Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications

The state-of-the-art study, Rishiwal et al. (2024) proposed a blockchain-based vehicular network framework designed to enhance communication security and protect vehicle privacy in vehicle-to-everything (V2X) communications. The proposed framework validates vehicle legitimacy using individual certif...

Full description

Saved in:
Bibliographic Details
Main Author: Abel C. H. Chen
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10974948/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849722408263483392
author Abel C. H. Chen
author_facet Abel C. H. Chen
author_sort Abel C. H. Chen
collection DOAJ
description The state-of-the-art study, Rishiwal et al. (2024) proposed a blockchain-based vehicular network framework designed to enhance communication security and protect vehicle privacy in vehicle-to-everything (V2X) communications. The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. However, the framework does not prevent intermediate entities from accessing vehicle privacy, leaving vehicles vulnerable to tracking and monitoring by these entities. In response to this limitation, this study proposes a key expansion method based on elliptic curve cryptography (ECC). This approach employs a two-stage key expansion process, referred to as “butterfly key expansion,” to ensure that vehicle privacy is not exposed to any device within the V2X communications. Experimental results demonstrate that the key expansion time does not significantly differ from the key generation time. Furthermore, the signature generation and verification times using the expanded keys are comparable to those of the original keys. These findings indicate that the proposed method achieves enhanced privacy protection without imposing additional computational overhead.
format Article
id doaj-art-ceeddff4bf364b60854570f67a649503
institution DOAJ
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-ceeddff4bf364b60854570f67a6495032025-08-20T03:11:21ZengIEEEIEEE Access2169-35362025-01-0113769237693310.1109/ACCESS.2025.356346110974948Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X CommunicationsAbel C. H. Chen0https://orcid.org/0000-0003-3628-3033Information and Communications Security Laboratory, Chunghwa Telecom Laboratories, Taoyuan, TaiwanThe state-of-the-art study, Rishiwal et al. (2024) proposed a blockchain-based vehicular network framework designed to enhance communication security and protect vehicle privacy in vehicle-to-everything (V2X) communications. The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. However, the framework does not prevent intermediate entities from accessing vehicle privacy, leaving vehicles vulnerable to tracking and monitoring by these entities. In response to this limitation, this study proposes a key expansion method based on elliptic curve cryptography (ECC). This approach employs a two-stage key expansion process, referred to as “butterfly key expansion,” to ensure that vehicle privacy is not exposed to any device within the V2X communications. Experimental results demonstrate that the key expansion time does not significantly differ from the key generation time. Furthermore, the signature generation and verification times using the expanded keys are comparable to those of the original keys. These findings indicate that the proposed method achieves enhanced privacy protection without imposing additional computational overhead.https://ieeexplore.ieee.org/document/10974948/Privacy-preservingV2X communicationsecurity credential management systemelliptic curve cryptographykey expansion
spellingShingle Abel C. H. Chen
Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications
IEEE Access
Privacy-preserving
V2X communication
security credential management system
elliptic curve cryptography
key expansion
title Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications
title_full Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications
title_fullStr Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications
title_full_unstemmed Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications
title_short Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications
title_sort comments on x201c exploring secure v2x communication networks for human centric security and privacy in smart cities x201d x2014 privacy preserving certificate in v2x communications
topic Privacy-preserving
V2X communication
security credential management system
elliptic curve cryptography
key expansion
url https://ieeexplore.ieee.org/document/10974948/
work_keys_str_mv AT abelchchen commentsonx201cexploringsecurev2xcommunicationnetworksforhumancentricsecurityandprivacyinsmartcitiesx201dx2014privacypreservingcertificateinv2xcommunications