2011
DOI: 10.1002/sec.285
|View full text |Cite
|
Sign up to set email alerts
|

Group‐based hybrid authentication scheme for cooperative collision warnings in VANETs

Abstract: Cooperative collision warnings (CCWs) is one of the important applications of Vehicular Ad-Hoc Networks (VANETs) where secure and timely delivery of messages to the neighboring vehicles are needed. Secure communication is as important as timely communication to take proper actions in order to avoid collisions and thus prevent fatal accidents. However, security and delay are two competing metrics since security brings additional processing overhead, increasing the packet delays. While symmetric-key-based securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…Symmetric, asymmetric and groupbased cryptography protocols have been proposed to guarantee the authenticity, confidentiality, integrity, and the privacy features [10], [11], [12]. However, some secure protocols have been proposed to provide a certain service and specifically considering the requirements of these services, such as: secure cooperative collision warnings [13], secure position information [14], secure information dissemination [15], and secure service discovery protocols [16].…”
Section: B Secure Protocols For Vanetsmentioning
confidence: 98%
“…Symmetric, asymmetric and groupbased cryptography protocols have been proposed to guarantee the authenticity, confidentiality, integrity, and the privacy features [10], [11], [12]. However, some secure protocols have been proposed to provide a certain service and specifically considering the requirements of these services, such as: secure cooperative collision warnings [13], secure position information [14], secure information dissemination [15], and secure service discovery protocols [16].…”
Section: B Secure Protocols For Vanetsmentioning
confidence: 98%
“…The TSVC minimizes the packet overhead due to signature overhead and reduces the latency incurred from the verification of a signature. Riley et al proposed in [11] a secure scheme for cooperative collision warning applications in VANets. They proposed a delay efficient authentication protocol, named GHAP, relaying on a group based behavior.…”
Section: Related Workmentioning
confidence: 99%
“…Assuming AvgSP the average number of service providers that can satisfy one service request, and that N is the total number of service requests, the total number NbT otalSSRep of service reply messages exchanged during the simulation period T is: Proof: The message complexity MCompSecLocV SDP of our proposed SecLocVSDP for N requests is the summation of the neighbor discovery messages, the group key exchange messages, the update messages, the service providers registration messages, the hash request messages, the hash reply messages, the secure location based request messages, and the secure location based reply messages. The theorem is derived from Lemmas [4][5][6][7][8][9][10][11][12].…”
Section: Complexity Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…The authentication of infrastructure‐less secure service discovery can rely on public key , or symmetric key as described below. Studer et al presented in TESLA++, which is a modified version of TESLA .…”
Section: Related Workmentioning
confidence: 99%