Smart City Gnosys

Smart city article details

Title Enhancing Privacy In The Internet Of Vehicles Via Hyperelliptic Curve Cryptography
ID_Doc 23898
Authors Routis G.; Dagas P.; Roussaki I.
Year 2024
Published Electronics (Switzerland), 13, 4
DOI http://dx.doi.org/10.3390/electronics13040730
Abstract The Internet of Things (IoT) is a technological paradigm that has gained significant momentum the last decade and, among other features, enables the development of intelligent and interoperable device networks. In this respect, it has triggered the creation and evolution of vehicular ad-hoc networks (VANETs), which are initially implemented in order to guarantee the safety of drivers and the avoidance of traffic accidents. The drawback is that this fast evolution comes with serious concerns in terms of the privacy of users, while the population of attackers or entities that try to eavesdrop and intercept information has significantly increased. This imposes a serious risk for drivers moving across a Smart City. The research presented in this paper aims to evaluate privacy protection mechanisms in VANET environments, based on the efficiency and security level they ensure, considering the fact that VANETs provide limited resources to users/drivers. Moreover, the usage of elliptic curve cryptography in reduced resources environments is discussed. Finally, this paper compares the performance of three cryptographic algorithms, elliptic curve cryptography (ECC), hyperelliptic curve cryptography genus 2 (HECC-2) and HECC genus 3 (HECC-3), employed for an efficient authentication and safe message transmission mechanism in VANETs, aimed at reaching conclusions related to the implementation of each cryptographic scheme in this specific application area. The evaluation results indicate that ECC supersedes HECC-2 and HECC-3 in most metrics. However, HECC-2 and HECC-3 demonstrate better responses than ECC does in selected energy metrics. Overall, it is observed that HECC algorithms are not yet mature enough to compete with ECC. This is due to the fact that the research community has not sufficiently progressed toward the optimization of HECC, and moreover, HECC builds on quite complex mathematics. There are indications, however, that once HECC curves are indeed optimized, HECC will outperform ECC in speed as well as in other metrics, sinceHECC-2 and HECC-3 use a significantly smaller key size with the same level of security as that of ECC. © 2024 by the authors.
Author Keywords Arduino; digital certificates; digital signatures; ECC; energy consumption; HECC; Internet of Things (IoT); Internet of Vehicles (IoV); message size; vehicle privacy; vehicular ad hoc networks (VANETs); Zigbee


Similar Articles


Id Similarity Authors Title Published
32411 View0.886Das S.; Pradhan B.; Sharma S.; Jana B.; Das G.; Chakraborty P.Intelligent Infrastructure Of Route Scheduling For Smart Transportation Systems In Smart CitiesHandbook of Research on Network-Enabled IoT Applications for Smart City Services (2023)
60981 View0.868Patel A.; Shah N.; Limbasiya T.; Das D.Vehiclechain: Blockchain-Based Vehicular Data Transmission Scheme For Smart CityConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, 2019-October (2019)
7790 View0.866Saleem M.A.; Li X.; Ayub M.F.; Shamshad S.; Wu F.; Abbas H.An Efficient And Physically Secure Privacy-Preserving Key-Agreement Protocol For Vehicular Ad-Hoc NetworkIEEE Transactions on Intelligent Transportation Systems, 24, 9 (2023)
39922 View0.861Shamshad S.; Saleem M.A.; Obaidat M.S.; Shamshad U.; Mahmood K.; Ayub M.F.On The Security Of A Lightweight Privacy-Preserving Authentication Protocol For VanetsProceedings - International Conference on Artificial Intelligence and Smart Systems, ICAIS 2021 (2021)
47960 View0.858Sahbi R.; Ghanemi S.; Ferrag M.A.Security Of Internet Of Vehicles In Smart Cities: Authentication And Confidentiality AspectsInternational Journal of Internet Technology and Secured Transactions, 13, 3 (2024)
4518 View0.858Sarika S.; Prabakeran S.A Secured Privacy-Preserving Multifactor Approach For Autonomous Vehicles Using Blockchain TechnologyRecent Advances in Electrical and Electronic Engineering, 18, 4 (2025)
35543 View0.856Arunkumar J.R.; Velmurugan S.; Chinnaiah B.; Charulatha G.; Prabhu M.R.; Chakkaravarthy A.P.Logistic Regression With Elliptical Curve Cryptography To Establish Secure IotComputer Systems Science and Engineering, 45, 3 (2023)
28720 View0.854Madububa Mbachu U.; Fatima R.; Sherif A.; Dockery E.; Mahmoud M.; Alsabaan M.; Khalil K.Hardware Acceleration-Based Privacy-Aware Authentication Scheme For Internet Of Vehicles Using Physical Unclonable FunctionSensors, 25, 5 (2025)
43747 View0.854Awais S.M.; Yucheng W.; Mahmood K.; Akram M.W.; Hussain S.; Das A.K.; Park Y.Puf-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles In VanetIEEE Transactions on Vehicular Technology, 73, 5 (2024)
35254 View0.853Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)