Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication

Security concerns in 5 G-V2X communication, including message authenticity, entity identification, and efficient malicious entity detection, necessitate innovative solutions. This paper introduces a novel protocol aimed at addressing security challenges in 5 G-V2X communication, focusing on authenti...

Full description

Bibliographic Details
Main Authors: Shimaa A. Abdel Hakeem, HyungWon Kim
Format: Article
Language:English
Published: Elsevier 2023-12-01
Series:Alexandria Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S111001682301013X
_version_ 1797391935343689728
author Shimaa A. Abdel Hakeem
HyungWon Kim
author_facet Shimaa A. Abdel Hakeem
HyungWon Kim
author_sort Shimaa A. Abdel Hakeem
collection DOAJ
description Security concerns in 5 G-V2X communication, including message authenticity, entity identification, and efficient malicious entity detection, necessitate innovative solutions. This paper introduces a novel protocol aimed at addressing security challenges in 5 G-V2X communication, focusing on authentication and misbehaving entity revocation. The protocol employs short bilinear pairing digital signatures for message authentication and pseudo-identity for entity verification. Key generation utilizes a Secret Splitting-based approach, distributing partial keys to vehicles within the same group, ensuring secure future communication. In terms of performance, our protocol excels in communication efficiency, costing only 280 bytes per message, the lowest among evaluated protocols. It also demonstrates competitive computation efficiency, with a signing time of 0.614 ms per message and a verification time of 5.035 ms per signature. Our innovative revocation method ensures timely detection and reporting of misbehaving entities, with an average detection time of 2.3 s and an average revocation time of 1.8 s. Our protocol enhances security in 5 G-V2X communication while maintaining superior communication and computation efficiency.
first_indexed 2024-03-08T23:39:49Z
format Article
id doaj.art-94e7a95768a64402bc0dc2ac2b4b3222
institution Directory Open Access Journal
issn 1110-0168
language English
last_indexed 2024-03-08T23:39:49Z
publishDate 2023-12-01
publisher Elsevier
record_format Article
series Alexandria Engineering Journal
spelling doaj.art-94e7a95768a64402bc0dc2ac2b4b32222023-12-14T05:20:43ZengElsevierAlexandria Engineering Journal1110-01682023-12-0185160176Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communicationShimaa A. Abdel Hakeem0HyungWon Kim1School of Electronics Engineering, Chungbuk National University, Cheongju 28644, the Republic of South Korea; Computers and Systems Department, Electronics Research Institute, El Nozha, Cairo, EgyptSchool of Electronics Engineering, Chungbuk National University, Cheongju 28644, the Republic of South Korea; Corresponding author.Security concerns in 5 G-V2X communication, including message authenticity, entity identification, and efficient malicious entity detection, necessitate innovative solutions. This paper introduces a novel protocol aimed at addressing security challenges in 5 G-V2X communication, focusing on authentication and misbehaving entity revocation. The protocol employs short bilinear pairing digital signatures for message authentication and pseudo-identity for entity verification. Key generation utilizes a Secret Splitting-based approach, distributing partial keys to vehicles within the same group, ensuring secure future communication. In terms of performance, our protocol excels in communication efficiency, costing only 280 bytes per message, the lowest among evaluated protocols. It also demonstrates competitive computation efficiency, with a signing time of 0.614 ms per message and a verification time of 5.035 ms per signature. Our innovative revocation method ensures timely detection and reporting of misbehaving entities, with an average detection time of 2.3 s and an average revocation time of 1.8 s. Our protocol enhances security in 5 G-V2X communication while maintaining superior communication and computation efficiency.http://www.sciencedirect.com/science/article/pii/S111001682301013XBilinear pairingVoting protocolAggregated signaturesThreat modelSecurity analysisMisbehavior reporting
spellingShingle Shimaa A. Abdel Hakeem
HyungWon Kim
Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
Alexandria Engineering Journal
Bilinear pairing
Voting protocol
Aggregated signatures
Threat model
Security analysis
Misbehavior reporting
title Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
title_full Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
title_fullStr Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
title_full_unstemmed Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
title_short Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication
title_sort evaluation and analysis of a secure voting based aggregated signatures authentication and revocation protocol for 5 g v2x communication
topic Bilinear pairing
Voting protocol
Aggregated signatures
Threat model
Security analysis
Misbehavior reporting
url http://www.sciencedirect.com/science/article/pii/S111001682301013X
work_keys_str_mv AT shimaaaabdelhakeem evaluationandanalysisofasecurevotingbasedaggregatedsignaturesauthenticationandrevocationprotocolfor5gv2xcommunication
AT hyungwonkim evaluationandanalysisofasecurevotingbasedaggregatedsignaturesauthenticationandrevocationprotocolfor5gv2xcommunication