2019
DOI: 10.1002/dac.4130
|View full text |Cite
|
Sign up to set email alerts
|

A novel conditional anonymity scheme for vehicular communication networks

Abstract: Vehicular communication networks are traffic applications of the Internet of Things consisting of vehicle nodes, roadside units, service providers, and other components. To protect the vehicle privacy, some vehicular communication networks adopt anonymous schemes. However, in these anonymous schemes, anonymity abuse is inevitable. In order to protect vehicular privacy and prevent anonymity abuse, some conditional anonymous authentication schemes based on cryptography have been proposed. However, most of these … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…This approach utilizes a pseudonym management scheme based on fog computing, which has abundant network edge resources; accordingly, the method can transfer the pseudonym management system to the fog, which is composed of roadside units (RSUs), and proposes the concept of pseudonyms change choice pseudonyms problem, which can effectively reduce costs and ensure that the user attribute information is safe without creating delays in data transmission. Moreover, in order to solve the problem of computing complexity, Wang et al used the dimension reduction method to manage the pseudonyms [45]; this reduces both the time cost and space complexity of vehicle certifications, while the new condition of anonymous VKPCA (vehicular communication network based on kernel principal component analysis) is also implemented to avoid abuse of the anonymities at the same time. This approach has lower computational complexity, while also being able to protect the user attribute information.…”
Section: A Location Privacy Protection Based On User Attribute Informentioning
confidence: 99%
See 1 more Smart Citation
“…This approach utilizes a pseudonym management scheme based on fog computing, which has abundant network edge resources; accordingly, the method can transfer the pseudonym management system to the fog, which is composed of roadside units (RSUs), and proposes the concept of pseudonyms change choice pseudonyms problem, which can effectively reduce costs and ensure that the user attribute information is safe without creating delays in data transmission. Moreover, in order to solve the problem of computing complexity, Wang et al used the dimension reduction method to manage the pseudonyms [45]; this reduces both the time cost and space complexity of vehicle certifications, while the new condition of anonymous VKPCA (vehicular communication network based on kernel principal component analysis) is also implemented to avoid abuse of the anonymities at the same time. This approach has lower computational complexity, while also being able to protect the user attribute information.…”
Section: A Location Privacy Protection Based On User Attribute Informentioning
confidence: 99%
“…This section identifies three future research directions in the field of location privacy protection. [28]- [45] Low overhead and simple implementation Low user service availability K-anonymous [28] Pseudonym [38] Location privacy protection policy based on user behavior information [46]- [75] High degree of privacy protection…”
Section: Future Workmentioning
confidence: 99%