Usability analysis of ECC and AE cryptosystems for internet of vehicle (IOV)

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Recently, security and privacy issues in Internet of Vehicle (IOV) gain a lot of attention. Besides traditional simple security/privacy measures such as challenge-response technique, cryptographic mechanism needs to be taken into consideration and evaluated in IOV scenarios. In this paper, we mainly focus on the usability analysis of two kinds of cryptosystems in IOV, one is the well-known elliptic curve cryptosystems (ECC), and the other the newly developed algebraic eraser (AE) cryptosystems. We investigate their usability from mainly two metrics: the total busy time of communication among vehicles, and the ratio of loss of package during the on-road vehicle running. Our simulations is organized based on the typical platform of OMNeT++ and SUMO. Our results show that, ECC might face new challenges in deploy in IOV scenarios, however, AE manifests a good alternative due to its ultra-lightweight resource requirements.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Information Technology, ICIT 2017
PublisherAssociation for Computing Machinery
Pages162-166
Number of pages5
ISBN (Electronic)9781450363518
DOIs
Publication statusPublished - 27 Dec 2017
Externally publishedYes
Event2017 International Conference on Information Technology, ICIT 2017 - Singapore, Singapore
Duration: 27 Dec 201729 Dec 2017

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2017 International Conference on Information Technology, ICIT 2017
Country/TerritorySingapore
CitySingapore
Period27/12/1729/12/17

Keywords

  • Algebraic eraser
  • Elliptic curve cryptosystems
  • Internet of Vehicle (IOV)
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Usability analysis of ECC and AE cryptosystems for internet of vehicle (IOV)'. Together they form a unique fingerprint.

Cite this