2012 Fourth International Conference on Intelligent Networking and Collaborative Systems 2012
DOI: 10.1109/incos.2012.27
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Binary Authentication Tree Algorithm for Vehicular Networks

Abstract: Vehicular networks are gaining popularity because vehicular communications are able to help minimize accidents, improve traffic conditions, etc. To avoid malicious attacks and potential abuse, employing digital signatures is widely recognized as the most efficient approach for vehicular networks. However, when the number of signatures received by a roadside unit (RSU) becomes large, a scalability problem emerges immediately: it can be difficult for the RSU to sequentially verify every received signature within… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…n authentic signatures n signatures with b ≥ 1 fake signatures Liu et al [12] 3P C + SC = 4.02513 ms -Tzeng et al [16] 2P C + SC = 2.68513 ms -Azees et al [19] (1 + n)P C = 1.34(1+n) ms -Gu et al [20] nP C + 3nEC = 7.43n ms -Jiang et al Jiang et al [21], Wang et al [22], and Shim et al [36], in batch signatures verification process, with and without b ≥ 1 fake signatures.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…n authentic signatures n signatures with b ≥ 1 fake signatures Liu et al [12] 3P C + SC = 4.02513 ms -Tzeng et al [16] 2P C + SC = 2.68513 ms -Azees et al [19] (1 + n)P C = 1.34(1+n) ms -Gu et al [20] nP C + 3nEC = 7.43n ms -Jiang et al Jiang et al [21], Wang et al [22], and Shim et al [36], in batch signatures verification process, with and without b ≥ 1 fake signatures.…”
Section: Methodsmentioning
confidence: 99%
“…Main feature: an IBS cryptography-based authentication scheme with binary authentication tree (BAT) mechanism for illegal signatures identification. Limitation: insecure against forgery attacks, replay attacks, and Sybil attacks [22], [36].…”
Section: Authorsmentioning
confidence: 99%
See 2 more Smart Citations