2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2017
DOI: 10.1109/wispnet.2017.8300034
|View full text |Cite
|
Sign up to set email alerts
|

A reliable and secure approach for efficient Car-to-Car communication in intelligent transportation systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Hence, their scheme computes efficiency of schemes based on PKI and emulates on tools hundreds. Joshi et al [11] designed an efficient scheme using event-triggered which broadcasted beacons to address issues related to security in VANET. Their scheme utilizes the signer of verification based on the PKI to test the beacon validity.…”
Section: Related Work a Public Key Infrastructure (Pki)mentioning
confidence: 99%
“…Hence, their scheme computes efficiency of schemes based on PKI and emulates on tools hundreds. Joshi et al [11] designed an efficient scheme using event-triggered which broadcasted beacons to address issues related to security in VANET. Their scheme utilizes the signer of verification based on the PKI to test the beacon validity.…”
Section: Related Work a Public Key Infrastructure (Pki)mentioning
confidence: 99%
“…The main idea of the public key infrastructure-based CPPA schemes [22][23][24][25][26][27][28][29][30] is to preload a massive pool of private/public keys and their matching certificates to the OBUs of vehicles, generated by the TA during the registration process. This approach supports privacy-preserving, since a massive pool of private/public keys and their matching certificates are preloaded in advance.…”
Section: Public Key Infrastructure-based Cppamentioning
confidence: 99%
“…Joshi et al [29] designed an event-triggered authentication scheme that sends messages to investigate problems regarding security in the VANET. Asghar et al [30] designed a feasible PKI-CPPA scheme to tackle the process of authenticating requests, in which the size of the Certificate Revocation List (CRL) is linear.…”
Section: Public Key Infrastructure-based Cppamentioning
confidence: 99%
“…Many PKI-based [7], [8], [9], [10], [11], [12] schemes have been proposed. The major shortfall of these approaches is that a large number of anonymous certificates and their respective public-private keys are placed in the OBU of the vehicle, which causes a massive certificate management burden for the TA.…”
Section: A Pki-based Schemesmentioning
confidence: 99%