Smart City Gnosys

Smart city article details

Title Data Authentication Mechanism In Internet Of Vehicles For Digital Identity Verification With Identity-Based Proxy Homomorphic Signatures
ID_Doc 17171
Authors Yuan X.; Cai B.; Li F.; Zhao Y.; Ren J.; Ren Y.
Year 2025
Published Communications in Computer and Information Science, 2498 CCIS
DOI http://dx.doi.org/10.1007/978-981-96-6243-2_2
Abstract With the widespread application of Internet of Vehicles (IoV) technology in smart city construction, its advantages in traffic management, intelligent driving, and information sharing have been fully demonstrated. Through communication and data interaction between on-board devices, the IoV enables more efficient traffic flow management and safer driving experiences, significantly improving the intelligence level of transportation systems. However, this widespread application also results in severe security and privacy challenges. In the open IoV environment, while increased transparency and frequent data interactions enhance system intelligence and transparency, they also increase the risk of data leakage and identity forgery. The IoV system now faces a variety of security threats, including Man-in-the-Middle Attacks (MIMMS) and replay attacks. To address these challenges, secure data authentication without compromising privacy protection and system efficiency is crucial in the evolution of IoV technology.In response to identify forgery and data tampering during data interaction, this paper proposes an identity-based proxy homomorphic signature scheme. This scheme allows users to delegate signing authority to agents through a proxy signature mechanism, ensuring the legitimacy of signatures and nonrepudiation of data, thus providing reliable security for data transactions and information sharing. A timestamp mechanism is introduced, embedding a timestamp into the signing process to ensure the timeliness of proxy signatures, effectively preventing their expiration or abuse, thereby enhancing security and credibility. The scheme’s correctness and security are strictly proven. In terms of correctness, legal proxy signatures can be correctly generated. In terms of security, the scheme’s resistance to selected message and identity attacks is analyzed and demonstrated. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
Author Keywords Blockchain; Identity verification; proxy homomorphic signatures


Similar Articles


Id Similarity Authors Title Published
861 View0.875Kumar R.; Gill R.; Singh A.; Kumar R.; Singh D.; Al-Farouni M.A Comprehensive Analysis Of Internet Of Vehicle Security Vulnerabilities In Smart Cities2nd IEEE International Conference on Data Science and Network Security, ICDSNS 2024 (2024)
47810 View0.874Al-Quayed F.; Tariq N.; Humayun M.; Aslam Khan F.; Attique Khan M.; Alnusairi T.S.Securing The Road Ahead: A Survey On Internet Of Vehicles Security Powered By A Conceptual Blockchain-Based Intrusion Detection System For Smart CitiesTransactions on Emerging Telecommunications Technologies, 36, 4 (2025)
62035 View0.873Vasudev H.; Das D.Work-In-Progress: Safe: Secure Authentication For Future Entities Using Internet Of VehiclesProceedings - Real-Time Systems Symposium, 2019-December (2019)
47599 View0.863Bojjagani S.; Reddy Y.C.A.P.; Anuradha T.; Rao P.V.V.; Reddy B.R.; Khan M.K.Secure Authentication And Key Management Protocol For Deployment Of Internet Of Vehicles (Iov) Concerning Intelligent Transport SystemsIEEE Transactions on Intelligent Transportation Systems, 23, 12 (2022)
46821 View0.862Thapliyal S.; Wazid M.; Singh D.P.; Das A.K.; Islam S.H.Robust Authenticated Key Agreement Protocol For Internet Of Vehicles-Envisioned Intelligent Transportation SystemJournal of Systems Architecture, 142 (2023)
28720 View0.861Madububa Mbachu U.; Fatima R.; Sherif A.; Dockery E.; Mahmoud M.; Alsabaan M.; Khalil K.Hardware Acceleration-Based Privacy-Aware Authentication Scheme For Internet Of Vehicles Using Physical Unclonable FunctionSensors, 25, 5 (2025)
47960 View0.861Sahbi R.; Ghanemi S.; Ferrag M.A.Security Of Internet Of Vehicles In Smart Cities: Authentication And Confidentiality AspectsInternational Journal of Internet Technology and Secured Transactions, 13, 3 (2024)
61767 View0.856Mahmood A.; Sheng Q.Z.; Siddiqui S.A.; Sagar S.; Zhang W.E.; Suzuki H.; Ni W.When Trust Meets The Internet Of Vehicles: Opportunities, Challenges, And Future ProspectsProceedings - 2021 IEEE 7th International Conference on Collaboration and Internet Computing, CIC 2021 (2021)
28729 View0.856Madububambachu U.; Fatima R.; White K.; Riley J.; Sherif A.; Khalil K.Hardware-Acceleration Based Privacy-Aware Authentication Scheme For Internet Of Vehicles2024 IEEE 3rd International Conference on Computing and Machine Intelligence, ICMI 2024 - Proceedings (2024)
33103 View0.854Internet Of Vehicles, Vehicular Social Networks, And CybersecurityAutomotive Cyber Security: Introduction, Challenges, and Standardization (2020)