Open Access iconOpen Access

ARTICLE

Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

Vincent Omollo Nyangaresi1,2, Arkan A. Ghaib3, Hend Muslim Jasim4, Zaid Ameen Abduljabbar4,5,6,*, Junchao Ma5,*, Mustafa A. Al Sibahee7,8, Abdulla J. Y. Aldarwish4, Ali Hasan Ali9,10, Husam A. Neamah11

1 Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bondo, 40601, Kenya
2 Department of Applied Electronics, Saveetha School of Engineering, SIMATS, Chennai, Tamilnadu, 602105, India
3 Information Technology Department, Management Technical College, Southern Technical University, Basrah, 61004, Iraq
4 Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, 61004, Iraq
5 College of Big Data and Internet, Shenzhen Technology University, Shenzhen, 518118, China
6 Huazhong University of Science and Technology, Shenzhen Institute, Shenzhen, 518000, China
7 National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, 518060, China
8 Computer Technology Engineering Department, Iraq University College, Basrah, 61004, Iraq
9 Department of Mathematics, College of Education for Pure Sciences, University of Basrah, Basrah, 61004, Iraq
10 Institute of Mathematics, University of Debrecen, Debrecen, H-4002, Hungary
11 Department of Electrical Engineering and Mechatronics, Faculty of Engineering, University of Debrecen, Debrecen, 4028, Hungary

* Corresponding Authors: Zaid Ameen Abduljabbar. Email: email; Junchao Ma. Email: email

Computers, Materials & Continua 2024, 81(1), 1029-1057. https://doi.org/10.32604/cmc.2024.053854

Abstract

Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some of them are still susceptible to many attacks. As such, this study presents a novel protocol based on the fusion of elliptic curve cryptography (ECC) and bilinear pairing (BP) operations. The formal security analysis is accomplished using the Burrows–Abadi–Needham (BAN) logic, demonstrating that our scheme is verifiably secure. The proposed scheme’s informal security assessment also shows that it provides salient security features, such as non-repudiation, anonymity, and unlinkability. Moreover, the scheme is shown to be resilient against attacks, such as packet replays, forgeries, message falsifications, and impersonations. From the performance perspective, this protocol yields a 37.88% reduction in communication overheads and a 44.44% improvement in the supported security features. Therefore, the proposed scheme can be deployed in VANETs to provide robust security at low overheads.

Keywords


Cite This Article

APA Style
Nyangaresi, V.O., Ghaib, A.A., Jasim, H.M., Abduljabbar, Z.A., Ma, J. et al. (2024). Message verification protocol based on bilinear pairings and elliptic curves for enhanced security in vehicular ad hoc networks. Computers, Materials & Continua, 81(1), 1029-1057. https://doi.org/10.32604/cmc.2024.053854
Vancouver Style
Nyangaresi VO, Ghaib AA, Jasim HM, Abduljabbar ZA, Ma J, Sibahee MAA, et al. Message verification protocol based on bilinear pairings and elliptic curves for enhanced security in vehicular ad hoc networks. Comput Mater Contin. 2024;81(1):1029-1057 https://doi.org/10.32604/cmc.2024.053854
IEEE Style
V.O. Nyangaresi et al., "Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks," Comput. Mater. Contin., vol. 81, no. 1, pp. 1029-1057. 2024. https://doi.org/10.32604/cmc.2024.053854



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 176

    View

  • 45

    Download

  • 0

    Like

Share Link