2022
DOI: 10.1007/978-3-031-08819-3_8
|View full text |Cite
|
Sign up to set email alerts
|

An Anonymous Authentication Scheme Based on Self-generated Pseudonym for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…These external attackers may also impersonate legal vehicles to gain access to the system and send unauthorized messages. To safeguard identity privacy, existing techniques such as pseudonym-based approaches [37], [38] or group/blind signature-based techniques [39], [40] can be employed to achieve anonymity with appropriate adjustments. Concerning illegitimate participation, we assume that vehicles undergo authentication prior to joining and interacting with other vehicles, an area of active research in the field of IoVs [37]- [39], [41].…”
Section: System Overviewmentioning
confidence: 99%
“…These external attackers may also impersonate legal vehicles to gain access to the system and send unauthorized messages. To safeguard identity privacy, existing techniques such as pseudonym-based approaches [37], [38] or group/blind signature-based techniques [39], [40] can be employed to achieve anonymity with appropriate adjustments. Concerning illegitimate participation, we assume that vehicles undergo authentication prior to joining and interacting with other vehicles, an area of active research in the field of IoVs [37]- [39], [41].…”
Section: System Overviewmentioning
confidence: 99%
“…However, these two schemes do not delve into the revocation of vehicles in detail. There are numerous CPPA schemes based on pseudonyms, such as [3,[5][6][7][8][9][13][14][15][16][18][19][20][21][22]. In the fog-based scheme proposed by Zhong et al [3], vehicles generate pseudonyms using two seed values, which partially alleviates the burden on the Trusted Authority (TA) and reduces the storage overhead for vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…According to the calculation in Table 3, the pseudonym signature length of this scheme is 324 Bytes. It is slightly higher than the scheme [7], but this scheme adds the distributed tracing function and realizes the tracing of the real identity of the pseudonym without obviously increasing the communication cost. Therefore, this scheme has certain practicality.…”
Section: Performance Analysismentioning
confidence: 99%
“…Literature [5][6] used blockchain to design two distributed pseudonyms publishing schemes, but these two schemes do not consider the regulation of pseudonyms. Literature [7] studied the selfgenerated pseudonyms schemes. The pseudonym updating is based on the updated database of the TA.…”
Section: Introductionmentioning
confidence: 99%