2010
DOI: 10.1109/tvt.2009.2028893
|View full text |Cite
|
Sign up to set email alerts
|

DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks

Abstract: Abstract-In this paper, we propose an efficient distributedcertificate-service (DCS) scheme for vehicular networks. The proposed scheme offers flexible interoperability for certificate service in heterogeneous administrative authorities and an efficient way for any onboard units (OBUs) to update its certificate from the available infrastructure roadside units (RSUs) in a timely manner. In addition, the DCS scheme introduces an aggregate batchverification technique for authenticating certificate-based signature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
54
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 92 publications
(54 citation statements)
references
References 31 publications
0
54
0
Order By: Relevance
“…The proposed scheme suggests the usage of PASS [8] as the mechanism for authentication of videos uploaded to the Cloud Platform, not only because it has one of the lowest overheads in terms of time for signing, certificate validation, and signature verification (see Table 2), but also because it solves the limitation of BP [16]. However, other algorithms such as BP [16], ECPP [17], DCS [18], and hybrid one [19] can be considered. Table 2 shows the time required for generation and verification of signatures and certificate verification using different algorithms [8] (same for both Eiza-Ni-Shi Scheme and proposed scheme).…”
Section: Overhead Generated In Video Transmission Protocolmentioning
confidence: 99%
“…The proposed scheme suggests the usage of PASS [8] as the mechanism for authentication of videos uploaded to the Cloud Platform, not only because it has one of the lowest overheads in terms of time for signing, certificate validation, and signature verification (see Table 2), but also because it solves the limitation of BP [16]. However, other algorithms such as BP [16], ECPP [17], DCS [18], and hybrid one [19] can be considered. Table 2 shows the time required for generation and verification of signatures and certificate verification using different algorithms [8] (same for both Eiza-Ni-Shi Scheme and proposed scheme).…”
Section: Overhead Generated In Video Transmission Protocolmentioning
confidence: 99%
“…In 2010, Wasef et al [7] proposed the RSU-aided distributed certificate service (DCS), which enables vehicles to update their certificates from an RSU. A vehicle can update its certificate from any RSU, even when it is not in the coverage range of that RSU.…”
Section: Related Work and Techniquesmentioning
confidence: 99%
“…Kuo [12] proposed a message authentication scheme that can get pairing value to establish mutual trust in intra-and inter-RSU environments based on the chameleon hash function, but this scheme suffers from malicious revocation. Section 4 will compare DCS [7], PASS [8], CH-IBC [9], BDH [11] and the proposed scheme in terms of functionality and performance.…”
Section: Related Work and Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…security and privacy preservation for mobile vehicles Calandriello et al (2007); Chen et al (2011); Daza et al (2009);Hubaux et al (2004); Kamat et al (2006); Kounga et al (2009) ;Li et al (2008); Lin et al (2007;2008a;b); ; Mak et al (2005); Plöβl & Federrath (2008); Raya & Hubaux (2005;2007); 2010a;b); Wasef et al (2010); Wang et al (2008); Wu et al (2010); Xu et al (2007); Xi et al (2007;2008) ;Xiong et al (2010a;b); Zhang et al (2008a;b). Obviously, any malicious behaviors of user, such as injecting beacons with false information, modifying and replaying the previously disseminated messages, could be fatal to the other users.…”
mentioning
confidence: 99%