2021
DOI: 10.1371/journal.pone.0257044
|View full text |Cite
|
Sign up to set email alerts
|

An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs

Abstract: The study of security and privacy in vehicular ad hoc networks (VANETs) has become a hot topic that is wide open to discussion. As the quintessence of this aspect, authentication schemes deployed in VANETs play a substantial role in providing secure communication among vehicles and the surrounding infrastructures. Many researchers have proposed a variety of schemes related to information verification and computation efficiency in VANETs. In 2018, Kazemi et al. proposed an evaluation and improvement work toward… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 31 publications
(59 reference statements)
0
4
0
Order By: Relevance
“…For the design of high-performance ADAS systems, it is necessary to understand the driver's intentions and the system to correctly execute intervention actions [14,15]. However, the use of these systems does not depend only on the performance of the system, and it can be stated that nowadays these assistance systems are not able to help the driver in all driving situations in traffic.…”
Section: Directions For Development Of Adas Systemsmentioning
confidence: 99%
“…For the design of high-performance ADAS systems, it is necessary to understand the driver's intentions and the system to correctly execute intervention actions [14,15]. However, the use of these systems does not depend only on the performance of the system, and it can be stated that nowadays these assistance systems are not able to help the driver in all driving situations in traffic.…”
Section: Directions For Development Of Adas Systemsmentioning
confidence: 99%
“…In equation ( 1), the vehicle transmits hE T pub (m, OTP, ID i , T i , vpk ID i )i to the TRA, and TRA replies with hE vpk ID i ((PID i, 1 , K i, 1 ), (PID i, 2 , K i, 2 ),Á Á Á, (PID i, n , K i, n ), j, T i 8)i, which both of the messages using a timestamp. The generation of certificateless signatures adds timestamp t i to calculate equations ( 4) and (5). Finally, signer generates s i = (U i , S i ) and message timestamp (M i , PID i , vpk ID i , s i , i ).…”
Section: Analysis Of Security Requirementsmentioning
confidence: 99%
“…The OBU contains the user interface, DSRC communication media, GPS, a computing power processor, an event data recorder (EDR), sensors, storage devices, and tamper-proof devices (TPD). 5 RSU allows OBU to communicate with TRA. The RSU communicates with the OBU through open and insecure wireless network channels, while, on the other hand, it connects to the TRA through a secure channel.…”
Section: Introductionmentioning
confidence: 99%
“…Its job, including registration and parameters generation for RSUs and OBUs after they join the network. It also revokes nodes in the case of vehicles broadcasting fraud messages or performing malicious behavior [4]. Meanwhile, RSUs are fixed infrastructures located along the road at dedicated locations, such as intersections or parking lots, which are fully controlled by TA [5].…”
Section: Introductionmentioning
confidence: 99%