2023
DOI: 10.12928/telkomnika.v21i4.24388
|View full text |Cite
|
Sign up to set email alerts
|

LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication

Abstract: Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and ide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 37 publications
0
1
0
Order By: Relevance
“…This algorithm was invented eight years after RSA's creation. Later, many techniques have been proposed on one or more of the previously mensioned approaches [34]- [38].  RSA: in [25], [27] the RSA encryption algorithm is an example of asymmetric cryptography, which is named after its three creators: R. Rivest, A. Shamir, and L. Adleman.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…This algorithm was invented eight years after RSA's creation. Later, many techniques have been proposed on one or more of the previously mensioned approaches [34]- [38].  RSA: in [25], [27] the RSA encryption algorithm is an example of asymmetric cryptography, which is named after its three creators: R. Rivest, A. Shamir, and L. Adleman.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Once, the points P and Q from the elliptical curve have been achieved, the Ate pairing can proceed, which further can be used for ECDSA [24]. Let πp be the Frobenius map on the elliptical curve, defined in (9),…”
Section: Ate Pairing Using the Nist P-256 Curvementioning
confidence: 99%
“…Finally, the conclusion and the future scope of the proposed work have been given. [9], they have proposed a security model called as lightweight-security and keyagreement-based identity (LSKA-ID) for the communications between the vehicles. In this work, they have utilized the ID-based-cryptosystem, elliptic-curve cryptography (ECC) and chinese-remainder theorem (CRT) to provide security.…”
Section: Introductionmentioning
confidence: 99%