2020
DOI: 10.1109/tii.2019.2948053
|View full text |Cite
|
Sign up to set email alerts
|

BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 194 publications
(66 citation statements)
references
References 26 publications
0
66
0
Order By: Relevance
“…e computational cost of the BBAAS is analysed with Qi Feng et al's scheme [23], Dong Zheng et al's scheme [24], Zhaojun Lu et al's scheme [25], and Lun Li et al's scheme [26] as shown in Table 1. To find out the actual timing values of various cryptographic primitives of the proposed BBAAS, a 2 GHz laptop with 4 GB installed memory is used, with Cygwin 1.7.35-15 [27], PBC library [28], and GCC version 4.9.2 being considered.…”
Section: Computational Costmentioning
confidence: 99%
“…e computational cost of the BBAAS is analysed with Qi Feng et al's scheme [23], Dong Zheng et al's scheme [24], Zhaojun Lu et al's scheme [25], and Lun Li et al's scheme [26] as shown in Table 1. To find out the actual timing values of various cryptographic primitives of the proposed BBAAS, a 2 GHz laptop with 4 GB installed memory is used, with Cygwin 1.7.35-15 [27], PBC library [28], and GCC version 4.9.2 being considered.…”
Section: Computational Costmentioning
confidence: 99%
“…Li et al [67] solved the problem of carpooling users' information being disclosed in fog computing by incorporating blockchainassisted vehicular fog computing that is capable of preserving the users' private information. Feng et al [68] implemented a blockchain-assisted privacy-preserving authentication system (BPAS) in VANETs to verify the messages being transmitted in the network. Security analysis shows that this framework is able to achieve conditional privacy preservation.…”
Section: ) Security Enhancement Techniquesmentioning
confidence: 99%
“…Trusted hardware, such as trusted execution environment (TEE) [28][29][30], is a common method to implement secure computing. TEE ensures that the code and data loaded in it are protected in terms of confidentiality and integrity.…”
Section: Security Computingmentioning
confidence: 99%