2011
DOI: 10.1007/s10660-011-9086-0
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)

Abstract: In the last few years, many value-added applications (such as Payment services) in Vehicular Ad hoc NETworks (VANETs) have emerged. Although these applications offer great business opportunities they also introduce new concerns regarding security and privacy. Moreover, the wide range of scenarios (with or without connectivity restrictions) arising from vehicle-to-vehicle and vehicle-to-roadside communications have opened up new security challenges which must be considered by Payment system designers to achieve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…This is followed by Chaudhry et al’s [ 37 ] article on user encryption schemes for e-payment systems, and Antoniou and Batten’s [ 38 ] article on purchaser’s privacy and trust in online transactions. Other articles in this cluster have considered topics such as e-commerce trust models [ 39 ], consumer privacy [ 40 ], cybercrime and cybersecurity issues [ 41 ], gender differences [ 42 ], and the development and implementation of various authentication systems [ 43 , 44 ]. Thus, ECR articles in this cluster appear to be centered on online privacy and security issues , including equivalent solutions for improved authentication and encryption to improve trust in electronic commerce.…”
Section: Bibliographic Coupling: Thematic Clustersmentioning
confidence: 99%
“…This is followed by Chaudhry et al’s [ 37 ] article on user encryption schemes for e-payment systems, and Antoniou and Batten’s [ 38 ] article on purchaser’s privacy and trust in online transactions. Other articles in this cluster have considered topics such as e-commerce trust models [ 39 ], consumer privacy [ 40 ], cybercrime and cybersecurity issues [ 41 ], gender differences [ 42 ], and the development and implementation of various authentication systems [ 43 , 44 ]. Thus, ECR articles in this cluster appear to be centered on online privacy and security issues , including equivalent solutions for improved authentication and encryption to improve trust in electronic commerce.…”
Section: Bibliographic Coupling: Thematic Clustersmentioning
confidence: 99%
“…To ensure the legitimacy of the communication object, a common session key must be established during the communication so as to prevent communication security forgery by a third party [16], [29], [31], [33].…”
Section: ) Key Agreementmentioning
confidence: 99%
“…Sensitive user information is vulnerable to interception during the communication process and can then be used to carry out illegal actions. Accordingly, the transmitted information must protect the privacy of the parties and ensure communication security between both parties [12], [16], [31]- [35].…”
Section: ) Confidentialitymentioning
confidence: 99%
“…In this section, we compared the security of the proposed payment protocol with similar recent experiences avaiable in literature. In particular, Isaac, et al proposed a lightweight secure mobile payment protocol for VANETs that allowed the merchant to send a message to the Acquirer through a Client for authentication. Also, Chen, et al used a stored‐value card to provide an added‐value payment protocol service in VANETs.…”
Section: Security Analysismentioning
confidence: 99%