scholarly journals An efficient signcryption scheme for vehicular satellite-based networks

Author(s):  
Rashad Elhabob ◽  
Abdalla Adel ◽  
Nabeil Eltayieb ◽  
Alzubier Hassan ◽  
Mohamed A.H Damos

With the widespread of the vehicular ad-hoc network (VANET), a huge number of vehicles are connecting to networks. To provide the position of these vehicles, the global position system (GPS) is required. Usually, the GPS is commoned with internal sensors mounted inside the vehicle. Thus, the communication with this sensor is needed when we need to specify the position of vehicle through the satellite. This communication is done by using a secure channels. However, the authentication and privacy are deemed as the main goal of the network communication. Therefore, an efficient signcryption scheme for vehicular satellite-based network (SVSN) is proposed in this paper. The proposed scheme meets the security demands for VANETs, for instance authentication, unforgeability, confidentiality, and integrity. Based on the Discrete Logarithm (DL) problem, the presented scheme is secure. Compared with the existing signcryption schemes, the performance analysis show that our proposed scheme is more suitable for vehicular satellite networks.

Author(s):  
Budi Rahmadya

Ad Hoc Network Communication is mobile networks communications and have a high mobility for each of its nodes. This type of network communications is a temporary networkwith utilizing a WiFi network or Bluethoot as a medium of communications. In the entirenetwork, node moves with a speed varying and unpredictable direction. Packets data delivery from the source node to destination node by using an ad hoc network requires its owntechniques. In this research discussed the existing data communication technique inVehicular Ad Hoc Network (VANETs) Communications with attention: Broadcasting Time, Routing Protocol, Message Dissemination, Delay Tolerant Network Dissemination and / DTN.These techniques can increase the delivery ratio / sending data packets to the destination as well as a smaller delay time. In order to maintain the integrity of the data packets received bythe destination node, the authors have proposed a method of duplicate messages in thisresearch.


Sign in / Sign up

Export Citation Format

Share Document