Skip to main content
Log in

ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The motivation for the secured message conveyance in traffic vehicle communication is to exchange information safely through the unreliable wireless medium to apprise the other nodes of a traffic system like the control room, different vehicles upon crisis circumstances like accidents, safety alarms, and area security. The newly designed Message Conveyance protocol would be able to be utilized for secure key exchange and ensuing encryption of the messages. This paper proposes a novel strategy for secure data correspondence between the smart city's vehicular nodes which uses the fundamentals of Elliptic Curve Cryptography (ECC) for key agreement and satellite communication for the transmission of messages over vehicles. The proposed protocol achieves a remarkable level of security among existing works with lower communication bits for the computations in security algorithm and also consumes a moderate speed of encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Shen, J., Zhou, T., Lai, C. F., Li, J., & Li, X. (2017). Hierarchical trust level evaluation for pervasive social networking. IEEE Access,5(99), 1178–1187. https://doi.org/10.1109/ACCESS.2017.2652486.

    Article  Google Scholar 

  2. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security,11(11), 2594–2608. https://doi.org/10.1109/TIFS.2016.2590944.

    Article  Google Scholar 

  3. Leng, Y., & Zhao, L. (2011). Novel design of intelligent internet-of-vehicles management system based on cloud-computing and Internet-of-Things. In International conference on electronic and mechanical engineering and information technology (EMEIT, pp 3190–3193). Published in IEEE Xplore. https://doi.org/10.1109/EMEIT.2011.6023763.

  4. Liang, W., Li, Z., Zhang, H., Wang, S., & Bie, R. (2015). Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends. International Journal of Distributed Sensor Networks, Special Issue Big Data and Knowledge Extraction for Cyber-Physical Systems. https://doi.org/10.1155/2015/745303.

    Article  Google Scholar 

  5. Lazarevic, A., Srivastava, J., & Kumar, V. (2002). Cyber threat analysis—A key enabling technology for the objective force (a case study in network intrusion detection). In Proceedings of the IT/C4ISR, 23rd Army Science conference.

  6. Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Xu, J., & Xiong, Y. (2015). Security and privacy in the Internet of Vehicles. In International conference on identification, information, and knowledge in the Internet of Things. Published in IEEE Xplore. https://doi.org/10.1109/IIKI.2015.33.

  7. Washington, L. C. (2008). Elliptic curves number theory and cryptography (2nd Ed.). Taylor and Francis Group. https://doi.org/10.1201/9781420071474.

  8. Ji, S., Chen, T., & Zhong, S. (2015). Wormhole attack detection algorithms in wireless network coding systems. IEEE Transactions on Mobile Computing,14(3), 660–674. https://doi.org/10.1109/TMC.2014.2324572.

    Article  Google Scholar 

  9. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H.-M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks,11(7), 2096–2114. https://doi.org/10.1016/j.adhoc.2012.02.009.

    Article  Google Scholar 

  10. Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solution. Vehicular Communications,1(2), 53–66. https://doi.org/10.1016/j.vehcom.2014.05.001.

    Article  Google Scholar 

  11. Rawat, D. B., Yan, G., Bista, B., & Weigle, M. C. (2014). Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc and Sensor Wireless Networks (AHSWN) Journal, 1–23.

  12. Choi, Y., Lee, D., Won, D., Kim, J., Jung, J., & Nam, J. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. IEEE Sensors,14(6), 10081–10106. https://doi.org/10.3390/s140610081.

    Article  Google Scholar 

  13. Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks,20, 96–112. https://doi.org/10.1016/j.adhoc.2014.03.009.

    Article  Google Scholar 

  14. Wazid, M., Das, A., Kumar, N., Odelu, V., Reddy, G., Par, K., et al. (2017). Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access,5, 14966–14980. https://doi.org/10.1109/ACCESS.2017.2723265.

    Article  Google Scholar 

  15. Xue, K., Ma, C., Hong, P., & Ding, R. (2012). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications,36, 316–323. https://doi.org/10.1016/j.ins.2015.02.010.

    Article  Google Scholar 

  16. Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, H. W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors,11(5), 4767–4779. https://doi.org/10.3390/s110504767.

    Article  Google Scholar 

  17. Castillo, J. C., Zeadally, S., & Ibañez, J. G. (2017). Internet of Vehicles: Architecture, protocols, and security. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2017.2690902.

    Article  Google Scholar 

  18. Miller, V. S. (2000). Use of elliptic curves in cryptography. In: Advances in cryptology—Proceedings of CRYPTO’85 (Vol. 218, pp 417–426). Springer. https://doi.org/10.1007/3-540-39799-X_31.

  19. Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. Springer. https://doi.org/10.1007/b97644.

  20. Li, C.-T., Hwang, M.-S., & Chu, Y.-P. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications,31(12), 2803–2814.

    Article  Google Scholar 

  21. Lee, J.-S., & Chang, C.-C. (2007). Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications,30(4), 1377–1396.

    Article  Google Scholar 

  22. Li, W.-M., Wen, Q.-Y., Su, Q., & Jin, Z.-P. (2012). An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications,35(2), 188–195.

    Article  Google Scholar 

  23. Lee, C.-C., Chen, C. T., Wu, P.-H., & Chen, T.-Y. (2013). Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Computer Digital Technology,7(1), 48–55.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. T. Poomagal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poomagal, C.T., Sathish Kumar, G.A. ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV). Wireless Pers Commun 113, 1359–1377 (2020). https://doi.org/10.1007/s11277-020-07285-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07285-3

Keywords

Navigation