Next Article in Journal
Emerging Distortion Product Otoacoustic Emission Techniques to Identify Preclinical Warning Signs of Basal Cochlear Dysfunction Due to Ototoxicity
Previous Article in Journal
Color–Texture Pattern Classification Using Global–Local Feature Extraction, an SVM Classifier, with Bagging Ensemble Post-Processing
 
 
Article
Peer-Review Record

Practical V2I Secure Communication Schemes for Heterogeneous VANETs

Appl. Sci. 2019, 9(15), 3131; https://doi.org/10.3390/app9153131
by Fuxiao Zhou 1, Yanping Li 1,* and Yong Ding 2,3
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Appl. Sci. 2019, 9(15), 3131; https://doi.org/10.3390/app9153131
Submission received: 30 June 2019 / Revised: 24 July 2019 / Accepted: 26 July 2019 / Published: 1 August 2019

Round 1

Reviewer 1 Report

This paper proposes two many-to-one heterogeneous signcryption schemes and two one-to-many heterogeneous signcryption schemes for secure V2I communication in VANETs, which construct secure channels between heterogeneous vehicles and a RSU to support confidentiality, authentication, integrity and non-repudiation services. Numerical and theoretical analyses are conducted to demonstrate the computation cost, communication cost, storage and ciphertext length of the schemes are better than the existing ones.

 

This paper is clearly presented and well organized. The contribution can be further improved, e.g. the paper says that it is not easy to design the schemes, but does not elaborate the innovation of their designs - such as what are the challenges, how you overcome them, etc.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

In the paper, several heterogeneous signcryption schemes for V2I communications are proposed. Some comments/suggestions follow:
 
Abstract:  
 
   - Line 16: V2I acronym should not be directly used in abstract. It would be better to use "Vehicle to Infrastructure (V2I)".
   - Line 24: Typo: "numberical" should be "numerical".
 
Section 1:  
 
    - Line 83: Typo: "Numberical" should be "Numerical".
    - Line 103: In order to introduce IBC acronym, "identity-based cryptosystem.." should be "Identity-Based Cryptosystem (IBC)".
 
 
Section 4:
    - Line 264: In IBC-KG, "then the PKG computes its corresponding secret key s_kid .. , and sends it to the RSU in a secure way.". How is this "secure way" implemented ?. Can you provide a practical example for the case of V2I ?.
 
References:  
 
    - Reference 11: Typo "hybird" should be "hybrid".
 
* There are several typos and grammatical errors in the manuscript. It should be thorougly revised.  
 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

 The manuscript has been significantly improved.

Back to TopTop