Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications
The state-of-the-art study, Rishiwal et al. (2024) proposed a blockchain-based vehicular network framework designed to enhance communication security and protect vehicle privacy in vehicle-to-everything (V2X) communications. The proposed framework validates vehicle legitimacy using individual certif...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10974948/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849722408263483392 |
|---|---|
| author | Abel C. H. Chen |
| author_facet | Abel C. H. Chen |
| author_sort | Abel C. H. Chen |
| collection | DOAJ |
| description | The state-of-the-art study, Rishiwal et al. (2024) proposed a blockchain-based vehicular network framework designed to enhance communication security and protect vehicle privacy in vehicle-to-everything (V2X) communications. The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. However, the framework does not prevent intermediate entities from accessing vehicle privacy, leaving vehicles vulnerable to tracking and monitoring by these entities. In response to this limitation, this study proposes a key expansion method based on elliptic curve cryptography (ECC). This approach employs a two-stage key expansion process, referred to as “butterfly key expansion,” to ensure that vehicle privacy is not exposed to any device within the V2X communications. Experimental results demonstrate that the key expansion time does not significantly differ from the key generation time. Furthermore, the signature generation and verification times using the expanded keys are comparable to those of the original keys. These findings indicate that the proposed method achieves enhanced privacy protection without imposing additional computational overhead. |
| format | Article |
| id | doaj-art-ceeddff4bf364b60854570f67a649503 |
| institution | DOAJ |
| issn | 2169-3536 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-ceeddff4bf364b60854570f67a6495032025-08-20T03:11:21ZengIEEEIEEE Access2169-35362025-01-0113769237693310.1109/ACCESS.2025.356346110974948Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X CommunicationsAbel C. H. Chen0https://orcid.org/0000-0003-3628-3033Information and Communications Security Laboratory, Chunghwa Telecom Laboratories, Taoyuan, TaiwanThe state-of-the-art study, Rishiwal et al. (2024) proposed a blockchain-based vehicular network framework designed to enhance communication security and protect vehicle privacy in vehicle-to-everything (V2X) communications. The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. However, the framework does not prevent intermediate entities from accessing vehicle privacy, leaving vehicles vulnerable to tracking and monitoring by these entities. In response to this limitation, this study proposes a key expansion method based on elliptic curve cryptography (ECC). This approach employs a two-stage key expansion process, referred to as “butterfly key expansion,” to ensure that vehicle privacy is not exposed to any device within the V2X communications. Experimental results demonstrate that the key expansion time does not significantly differ from the key generation time. Furthermore, the signature generation and verification times using the expanded keys are comparable to those of the original keys. These findings indicate that the proposed method achieves enhanced privacy protection without imposing additional computational overhead.https://ieeexplore.ieee.org/document/10974948/Privacy-preservingV2X communicationsecurity credential management systemelliptic curve cryptographykey expansion |
| spellingShingle | Abel C. H. Chen Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications IEEE Access Privacy-preserving V2X communication security credential management system elliptic curve cryptography key expansion |
| title | Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications |
| title_full | Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications |
| title_fullStr | Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications |
| title_full_unstemmed | Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications |
| title_short | Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communications |
| title_sort | comments on x201c exploring secure v2x communication networks for human centric security and privacy in smart cities x201d x2014 privacy preserving certificate in v2x communications |
| topic | Privacy-preserving V2X communication security credential management system elliptic curve cryptography key expansion |
| url | https://ieeexplore.ieee.org/document/10974948/ |
| work_keys_str_mv | AT abelchchen commentsonx201cexploringsecurev2xcommunicationnetworksforhumancentricsecurityandprivacyinsmartcitiesx201dx2014privacypreservingcertificateinv2xcommunications |