ECC based lightweight secure message conveyance protocol for satellite communication in internet of vehicles (IoV)
CT Poomagal, GA Sathish Kumar - Wireless Personal Communications, 2020 - Springer
CT Poomagal, GA Sathish Kumar
Wireless Personal Communications, 2020•SpringerThe motivation for the secured message conveyance in traffic vehicle communication is to
exchange information safely through the unreliable wireless medium to apprise the other
nodes of a traffic system like the control room, different vehicles upon crisis circumstances
like accidents, safety alarms, and area security. The newly designed Message Conveyance
protocol would be able to be utilized for secure key exchange and ensuing encryption of the
messages. This paper proposes a novel strategy for secure data correspondence between …
exchange information safely through the unreliable wireless medium to apprise the other
nodes of a traffic system like the control room, different vehicles upon crisis circumstances
like accidents, safety alarms, and area security. The newly designed Message Conveyance
protocol would be able to be utilized for secure key exchange and ensuing encryption of the
messages. This paper proposes a novel strategy for secure data correspondence between …
Abstract
The motivation for the secured message conveyance in traffic vehicle communication is to exchange information safely through the unreliable wireless medium to apprise the other nodes of a traffic system like the control room, different vehicles upon crisis circumstances like accidents, safety alarms, and area security. The newly designed Message Conveyance protocol would be able to be utilized for secure key exchange and ensuing encryption of the messages. This paper proposes a novel strategy for secure data correspondence between the smart city's vehicular nodes which uses the fundamentals of Elliptic Curve Cryptography (ECC) for key agreement and satellite communication for the transmission of messages over vehicles. The proposed protocol achieves a remarkable level of security among existing works with lower communication bits for the computations in security algorithm and also consumes a moderate speed of encryption.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果