2006 First International Conference on Communications and Networking in China 2006
DOI: 10.1109/chinacom.2006.344746
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Privacy-Preserving Authentication in Vehicular Networks

Abstract: Abstract-Vehicular networks have attracted extensive attentions in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols. Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the degrees of privacy they wish to have. To address this requirement, we propose a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 64 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…VANET). When comparing this protocol to previous work [2][3], RSU should provide fairness to all OBUs while sustaining anonymity authentication service, e.g., prevents DoS attack. we would like to address attack issue.…”
Section: B Cooperation Among Obus and Rsumentioning
confidence: 99%
See 4 more Smart Citations
“…VANET). When comparing this protocol to previous work [2][3], RSU should provide fairness to all OBUs while sustaining anonymity authentication service, e.g., prevents DoS attack. we would like to address attack issue.…”
Section: B Cooperation Among Obus and Rsumentioning
confidence: 99%
“…The protocol that we will describe is based on the previous work [1] [2]. We consider privacy issues in VANET, and integrate it with anonymity models considering background knowledge attack, t-closeness attack, then we customize to add more features, (1) allow the OBU to form a group by randomized algorithm or prepare multiple groups depending on varied privacy needs using database queries, and (2) treat OBU and RSU rational players, (3) allow RSU adjust anonymity group level to avoid prisoner dilemma effect [5], (4) allow RSU give client puzzle [6] for suspicious anonymity request to prevent DoS attack.…”
Section: B Protocol Descriptionmentioning
confidence: 99%
See 3 more Smart Citations