2018 IEEE Global Communications Conference (GLOBECOM) 2018
DOI: 10.1109/glocom.2018.8647327
|View full text |Cite
|
Sign up to set email alerts
|

A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs

Abstract: Vehicular Ad Hoc Networks (VANETs) are attractive scenarios that can improve the traffic situation and provide convenient services for drivers and passengers via vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, there are still many security challenges in the traffic information transmission, especially in the intense traffic case. For ensuring the privacy of users and traceability of vehicles, we propose a traceable concurrent data anonymous transmission scheme for heterogene… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…[ 55 ] A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs 2019 Journal PS09 Liu et al. [ 56 ] A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs 2018 Conference PS10 Mirsadeghi et al. [ 57 ] A trust infrastructure based authentication method for clustered vehicular ad hoc networks 2021 Journal PS11 Jagriti et al.…”
Section: Table A1mentioning
confidence: 99%
“…[ 55 ] A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs 2019 Journal PS09 Liu et al. [ 56 ] A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs 2018 Conference PS10 Mirsadeghi et al. [ 57 ] A trust infrastructure based authentication method for clustered vehicular ad hoc networks 2021 Journal PS11 Jagriti et al.…”
Section: Table A1mentioning
confidence: 99%
“…Our attack model is similar to that of the CP-ABE introduced by Zhou and Huang (2010), based on a semantic security game [ 25 ]. The game engages in message transmission and reception between probabilistic polynomial time adversaries (PPT attacker) and a challenger; the probability that the attacker can finally compromise the safety of the CP-ABE technique is the game.…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm is termed a semantic security algorithm if the attacker receives a negligible benefit in the above game within a polynomial time t [ 25 , 26 , 27 ].…”
Section: Related Workmentioning
confidence: 99%