2019
DOI: 10.1016/j.vehcom.2019.02.002
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 151 publications
(73 citation statements)
references
References 57 publications
0
73
0
Order By: Relevance
“…BSM content being a predefined with limited content, the size of the BSM is supposed to be small and constant. As shown in this recent survey on secure protocol for vehicular communications [19], we compared the proposed protocol with the protocol in [20] as shown in Table 3.…”
Section: Computational Costmentioning
confidence: 99%
See 1 more Smart Citation
“…BSM content being a predefined with limited content, the size of the BSM is supposed to be small and constant. As shown in this recent survey on secure protocol for vehicular communications [19], we compared the proposed protocol with the protocol in [20] as shown in Table 3.…”
Section: Computational Costmentioning
confidence: 99%
“…[15][16][17]; (2) event-driven message (EDM) that are generated at the time of occurrence such as accident alerts or emergency reports [18]. There are many solutions that addressed BSM based scenarios for privacy and security as shown in this recent survey [19]. However, these schemes cannot be directly applied to EDM scenarios for the following reasons.…”
Section: Introductionmentioning
confidence: 99%
“…Notably, Petit et al [2] emphasize that these categories are not hard-edged so that several recent works combine different techniques from the previous categories. Survey [3] listed these hybrid schemes and discussed their security and efficiency in performance. These results pointed out that recently proposed schemes attempt to apply the batch verification of signatures into the verification procedure, which can greatly reduce the computation cost comparing with single verification.…”
Section: Related Workmentioning
confidence: 99%
“…There are two hard-problem assumptions in bilinear pairings, i.e., Computational Bilinear Diffie-Hellman (CBDH) Problem and Decisional Bilinear Diffie-Hellman (DBDH) Problem, as described in the following. 3 , it is difficult to determine whether or not h =ê(P, Q) abc mod q.…”
Section: B Bilinear Pairingsmentioning
confidence: 99%
“…ey also discussed the machine learning algorithms applied to handle different kinds of attacks in the VANETs. Ali et al [41] presented a survey on the authentication and privacy schemes for vehicular networks such as VANETs. e model classification, requirements, and threats and attacks were explained.…”
Section: Introductionmentioning
confidence: 99%