scholarly journals A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Junsong Zhang ◽  
Qikun Zhang ◽  
Xianling Lu ◽  
Yong Gan

With the rapid development of communication and microelectronic technology, the vehicular ad hoc network (VANET) has received extensive attention. However, due to the open nature of wireless communication links, it will cause VANET to generate many network security issues such as data leakage, network hijacking, and eavesdropping. To solve the above problem, this paper proposes a new authentication protocol which uses bilinear pairings and temporary pseudonyms. The proposed authentication protocol can realize functions such as the identity authentication of the vehicle and the verification of the message sent by the vehicle. Moreover, the proposed authentication protocol is capable of preventing any party (peer vehicles, service providers, etc.) from tracking the vehicle. To improve the efficiency of message verification, this paper also presents a batch authentication method for the vehicle to verify all messages received within a certain period of time. Finally, through security and performance analysis, it is actually easy to find that the proposed authentication protocol can not only resist various security threats but also have good computing and communication performance in the VANET environment.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Peijun Zhang ◽  
Lianhai Wang ◽  
Wei Wang ◽  
Kunlun Fu ◽  
Jinpeng Wang

Blockchain, which has a distributed structure, has been widely used in many areas. Especially in the area of smart cities, blockchain technology shows great potential. The security issues of blockchain affect the construction of smart cities to varying degrees. With the rapid development of quantum computation, elliptic curves cryptosystems used in blockchain are not secure enough. This paper presents a blockchain system based on lattice cipher, which can resist the attack of quantum computation. The most challenge is that the size of public keys and signatures used by lattice cryptosystems is typically very large. As a result, each block in a blockchain can only accommodate a small number of transactions. It will affect the running speed and performance of the blockchain. For overcoming this problem, we proposed a way that we only put the hash values of public keys and signatures on the blockchain and store the complete content of them on an IPFS (interplanetary file system). In this way, the number of bytes occupied by each transaction is greatly reduced. We design a bitcoin exchange scheme to evaluate the performance of the proposed quantum-resistant blockchain system. The simulation platform is verified to be available and effective.



Author(s):  
Jetzabel Serna ◽  
Jesus Luna ◽  
Roberto Morales ◽  
Manel Medina

Vehicular Ad-hoc NETworks (VANETs) currently provide a prominent field of research, which aims at improving everyday road safety and comfort. To achieve this, the deployment of several potential applications is envisioned, promising to provide extraordinary benefits, but will also represent important security challenges due to the unique characteristics of VANETs. In this chapter, VANET’s security issues are addressed, and the most outstanding security approaches are discussed. As a proof of concept, a PKI -based protocol, able to cope with the interoperability issues among untrusted CA domains is presented, and the trade-offs between security and performance are empirically analyzed and stressed.



Author(s):  
Арпана Чатурведі

The  development  of  new  technologies  like  Hadoop,  Map  Reduce, used to store, manage, analyze vast amount of data, when associated with WSN (Wireless  Sensor  Network),  the  risk  factor  for  information  security  increases. When  it is  applied  in  various  applications  of  government  like  Aadhaar,  DigiLocker  etc.,  chances  of  hidden  security  issues  increased.  In  this  paper  AESXTS  encryption  mechanism  and  digital  signature  technology  is  used  with  AODV  (Ad  hoc  On-Demand  Distance  Vector)  routing  protocol  to  get  rid  of  various issues like DoS (Denial of Service),  eavesdropping, imitation, coaxing etc.  The theoretical  analysis  is  shown using NS2 simulator and implementation assures to provide better data security, reliability, transmission and energy efficiency.  This implementation shows that SAODV(Secure-AODV)  routing  protocol  when used in routing layer in these applications and  system,  it  increases its own self defensive ability to fight against  various challenging hidden security issues.



2011 ◽  
Vol 225-226 ◽  
pp. 706-709 ◽  
Author(s):  
Shu Guo Yang

Cloud computing is regarded as one of the most enticing technologies and potential silver bullet in the IT industry. Because of open condition and general-purpose nature of cloud, security issue is becoming a bottle neck of rapid development and broad application of cloud computing. Firstly, this paper addresses cloud customers’ significant concerns about and requirements of cloud security. Secondly, cloud security risks and threats posed by the pervasive and ad hoc nature of the cloud are comprehensively analyzed. Finally, some effective and dependable security mechanisms are proposed to lower cloud security risks and meet security requirements of cloud customers. Especially, a novel scheme for integrity and copyright protection of customers’ works in the cloud is presented based on digital watermarking and digital signature.



Optimized routing in wireless network is the trending research area in ad-hoc wireless communication. Performance of outmoded schemes designed for security during the process of routing in sensor networks significantly affected by consistency and security issues. However the present routing schemes are inexpensive and need no rigorous positioning but security is still unavoidable apprehension. An optimized routing scheme is proposed for WSN in this paper which is named as Collaborative Optimized Routing Algorithm (CORA), which precisely focuses on optimized progression of data during routing along with security aspects. CORA functions in two phases, first phase is to identify and group the collaborative nodes through defined lenient constant based on direct_trust, link_strength and quality parameters. Direct_trust and link_strength are direct measures but to evaluate quality, link survival time and caused delay are considered. Whereas in second phase suit function is defined for choosing the optimized nodes using the proposed CORA, based on direct_trust, link_strength, quality and distance. Performance of proposed collaborative optimized routing scheme is assessed based on the measurement metrics with 50 dynamic nodes ad-hoc sensor network in presence of selective forwarding and denial-of-service attacks. CORA indicates the higher detection rate and throughput as 54.9 and 41.6 respectively and lower delay and distance as 15 and 158.8 respectively which are significantly better than competing schemes.



2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Hanzhe Yang ◽  
Ruidan Su ◽  
Pei Huang ◽  
Yuhan Bai ◽  
Kai Fan ◽  
...  

With the rapid growth of data, limited by the storage capacity, more and more IoT applications choose to outsource data to Cloud Service Providers (CSPs). But, in such scenarios, outsourced data in cloud storage can be easily corrupted and difficult to be found in time, which brings about potential security issues. Thus, Provable Data Possession (PDP) protocol has been extensively researched due to its capability of supporting efficient audit for outsourced data in cloud. However, most PDP schemes require the Third-Party Auditor (TPA) to audit data for Data Owners (DOs), which requires the TPA to be trustworthy and fair. To eliminate the TPA, we present a Public Mutual Audit Blockchain (PMAB) for outsourced data in cloud storage. We first propose an audit chain architecture based on Ouroboros and an incentive mechanism based on credit to allow CSPs to audit each other mutually with anticollusion (any CSP is not willing to help other CSPs conceal data problems). Then, we design an audit protocol to achieve public audit efficiently with low cost of audit verification. Rigorous analysis explains the security of PMAB using game theory, and performance analysis shows the efficiency of PMAB using the real-world dataset.



2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jinxin Zhang ◽  
Meng Wu

With the rapid development of the mobile internet and intelligent technology of in-vehicle equipment, the Internet of Vehicles (IoV), centered on intelligent connected cars, has gradually entered people’s lives. However, these technologies also bring serious privacy risks and security issues in terms of data transmission and storage. In this article, we propose a blockchain-based authentication system to provide vehicle safety management. The privacy and security attributes of various vehicle authentication transactions are based on high-level cryptographic primitives, realizing temporary and formal authentication methods. At the same time, a fair blockchain consensus mechanism Auction of block generation Rights (AoR) is proposed. To demonstrate the feasibility and scalability of the proposed scheme, security and performance analyses are presented. The relevant experimental results show that the scheme can provide superior decentralized management for IoV.



2021 ◽  
Vol 16 (1) ◽  
pp. 124-133
Author(s):  
Jasmine Vivienne Andrew ◽  
Sylvia @ Nabila Azwa Ambad ◽  
Nur Syahidah Wong Abdullah ◽  
Sakka Nordin ◽  
Karen Esther Tan

The growth of cashless payment has grown exponentially, including that of e-wallet, in line with the government's plan to build a cashless society. The e-wallet phenomenon is fast becoming an important component for financial inclusion in emerging economies as studies found that the use of digital financial services like mobile money and other fintech applications could provide many potential development benefits. Countries like China have experienced the highest growth in cashless payments over the last five years and is said to be the most educated on mobile payment services. Despite the rapid development of this technology, organizations and consumers are still concerned about rising security issues. As the e-wallets markets are further expected to increase exponentially in Malaysia, it is crucial to study the consumers' behavioral intention to use e-wallets for the benefits of e-wallets service providers and users in Malaysia. Correspondingly, this paper presents a review of the literature aimed at advancing the body of knowledge by proposing a conceptual model on consumers' behavioral intention to use e-wallet (mobile payment) using UTAUT2 as a baseline model. This paper is built upon a systematic literature review method. This paper provides practical implications that would assist e-wallet service providers when devising appropriate strategies in planning and increasing consumers' intention to use the e-wallet.



Author(s):  
T. Savchenko ◽  
A. Tatarko

The paper considers the theoretical principles and applied principles concerning financial technologies. Currently, the rapid development of the digital economy has become an important global trend of dynamic socio-economic development, which has led to the spread of financial technology impacts on the entire system and structure of socio-economic relations. It is stated that as FinTech develops, the younger generation is now gaining more access to a wider variety of sophisticated financial products and services, some of which carry higher risks that are not yet known in the market. However, the financial knowledge of the younger generation is generally lower than their parents, as the Organization for Economic Co-operation and Development (OECD) notes. Studies have shown that the trend in the financial sector towards increasing automation, mobility and digitalization of financial services is changing. Blockchain, machine learning, AI and robotics are all creating huge waves in fintech, bringing both synergies and disruption to industry. However, as a result of the implementation of the PSD2 directive, the data that banks need to share is essentially sensitive financial data, and this naturally raises many privacy and security issues along with consumer uncertainty. Considering the international trends in the development of fintech companies, Ukrainian banks are interested in creating joint projects with domestic and foreign fintech representatives. As fintech companies become more mature and technology-oriented, they are faced with the need to invest more in sophisticated software, supported by advanced analytics and personalized marketing campaigns. This brings fintech to a more consumer-oriented state where service providers are driven by the ongoing challenges of society and the need to meet their customers' needs. The major client for most fintech companies is business, both large corporate and SMB (37% for each). 21% of companies operate in the mass retail market, and only 6% target the premium retail segment. Keywords: financial technologies, digitization, blockchain, artificial intelligence, neo-bank, crowdfunding, insurtech, open banking.



Sign in / Sign up

Export Citation Format

Share Document