Open Access
Open access
том 85 страницы 160-176

Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication

Тип публикацииJournal Article
Дата публикации2023-12-01
scimago Q1
wos Q1
БС1
SJR1.037
CiteScore12.9
Impact factor6.8
ISSN11100168, 20902670
General Engineering
Краткое описание
Security concerns in 5 G-V2X communication, including message authenticity, entity identification, and efficient malicious entity detection, necessitate innovative solutions. This paper introduces a novel protocol aimed at addressing security challenges in 5 G-V2X communication, focusing on authentication and misbehaving entity revocation. The protocol employs short bilinear pairing digital signatures for message authentication and pseudo-identity for entity verification. Key generation utilizes a Secret Splitting-based approach, distributing partial keys to vehicles within the same group, ensuring secure future communication. In terms of performance, our protocol excels in communication efficiency, costing only 280 bytes per message, the lowest among evaluated protocols. It also demonstrates competitive computation efficiency, with a signing time of 0.614 ms per message and a verification time of 5.035 ms per signature. Our innovative revocation method ensures timely detection and reporting of misbehaving entities, with an average detection time of 2.3 s and an average revocation time of 1.8 s. Our protocol enhances security in 5 G-V2X communication while maintaining superior communication and computation efficiency.
Найдено 
Найдено 

Топ-30

Журналы

1
Optical and Quantum Electronics
1 публикация, 33.33%
IEEE Transactions on Intelligent Transportation Systems
1 публикация, 33.33%
Cluster Computing
1 публикация, 33.33%
1

Издатели

1
2
Springer Nature
2 публикации, 66.67%
Institute of Electrical and Electronics Engineers (IEEE)
1 публикация, 33.33%
1
2
  • Мы не учитываем публикации, у которых нет DOI.
  • Статистика публикаций обновляется еженедельно.

Вы ученый?

Создайте профиль, чтобы получать персональные рекомендации коллег, конференций и новых статей.
Метрики
3
Поделиться
Цитировать
ГОСТ |
Цитировать
Hakeem S. A. A., Kim H. Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication // AEJ - Alexandria Engineering Journal. 2023. Vol. 85. pp. 160-176.
ГОСТ со всеми авторами (до 50) Скопировать
Hakeem S. A. A., Kim H. Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication // AEJ - Alexandria Engineering Journal. 2023. Vol. 85. pp. 160-176.
RIS |
Цитировать
TY - JOUR
DO - 10.1016/j.aej.2023.11.036
UR - https://doi.org/10.1016/j.aej.2023.11.036
TI - Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
T2 - AEJ - Alexandria Engineering Journal
AU - Hakeem, Shimaa A Abdel
AU - Kim, Hyungwon
PY - 2023
DA - 2023/12/01
PB - Elsevier
SP - 160-176
VL - 85
SN - 1110-0168
SN - 2090-2670
ER -
BibTex
Цитировать
BibTex (до 50 авторов) Скопировать
@article{2023_Hakeem,
author = {Shimaa A Abdel Hakeem and Hyungwon Kim},
title = {Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication},
journal = {AEJ - Alexandria Engineering Journal},
year = {2023},
volume = {85},
publisher = {Elsevier},
month = {dec},
url = {https://doi.org/10.1016/j.aej.2023.11.036},
pages = {160--176},
doi = {10.1016/j.aej.2023.11.036}
}