Privacy-Preserving V2I Communication and Secure Authentication Using ECC With Physical Unclonable Function

Journal article


Nawaz, I., Ali Shah, M., Khan, A. and Jeon, S. 2024. Privacy-Preserving V2I Communication and Secure Authentication Using ECC With Physical Unclonable Function. Wireless Networks. pp. 1-16. https://doi.org/10.1007/s11276-024-03651-2
AuthorsNawaz, I., Ali Shah, M., Khan, A. and Jeon, S.
Abstract

In recent years, service provided based on the location has brought a tremendous change in our lives. However, one of the biggest challenges is to preserve users’ privacy which upon leakage could have disastrous consequences. Privacy preservation has gained remarkable consideration as a notable number of users have started being conscious about privacy protection. Most solutions that have been developed in such a distributed scenario need a third party for data anonymization. In a system of public data sharing, one of the most popular and useful anonymization techniques is local differential privacy (LDP). Without requiring a third party to perturb the data, LDP allows users to perturb their data locally and individually, resulting in stronger privacy guarantees. Based on this principle the proposed system provides anonymity and integrity during communication and independent key generation by using secure authentication mechanism i.e., Physical Unclonable Function (PUF) with elliptical curve cryptography and remove third party dependency for data anonymization by using LDP with Hadamard count mean sketch (HCMS) protocol. For scalability, and quantum secrecy IOTA ledger is used on top of LDP anonymization technique. Our experimental results show that using PUF with ECC for authentication can reduce the computational overhead and increase the secrecy of the communication, LDP with HCMS achieves high privacy while also showing the tradeoff between utility and privacy. Furthermore, the IOTA ledger provides more scalability than the existing technique. Hence, the privacy of an individual will be preserved without compromising accuracy while sharing information to the third party for using location-based services.

KeywordsPhysical Unclonable Function (PUF); Local Differential Privacy; IoT; Distributed Ledger Technologies (DLTs) ; IOTA Ledger
Year2024
JournalWireless Networks
Journal citationpp. 1-16
PublisherSpringer
ISSN1572-8196
1022-0038
Digital Object Identifier (DOI)https://doi.org/10.1007/s11276-024-03651-2
Web address (URL)https://link.springer.com/article/10.1007/s11276-024-03651-2#citeas
Accepted author manuscript
License
All rights reserved
File Access Level
Controlled
Output statusPublished
Publication dates
Online08 Mar 2024
Publication process dates
Accepted26 Dec 2023
Deposited18 Mar 2024
Permalink -

https://repository.derby.ac.uk/item/q5329/privacy-preserving-v2i-communication-and-secure-authentication-using-ecc-with-physical-unclonable-function

Restricted files

Accepted author manuscript

  • 46
    total views
  • 0
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

Hybrid Non-Technical-Loss Detection in Fog-enabled Smart Grids
Khan, H. M., Jabeen, F., Khan, A., Badawi, S. A., Maple, C. and Jeon, G. 2024. Hybrid Non-Technical-Loss Detection in Fog-enabled Smart Grids. Sustainable Energy Technologies and Assessments. 65, pp. 1-9. https://doi.org/10.1016/j.seta.2024.103775
A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA
Gilani, S. Y., Anjum, A., Khan, A., Khan, A., Syed, M. H., Moqurrab, S. A. and Srivastava, G. 2024. A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA. Internet of Things. pp. 1-21. https://doi.org/10.1016/j.iot.2024.101066
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs
Zafar, W. U. I., Rehman, M. A. U., Jabeen, F., Ullah, R., Abbas, G. and Khan, A. 2023. Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs. Computer Networks. 236, pp. 1-23. https://doi.org/10.1016/j.comnet.2023.109996
A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy
Batool, H., Anjum, A., Khan, A., Izzo, S., Mazzocca, C. and Jeon, G. 2023. A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy. Elsevier Information Sciences. 652. https://doi.org/10.1016/j.ins.2023.119717
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning
Sikandar, H. S., Malik, S. R., Anjum, A., Khan, A. and Jeon, G. 2023. Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Generation Computer Systems. 149, pp. 518-530. https://doi.org/10.1016/j.future.2023.07.037
An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids
Mahmood, A., Khan, A., Anjum, A., Maple, C. and Jeon, G. 2023. An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids. Sustainable Energy Technologies and Assessments. 60, pp. 1-11. https://doi.org/10.1016/j.seta.2023.103414
Data Provenance in Healthcare: Approaches, Challenges, and Future Directions
Mansoor Ahmed (PhD), Amil Dar, Markus Helfert, Khan, A. and Jungsuk Kim 2023. Data Provenance in Healthcare: Approaches, Challenges, and Future Directions. Sensors. 23 (14), pp. 1-26. https://doi.org/10.3390/s23146495
Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger
Iftikhar, Z., Anjum, A., Jeon, G., Shah, M. A. and Khan, A. 2023. Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger. Springer Cluster Computing . pp. 1-17. https://doi.org/10.1007/s10586-023-04002-0
A Privacy-Enabled, Blockchain-Based Smart Marketplace
Bello Musa Yakubu, Majid Iqbal Khan, Khan, A., Adeel Anjum, Madiha Syed and Semeen Rehman 2023. A Privacy-Enabled, Blockchain-Based Smart Marketplace. Applied Sciences. 13 (5), pp. 1-16. https://doi.org/10.3390/app13052914
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart homes
Yakubu, M, Y., Khan, M. I., Khan, A., Jabeen, F. and Jeon, G. 2023. Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart homes. Digital Communications and Networks. pp. 1-15. https://doi.org/10.1016/j.dcan.2023.01.013
Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing
Amin, Z., Anjum, A., Khan, A., Ahmad, A. and Jeon, G. 2022. Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing. Electronics. 11 (8), p. 1257. https://doi.org/10.3390/electronics11081257
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
Kanwal, T., Attaullaha, H., Anjum, A., Khan, A. and Jeon, G. 2022. Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. Elsevier Digital Communications and Networks. pp. 1-16. https://doi.org/10.1016/j.dcan.2022.09.025
Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends
Khan, H. M., Khan, A., Khan, B. and Jeon, G. 2022. Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends. MDPI Energies. 15 (24), p. 9350.. https://doi.org/10.3390/en15249350