2019
DOI: 10.1109/tvlsi.2019.2929420
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
69
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 174 publications
(70 citation statements)
references
References 20 publications
1
69
0
Order By: Relevance
“…e computational cost of the BBAAS is analysed with Qi Feng et al's scheme [23], Dong Zheng et al's scheme [24], Zhaojun Lu et al's scheme [25], and Lun Li et al's scheme [26] as shown in Table 1. To find out the actual timing values of various cryptographic primitives of the proposed BBAAS, a 2 GHz laptop with 4 GB installed memory is used, with Cygwin 1.7.35-15 [27], PBC library [28], and GCC version 4.9.2 being considered.…”
Section: Computational Costmentioning
confidence: 99%
“…e computational cost of the BBAAS is analysed with Qi Feng et al's scheme [23], Dong Zheng et al's scheme [24], Zhaojun Lu et al's scheme [25], and Lun Li et al's scheme [26] as shown in Table 1. To find out the actual timing values of various cryptographic primitives of the proposed BBAAS, a 2 GHz laptop with 4 GB installed memory is used, with Cygwin 1.7.35-15 [27], PBC library [28], and GCC version 4.9.2 being considered.…”
Section: Computational Costmentioning
confidence: 99%
“…Existing research (e.g., [74,[76][77][78]) on decentralized identity management investigated the use of DLT for the mutual authentication of X-Nodes and controlling their identifying information. Previous work (e.g., [74,76]) on the authentication of X-Nodes used permissioned distributed ledgers and smart contracts (i.e., agreements that are formalized in program code and deployed to the distributed ledger). Other studies (e.g., [77,78]) present concepts related to self-sovereign identities, where users can manage data related to their identities on a distributed ledger.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…In [ 95 ], Lu et al also mentioned that the privacy-preserving authentication is the first priority issue for defending against attacks in VANETs and proposed a blockchain-based solution. They pointed out that the conventional centralized trusted authority (TA)-based solution has two main problems.…”
Section: Blockchain and The Vehicular Internet Of Thingsmentioning
confidence: 99%
“…Second, a receiver must check a certificate revocation list (CRL) for the authentication of a message, which incurs a high computational overhead. To solve these problems, Reference [ 95 ] employs a permissioned blockchain approach to use multiple semi-trusted authorities in a decentralized manner. A Merkle Patricia tree is used to provide a cryptographically authenticated data structure.…”
Section: Blockchain and The Vehicular Internet Of Thingsmentioning
confidence: 99%