2011
DOI: 10.1002/sec.239
|View full text |Cite
|
Sign up to set email alerts
|

A survey of authentication schemes for vehicular ad hoc networks

Abstract: Vehicular ad hoc networks (VANETs) are planned to be deployed within the next decade to improve driver safety, prevent collisions, and provide traffic optimization. Recent years have witnessed an increasing interest in the security schemes for VANETs as this area was relatively less explored compared to other areas such as medium access and routing. In particular, efficient authentication of the messages in a VANET with other desirable security features have been heavily studied. However, there are still sever… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 18 publications
0
17
0
1
Order By: Relevance
“…With the support of IoT systems, it is envisaged that convergent evolution of IP and mobile networks will provide a common infrastructure for a broad set of applications. In vehicular networks, the authors in [21] provide a detailed survey of authentication schemes and outline some privacy-preserving schemes. They examine and categorise proposed solutions based on their suitability for various conditions.…”
Section: B Relation To Existing Surveysmentioning
confidence: 99%
“…With the support of IoT systems, it is envisaged that convergent evolution of IP and mobile networks will provide a common infrastructure for a broad set of applications. In vehicular networks, the authors in [21] provide a detailed survey of authentication schemes and outline some privacy-preserving schemes. They examine and categorise proposed solutions based on their suitability for various conditions.…”
Section: B Relation To Existing Surveysmentioning
confidence: 99%
“…The Sybil attack is particularly harmful in a VANET [6][11] [12][18] [22][27] [29] because it can mislead the drivers about the current traffic situation. In order to protect against the Sybil attack, vehicles must be issued trusted certificates [10] [24], which make impersonating impossible. In this paper, based on our preliminary work [19], we introduce two temporary certificate-based approaches.…”
Section: Introductionmentioning
confidence: 99%
“…In order to protect against the Sybil attack, vehicles must be issued trusted certificates [5,12], which make impersonating impossible. In this paper, on the basis of our preliminary work [13], we introduce two temporary certificate-based approaches.…”
Section: Introductionmentioning
confidence: 99%
“…This work provides a summary of existing secure routing protocols in VANETs which mainly use cryptographic-based solutions. In Riley et al, 44 a review of proposals to achieve the authentication security service in VANETs is provided. The authentication schemes are categorized, and available solutions based on the cryptographic schemes recommended in IEEE 1609.2 (if infrastructure is available) and symmetric key schemes (when infrastructure is not available) are described.…”
Section: Vanets Security In the Literaturementioning
confidence: 99%