2017 IEEE 7th International Advance Computing Conference (IACC) 2017
DOI: 10.1109/iacc.2017.0088
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Identity Based Batch Verification Scheme for Security and Privacy in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In the literature, several surveys have been conducted to study research efforts in the field of object authentication. In [13][14][15][16][17][18][19][20] authentication schemes based on IBC have been studied. The objectives of these surveys were to review the main concepts of IBC, summarize several IBC authentication schemes, highlight their main advantages and disadvantages, discuss the main applications of IBC, and highlight some issues related to the future use of IBC.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, several surveys have been conducted to study research efforts in the field of object authentication. In [13][14][15][16][17][18][19][20] authentication schemes based on IBC have been studied. The objectives of these surveys were to review the main concepts of IBC, summarize several IBC authentication schemes, highlight their main advantages and disadvantages, discuss the main applications of IBC, and highlight some issues related to the future use of IBC.…”
Section: Related Workmentioning
confidence: 99%
“…The objectives of these surveys were to review the main concepts of IBC, summarize several IBC authentication schemes, highlight their main advantages and disadvantages, discuss the main applications of IBC, and highlight some issues related to the future use of IBC. Dedicated research for IBC authentication schemes in MANETs, cloud computing environments, and VANETs have been conducted in [16,18], and [19], respectively. Other IBC and non-IBC authentication schemes are considered in [10,12,[21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…This approach can consume large storage and cause delay of messages transmission. Using identity-based signature & batch verification was proposed in [8]. This security paradigm approach requires updating the anonymous identity in time synchronized manner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…While symmetric-based techniques are computationally efficient, they do not provide the property of non-repudiation.So, a digital signature is used to solve this problem, since signing a message using valid credentials issued from a Trusted Party (TP) would satisfy both authentication and data integrity. Digital signature schemes used in the literature include: Group Signatures (GS)[ [11], traditional Public Key Cryptography (PKC) [35], identity-based signature & batch verification[ [36].…”
Section: Authentication and Data Integritymentioning
confidence: 99%
“…In this approach, the computation time needed for message authentication is decreased in order to minimize the message loss rate due to message check delay. Moreover, Mahapatra and Naveena in [36] used an Identity-based Batch Verification (IBV) scheme, where they proposed to randomly update the anonymous identity and location after a certain time. While, Zhang et al in [41]presented an approach that utilizes multiple TAs and a one-time identity-based aggregate signature.…”
Section: Authentication and Data Integritymentioning
confidence: 99%