2019
DOI: 10.1007/s12204-019-2038-x
|View full text |Cite
|
Sign up to set email alerts
|

Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Ajay N et al [21] performed the study on several attacks. In addition, in the Sybil attack, attackers generate fake workstations and they send the fake messages through entire system.…”
Section: Sybil Attackmentioning
confidence: 99%
“…Ajay N et al [21] performed the study on several attacks. In addition, in the Sybil attack, attackers generate fake workstations and they send the fake messages through entire system.…”
Section: Sybil Attackmentioning
confidence: 99%
“…According to the research done by Ajay N et al [21], the attackers are able to send the messages to the vehicles frequently to make the buffer full; therefore, vehicles would not be able to receive the further messages which might be vital. This attack can be classified as the most dangerous one in a VANET system.…”
Section: Denial Of Service Attack (Dos)mentioning
confidence: 99%
“…With the aid of C and a, the vehicle computes a symmetric key S which will be used to securely exchange authentication messages between the vehicle and TA. This symmetric key is calculated by (9). After the generation of the shared key S, the vehicle splits this key into two separated sub-keys: S 1 and S 2 to be utilized in further computations.…”
Section: ) Generation Of Keys At Vehiclementioning
confidence: 99%
“…The protocol uses low-level computing operations such as XOR operator and hash functions, but the certificate management is its main demerit. Moreover, a secure authentication protocol is introduced in [9] to successfully achieve the data confidentiality between the vehicle and infrastructure, but the secure channels are required for exchanging keys. Besides, the proposed scheme in [10] utilizes long-term certificate for each entity in the network to revoke the vehicle identity in the case of attack.…”
Section: Introductionmentioning
confidence: 99%