2013
DOI: 10.1504/ijvics.2013.055759
|View full text |Cite
|
Sign up to set email alerts
|

Authentication schemes for VANETs: a survey

Abstract: In this paper, we make a survey of the known schemes for V2V (vehicle to vehicle) and V2I (vehicle to infrastructure) authentication in VANETs (vehicular ad hoc networks). We consider a variety of safety applications in VANETs, identify authentication as one of the security requirements and discuss the security challenges for these applications. Existing authentication schemes based on digital signatures are discussed along with schemes based on hash chains and hash trees. It has also been shown how the level … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…d. VCC users approach physically to CA, provide all essential data like vehicle id, name, phone number, email id, unique identity number and get registered with CA. e. OBU, RSU and CA communicate to each other via high bandwidth, low bit error and low delay links [13,24,25]. f. Data messages are encrypted at OBU before uploading it to vehicular cloud.…”
Section: Assumptionsmentioning
confidence: 99%
“…d. VCC users approach physically to CA, provide all essential data like vehicle id, name, phone number, email id, unique identity number and get registered with CA. e. OBU, RSU and CA communicate to each other via high bandwidth, low bit error and low delay links [13,24,25]. f. Data messages are encrypted at OBU before uploading it to vehicular cloud.…”
Section: Assumptionsmentioning
confidence: 99%
“…3.In the proposed model, malicious vehicle are marked with good/malicious ones and change their behavior in the VANET communication. 4.Proposed V2V and V2R based authentication model optimizes the overall network efficiency in terms of time and packet delivery ratio on realistic traffic management systems.…”
Section: Authentication Schemes Of Vanetmentioning
confidence: 99%
“…In order to enhance the security level, the master secret is updated initially. A.Das and D. Roychoudhury carried out a detail survey on different authentication techniques of VANETs [4]. They have studied and analyzed all traditional and previously developed VANET authentication techniques.…”
Section: Related Workmentioning
confidence: 99%
“…An application of our batch-verification algorithms is in secure vehicle-to-vehicle (V2V) communications in vehicular ad hoc networks (VANETs) (see [6] for a survey). Since signature generation and verification are time-consuming operations, and since vehicles have to verify signatures repeatedly, any algorithm that speeds up the authentication process is of great help in V2V communications.…”
Section: Introductionmentioning
confidence: 99%
“…Analytic results for Algorithm S2 are provided in Sect. 6. A heuristic capable of significantly speeding up Algorithms S1 and S2 is presented in Sect.…”
Section: Introductionmentioning
confidence: 99%