2019
DOI: 10.1080/15472450.2019.1625042
|View full text |Cite
|
Sign up to set email alerts
|

A new and efficient authentication scheme for vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(57 citation statements)
references
References 35 publications
0
55
0
2
Order By: Relevance
“…Therefore, many of the schemes in bilinear pairbased achieves the security requirements, as presented in Table 5. The scheme introduced in [52], [55] does not fulfill most privacy requirements, such as unobservability and unlinkability compared with other bilinear pair-based schemes, as presented in Table 6. The schemes introduced in [53], [54] are vulnerable from resistance to replay attacks, as presented in Table 7.…”
Section: Critical Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, many of the schemes in bilinear pairbased achieves the security requirements, as presented in Table 5. The scheme introduced in [52], [55] does not fulfill most privacy requirements, such as unobservability and unlinkability compared with other bilinear pair-based schemes, as presented in Table 6. The schemes introduced in [53], [54] are vulnerable from resistance to replay attacks, as presented in Table 7.…”
Section: Critical Discussionmentioning
confidence: 99%
“…The same author, Baya et al [55], introduced an efficient authentication scheme that does not require any online-RSU or equipped vehicle equipped with TPD to store the private key of TA. Therefore, the entire system is not compromised when only one vehicle OBU is affected.…”
Section: A Bilinear Pair Basedmentioning
confidence: 99%
“…To address the limitations regarding a public key infrastructure-based CPPA and group signature-based CPPA schemes, several researchers propose an identity-based CPPA scheme [35][36][37][38][39][40][41]. The primary insight of identity based-CPPA scheme is to extract the public key from the identity information, while the TA creates a private key with the same information.…”
Section: Identity-based Cppamentioning
confidence: 99%
“…This section mainly includes four phases consisting of the initialization, joining, message signing and verification. These phases of our proposed scheme are based on the scheme of Bayat et al [29]. However, the proposed scheme avoids the employ of the bilinear pairing operation and Map-To-Point hash function that are well-known to be time-consuming, unlike Bayat et al [29].…”
Section: The Proposed Schemementioning
confidence: 99%