Effective and Efficient Use of Elliptic Curve Cryptography ‎‎(ECC) for The Security of Vehicular Data Platform/Networks

  • Authors

    • Amol Phatak Research Scholar, CSE Dept, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of ‎Science and Technology, Chennai, Tamilnadu, India
    • Dr. Rajendran T. Professor and Head, Dept of CSE (Cyber Security), Vel Tech Rangarajan Dr. Sagunthala ‎R&D Institute of Science and Technology, Chennai, Tamilnadu, India
    https://doi.org/10.14419/dq7ksd55

    Received date: July 7, 2025

    Accepted date: August 15, 2025

    Published date: August 24, 2025

  • ECC;Vehicular Data Networks; Security and Privacy; Private Key; AES; Public Key; RSA
  • Abstract

    Nowadays, with the widespread use of numerous sensors in vehicular data ‎platforms/networks to enhance communication and support systems, a substantial amount of ‎data is generated. The information gathered through this data is not secure, and it is ‎necessary to apply security and privacy measures to vehicular data platforms/networks. This ‎paper proposes the use of the ECC (Elliptic Curve Cryptography) method to achieve security ‎and privacy. The large amount of vehicular data is divided into different types, such as live ‎status data, vehicle details data, insurance data, maintenance data, etc. The proposed method ‎categorizes this data into high-level, medium-level, and low-level categories to apply the ‎appropriate cryptographic methods, thereby enhancing security and ensuring privacy for end-‎users. The ECC is implemented and analyzed on data of different sizes and compared its ‎performance with a private key (symmetric) algorithm, DES (Data Encryption Standard), ‎and AES (Advanced Encryption Standard), as well as the public-key (asymmetric) algorithm ‎RSA (Rivest-Shamir-Adleman). The result shows that the use of ECC is effective and ‎efficient for the security of vehicular data platforms/networks, compared with other ‎traditional cryptographic algorithms‎.

  • References

    1. M. De Vincenzi, J. Moore, B. Smith, S. E. Sarma and I. Matteucci, "Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms," in IEEE Open Journal of Vehicular Technology, vol. 6, pp. 442-454, 2025, https://doi.org/10.1109/OJVT.2024.3524088.
    2. S. Khokha, "From Standards to Implementation: Functional Safety and Cybersecurity in Modern Autonomous and Electric Vehicles," 2024 Inter-national Conference on Cybernation and Computation (CYBERCOM), Dehradun, India, 2024, pp. 52-56, https://doi.org/10.1109/CYBERCOM63683.2024.10803155.
    3. P. A. W. Putro, F. Amelia, J. Pidanic, H. Suhartanto, I. A. Rahardjo and E. Imandeka, "Cybersecurity of Sensors on Smart Vehicles: Review of Threats and Solutions," 2023 6th International Conference of Computer and Informatics Engineering (IC2IE), Lombok, Indonesia, 2023, pp. 266-270, https://doi.org/10.1109/IC2IE60547.2023.10331330.
    4. M. Scalas and G. Giacinto, "Automotive Cybersecurity: Foundations for Next-Generation Vehicles," 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), Amman, Jordan, 2019, pp. 1-6, https://doi.org/10.1109/ICTCS.2019.8923077.
    5. Mehrabi, Ali & Jolfaei, Alireza. (2022). Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles. ACM Transactions on Internet Technology. 22. 1-16. https://doi.org/10.1145/3431499.
    6. Xiao, Jiongen& Liu, Yi & Zou, Yi & Li, Dacheng& Leng, Tao. (2024). An Efficient Elliptic Curve Cryptography-Based Secure Communication with Privacy Preserving for Autonomous Vehicle. Journal of Advanced Transportation. 2024. https://doi.org/10.1155/2024/5808088.
    7. Phatak, A., & Rao, V. S. (2023). Adaptive Security Mechanism for Vehicular Data Networks or Platform using Degree of Privacy. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 594–598.
    8. Ahmer khan jadoon, Lincheng Wang, Tong Li, “Lightweight Cryptographic Techniques for Automotive Cyber security” volume 2018.https://doi.org/10.1155/2018/1640167.
    9. Specification defines the standard for vehicle data https://www.w3.org/TR/vehicle-data.
    10. C. Kaiser , A. Stocker1 , G. Viscusi , A. Festl , P. Mörtl , M. Glitzne, “Quantified Cars An exploration of the position of ICT start-ups vs. car man-ufacturers towards digital car services and sustainable business models”, Virtual Vehicle Research Center.
    11. D. Coopersmith “The Data Encryption Standard and its strength against attacks”, IBM J RES, Vol 38 no. 3 1994. https://doi.org/10.1147/rd.383.0243.
    12. Seung-Jo Han, Heang-Soo Oh, “The improved Data Encryption Standard (DES) Algorithm” Jongan Park IEEE Transaction 1996
    13. Muzafer H, Mohamed Elhoseny, Mahmoud Mohamed Selim, and K. Shankar, “Data Encryption Standard for IoT Applications based on Catalan objects and Two combinatorial structure” IEEE Transaction 2020.
    14. KO-FENG LEE1, XIU-ZHI CHEN1, CHAO-WEI YU1, KAI-YI CHIN, “An Intelligent Driving Assistance System Based on Lightweight Deep Learning Models”, IEEE Vehicular Technology Society Section, Volume 10, 2022.
    15. Suresh Timilsina, Sarmila Gautam, “Analysis Of Hybrid Cryptosystem Developed Using Blowfish AndEccWith Different Key Size”, TECH-NICAL JOURNAL Vol 1, No.1, July 2019, Nepal Engineers' Association, Gandaki Province, ISSN : 2676-1416.https://doi.org/10.3126/tj.v1i1.27582.
    16. V. Kaur and A. Singh, “Review of Various Algorithms Used in Hybrid Cryptography”, International Journal of Computer Science and Network December 2013, vol. 2, no. 6, pp. 157–173, 2013.
    17. A.P Shaikh, V. kaul, “Enhanced Security Algorithm using Hybrid Encryption and ECC,” IOSR Journal of Computer Engineering, vol. 16, Issue3, pp. 80-85, May 2014.https://doi.org/10.9790/0661-16348085.
    18. N. Garg and P. Yadav, “Comparison of Asymmetric Algorithms in Cryptography,” International Journal of Computer Science and Mobile Compu-ting, vol. 3, no. 4, pp. 1190–1196, 2014.
    19. T. Hoppe, S. Kiltz, and J. Dittmann, “Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-term Countermeas-ures”, Reliability Engineering & System Safety, vol. 96, no. 1, pp 111-25, 2011.https://doi.org/10.1016/j.ress.2010.06.026.
  • Downloads

  • How to Cite

    Phatak, A. ., & T., D. R. . (2025). Effective and Efficient Use of Elliptic Curve Cryptography ‎‎(ECC) for The Security of Vehicular Data Platform/Networks. International Journal of Basic and Applied Sciences, 14(4), 624-629. https://doi.org/10.14419/dq7ksd55