2022
DOI: 10.1109/access.2022.3203580
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Physically Secure Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc NETworks (VANETs)

Abstract: Vehicular ad-hoc networks (VANETs) can substantially improve traffic safety and efficiency by providing a communication platform between vehicles and roadside units (RSUs) to share real-time information on traffic and road conditions. Two essential security requirements for VANETS are data authentication and the preservation of the privacy of vehicle owners. Conditional privacy-preserving authentication (CPPA) schemes address both of these security requirements. The existing CPPA schemes either require a tampe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 42 publications
0
0
0
Order By: Relevance
“…To ensure system security, trusted access schemes that allow legitimate terminals and deny illegal terminals are necessary. The common trusted access technologies are usually implemented based on cryptography [6,7,11,12]. Taking the PKI-based authentication scheme as an example, through the certification authority which verifies whether the current terminal is legal, the scheme can ensure that only trusted terminals have access [6,7].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To ensure system security, trusted access schemes that allow legitimate terminals and deny illegal terminals are necessary. The common trusted access technologies are usually implemented based on cryptography [6,7,11,12]. Taking the PKI-based authentication scheme as an example, through the certification authority which verifies whether the current terminal is legal, the scheme can ensure that only trusted terminals have access [6,7].…”
Section: Related Workmentioning
confidence: 99%
“…Many of them are limited in terms of computer and storage resources. This may prevent them from performing common authentication algorithms [6,7,11,12] that require encryption and decryption calculations. To address the problem of heterogeneous terminals access authentication, in the proposed end-edge-cloud cooperative authentication framework, the center cloud node and all the edge cloud nodes are configured with our novel unified trusted access authentication (UTAA) model.…”
Section: Overview Of the Frameworkmentioning
confidence: 99%