2021
DOI: 10.1155/2021/5526412
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks

Abstract: Vehicular ad hoc network (VANET) is a multihop mobile wireless communication network that can realize many vehicle-related applications through multitop communication. In the open wireless communication environment, security and privacy protection are important contents of VANET research. The most basic method of VANET privacy protection is anonymous authentication. Even through, there are many existing schemes to provide anonymous authentication for VANETs. Many existing schemes suffer from high computational… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…The number of vehicles that have not successfully established a connection can be expressed as N 2 = N 1 − N 1 p 1 , while the remaining slots can be represented by L 2 = N 1 − N 1 p 1 . According to Equation ( 9) or (13), the probability of the second successful vehicle gaining access is denoted by p 2 . The number of vehicles successfully accessing slots after the second random access is ⌊N 2 p 2 ⌋, and they occupy ⌊N 2 p 2 ⌋ time slots.…”
Section: Improving the Success Rate Of Vehicle Access In Vanets By In...mentioning
confidence: 99%
See 1 more Smart Citation
“…The number of vehicles that have not successfully established a connection can be expressed as N 2 = N 1 − N 1 p 1 , while the remaining slots can be represented by L 2 = N 1 − N 1 p 1 . According to Equation ( 9) or (13), the probability of the second successful vehicle gaining access is denoted by p 2 . The number of vehicles successfully accessing slots after the second random access is ⌊N 2 p 2 ⌋, and they occupy ⌊N 2 p 2 ⌋ time slots.…”
Section: Improving the Success Rate Of Vehicle Access In Vanets By In...mentioning
confidence: 99%
“…In recent years, the research on FSA protocol has garnered significant attention [10,11]. The utilization of FSA has been widespread in various domains including wireless sensor networks [12], vehicular ad hoc networks [13,14], and radio frequency identification networks [15]. Meanwhile, an increasing number of end-users are adopting the FSA protocol for communication, leading to intensified competition for access time slots.…”
Section: Introductionmentioning
confidence: 99%
“…Lee et al [36] proposed an anonymous authenticated key exchange protocol based on PUF to achieve efficient user join and exit. Sun et al [37] constructed an efficient scheme based on realistic tamper-proof devices to achieve key exchange for VANETs. Guo et al [38] proposed an authenticated key exchange method which holds anonymity for wearable computing environments.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the protocol relies on the costly ECDH technique. In [15], Mei et al suggests an authentication and key agreement scheme that ensures anonymity, the scheme is built upon pseudonyms, utilizing a nonsingular elliptic curve. In [16], Azees et al suggests a signature based AKA protocol for vehicular ad-hoc networks.…”
Section: Relevant Literaturementioning
confidence: 99%