2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems 2009
DOI: 10.1109/mobhoc.2009.5337018
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative anonymity authentication in Vehicular Networks

Abstract: Abstract-Data privacy in Vehicular Ad hoc NETworks(VANET) is a practical issue currently under the research and development. Privacy preserving anonymity authentication in network is a challenging topic combining anonymity, authentication, data privacy and network. Existing anonymity authentication in VANET are based on k-anonymity model, but K-anonymity model group selection may leak information due to absence of diversity in the sensitive attribute etc., and thus group selection is a problem left unresolved.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…They also proposed a new hybrid authentication mechanism VAST that combines the advantage of ECDSA and TESLA++. Jianmin Chen et al [9] addressed anonymity authentication attack issues. The authors addressed how to improve efficiency and sustain anonymity service using cooperation instead of zero trust model and flexibility of vehicular side group selection to adapt changing privacy preserving concern.…”
Section: Related Workmentioning
confidence: 99%
“…They also proposed a new hybrid authentication mechanism VAST that combines the advantage of ECDSA and TESLA++. Jianmin Chen et al [9] addressed anonymity authentication attack issues. The authors addressed how to improve efficiency and sustain anonymity service using cooperation instead of zero trust model and flexibility of vehicular side group selection to adapt changing privacy preserving concern.…”
Section: Related Workmentioning
confidence: 99%
“…By overhearing VANET communications, one powerful adversary may figure out the real identities of its interested nodes and profile them in terms of application accessing and personal information. Thus, several schemes [61], [62], [110] have been proposed to enable privacy-preserving node authentication in VANETs. Still, by overhearing the periodic beacons one adversary may collect the location history of any node.…”
Section: Privacy Protectionmentioning
confidence: 99%