CFP last date
20 May 2024
Reseach Article

Secure Fully-Automated Taxi Service using ECC

by Amar S. Gosavi, Nikhil B. Khandare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 3
Year of Publication: 2018
Authors: Amar S. Gosavi, Nikhil B. Khandare
10.5120/ijca2018917525

Amar S. Gosavi, Nikhil B. Khandare . Secure Fully-Automated Taxi Service using ECC. International Journal of Computer Applications. 181, 3 ( Jul 2018), 38-43. DOI=10.5120/ijca2018917525

@article{ 10.5120/ijca2018917525,
author = { Amar S. Gosavi, Nikhil B. Khandare },
title = { Secure Fully-Automated Taxi Service using ECC },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2018 },
volume = { 181 },
number = { 3 },
month = { Jul },
year = { 2018 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number3/29700-2018917525/ },
doi = { 10.5120/ijca2018917525 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:04:56.394071+05:30
%A Amar S. Gosavi
%A Nikhil B. Khandare
%T Secure Fully-Automated Taxi Service using ECC
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 3
%P 38-43
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper creates the secure medium for communication using ECC for fully-automated vehicle network. The proposed protocol given in section 4 achieves the highest level of security and guarantees the safety of vehicles, user, and service provider. The Proposed protocol consists of two phases, key generation, and data transmission. Both the phases are practically being secure and lightweight process because of ECC. Security Analysis of the proposed protocol is given with the help of mathematical proof. Further modifications and developments of the system are given in future scope section.

References
  1. Amar S Gosavi and Nikhil B Khandare. Securing VoIP Communication using ECC. International Journal of Computer Applications 179(46):13-21, June 2018
  2. Khandare, Nikhil B. "Performance Analysis of Cryptographic Protocols to Enhance SMS and M-Commerce Security."
  3. Ray, Sangram, G. P. Biswas, and Mou Dasgupta. "Secure multi-purpose mobile-banking using elliptic curve cryptography." Wireless Personal Communications 90.3 (2016): 1331-1354.
  4. Ray, Sangram, Rachana Nandan, and G. P. Biswas. "ECC based IKE protocol design for internet applications." Procedia Technology 4 (2012): 522-529.
  5. Ray, Sangram, and G. P. Biswas. "Establishment of ECC-based initial secrecy usable for IKE implementation." Proc. of World Congress on Expert Systems (WCE). 2012.
  6. Axelrod, C. Warren. "Cybersecurity challenges of systems-of-systems for fully-autonomous road vehicles." Emerging Technologies for a Smarter World (CEWIT), 2017 13th International Conference and Expo on. IEEE, 2017.
  7. Petit, Jonathan, and Steven E. Shladover. "Potential cyberattacks on automated vehicles." IEEE Transactions on Intelligent Transportation Systems 16.2 (2015): 546-556.
  8. Isaac, Jesús Téllez, SheraliZeadally, and José Sierra Camara. "Security attacks and solutions for vehicular ad hoc networks." IET communications 4.7 (2010): 894-903.
  9. Ray, Sangram, Urbi Chatterjee, and G. P. Biswas. "Efficient and Secure Communication Architecture for E-Health System."
  10. Hankerson, Darrel, Scott Vanstone, and Alfred Menezes. "Elliptic Curve Arithmetic." Guide to Elliptic Curve Cryptography (2004): 75-152.
  11. Saxena, Neetesh, Bong Jun Choi, and Rongxing Lu. "Authentication and authorization scheme for various user roles and devices in smart grid." IEEE transactions on information forensics and security 11.5 (2016): 907-921.
  12. Braga, A., et al. "Implementation Issues in the Construction of an Application Framework for Secure SMS Messages on Android Smartphones." The 9th Intl. Conf. on Emerging Security Information, Systems and Technologies. 2015.
  13. Thomas, Minta, and V. Panchami. "An Encryption Protocol for end-to-end Secure Transmission of SMS." Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on. IEEE, 2015.
  14. Saxena, Neetesh, and Narendra S. Chaudhari. "A secure approach for SMS in GSM network." Proceedings of the CUBE International Information Technology Conference. ACM, 2012.
  15. Miller, Victor S. "Use of elliptic curves in cryptography." Conference on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, 1985.
Index Terms

Computer Science
Information Sciences

Keywords

ECC (Elliptic Curve Cryptography). Car Automation Taxi Automation ECDHP (Elliptic Curve Diffie-Hellman Problem). Secure Communication Security and Challenges in Vehicle automation.