2015
DOI: 10.1002/dac.3081
|View full text |Cite
|
Sign up to set email alerts
|

A secure mutual authentication scheme with non‐repudiation for vehicular ad hoc networks

Abstract: Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANETs are not only used to enhance the road safety and reduce the traffic accidents earlier but also conducted more researches in network value-added service. As a result, the security requirements of vehicle communication are given more attention. In order to prevent the security threat of VANETs, the security requirements, such as the message integrity, availability, and confidentiality are needed to be guaranteed further. Theref… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…To ensure a secure communication processes between two parties, the object of communication is verified by the system, and its legality ensured. Thus, the scheme must offer identity authentication [9], [10], [13], [14], [16], [30].…”
Section: ) Mutual Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…To ensure a secure communication processes between two parties, the object of communication is verified by the system, and its legality ensured. Thus, the scheme must offer identity authentication [9], [10], [13], [14], [16], [30].…”
Section: ) Mutual Authenticationmentioning
confidence: 99%
“…Lia et al proposed a VANET scheme that achieved authentication and integrity but did not offer non-repudiation [15]. Chen et al proposed a scheme that transferred information between vehicles, and required that each vehicle in the network be trustworthy [16]. Non-repudiation and message integrity are indispensable in preventing counterfeit emergency messages, Chim et al also emphasized that vehicles should be able to verify whether a message is indeed sent and signed by another vehicle without being modified [17], thus preventing message tampering during transmission, and ensuring that received messages contain the original information [18].…”
Section: Introductionmentioning
confidence: 99%
“…However, in 2015, the lightweight identity authentication protocol was analyzed that it cannot resist the parallel session attack, 38 therefore, the attacker may forge the other's certification to pass the authentication of RSU. 39 proposed a secure mutual authentication scheme for VANETs. First, OBU registers in the certification authority, and certification authority issues the certification.…”
Section: Otp Used For the Authenticationmentioning
confidence: 99%
“…If a product is physical, the seller will entrust their logistics to deliver the goods to the buyer. As these logistics requirements grow, greater focus is required, not only on rapid delivery, but also on ensuring the integrity of goods and the privacy of personal information [2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%