exchange information safely through the unreliable wireless medium to apprise the other nodes of a traffic system like the control room, different vehicles upon crisis circumstances like accidents, safety alarms, and area security. The newly designed Message Conveyance protocol would be able to be utilized for secure key exchange and ensuing encryption of the messages. This paper proposes a novel strategy for secure data correspondence between the smart city's vehicular nodes which uses the fundamentals of Elliptic Curve Cryptography (ECC) for key agreement and satellite communication for the transmission of messages over vehicles. The proposed protocol achieves a remarkable level of security among existing works with lower communication bits for the computations in security algorithm and also consumes a moderate speed of encryption.
Similar content being viewed by others
References
Shen, J., Zhou, T., Lai, C. F., Li, J., & Li, X. (2017). Hierarchical trust level evaluation for pervasive social networking. IEEE Access,5(99), 1178–1187. https://doi.org/10.1109/ACCESS.2017.2652486.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security,11(11), 2594–2608. https://doi.org/10.1109/TIFS.2016.2590944.
Leng, Y., & Zhao, L. (2011). Novel design of intelligent internet-of-vehicles management system based on cloud-computing and Internet-of-Things. In International conference on electronic and mechanical engineering and information technology (EMEIT, pp 3190–3193). Published in IEEE Xplore. https://doi.org/10.1109/EMEIT.2011.6023763.
Liang, W., Li, Z., Zhang, H., Wang, S., & Bie, R. (2015). Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends. International Journal of Distributed Sensor Networks, Special Issue Big Data and Knowledge Extraction for Cyber-Physical Systems. https://doi.org/10.1155/2015/745303.
Lazarevic, A., Srivastava, J., & Kumar, V. (2002). Cyber threat analysis—A key enabling technology for the objective force (a case study in network intrusion detection). In Proceedings of the IT/C4ISR, 23rd Army Science conference.
Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Xu, J., & Xiong, Y. (2015). Security and privacy in the Internet of Vehicles. In International conference on identification, information, and knowledge in the Internet of Things. Published in IEEE Xplore. https://doi.org/10.1109/IIKI.2015.33.
Washington, L. C. (2008). Elliptic curves number theory and cryptography (2nd Ed.). Taylor and Francis Group. https://doi.org/10.1201/9781420071474.
Ji, S., Chen, T., & Zhong, S. (2015). Wormhole attack detection algorithms in wireless network coding systems. IEEE Transactions on Mobile Computing,14(3), 660–674. https://doi.org/10.1109/TMC.2014.2324572.
Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H.-M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks,11(7), 2096–2114. https://doi.org/10.1016/j.adhoc.2012.02.009.
Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solution. Vehicular Communications,1(2), 53–66. https://doi.org/10.1016/j.vehcom.2014.05.001.
Rawat, D. B., Yan, G., Bista, B., & Weigle, M. C. (2014). Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc and Sensor Wireless Networks (AHSWN) Journal, 1–23.
Choi, Y., Lee, D., Won, D., Kim, J., Jung, J., & Nam, J. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. IEEE Sensors,14(6), 10081–10106. https://doi.org/10.3390/s140610081.
Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks,20, 96–112. https://doi.org/10.1016/j.adhoc.2014.03.009.
Wazid, M., Das, A., Kumar, N., Odelu, V., Reddy, G., Par, K., et al. (2017). Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access,5, 14966–14980. https://doi.org/10.1109/ACCESS.2017.2723265.
Xue, K., Ma, C., Hong, P., & Ding, R. (2012). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications,36, 316–323. https://doi.org/10.1016/j.ins.2015.02.010.
Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, H. W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors,11(5), 4767–4779. https://doi.org/10.3390/s110504767.
Castillo, J. C., Zeadally, S., & Ibañez, J. G. (2017). Internet of Vehicles: Architecture, protocols, and security. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2017.2690902.
Miller, V. S. (2000). Use of elliptic curves in cryptography. In: Advances in cryptology—Proceedings of CRYPTO’85 (Vol. 218, pp 417–426). Springer. https://doi.org/10.1007/3-540-39799-X_31.
Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Springer. https://doi.org/10.1007/b97644.
Li, C.-T., Hwang, M.-S., & Chu, Y.-P. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications,31(12), 2803–2814.
Lee, J.-S., & Chang, C.-C. (2007). Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications,30(4), 1377–1396.
Li, W.-M., Wen, Q.-Y., Su, Q., & Jin, Z.-P. (2012). An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications,35(2), 188–195.
Lee, C.-C., Chen, C. T., Wu, P.-H., & Chen, T.-Y. (2013). Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Computer Digital Technology,7(1), 48–55.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Poomagal, C.T., Sathish Kumar, G.A. ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV). Wireless Pers Commun 113, 1359–1377 (2020). https://doi.org/10.1007/s11277-020-07285-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07285-3