2018
DOI: 10.1109/access.2018.2869543
|View full text |Cite
|
Sign up to set email alerts
|

MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles

Abstract: Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ensure the survivability of IoV. Fortunately, this goal can be achieved by quickly verifying real-time monitoring data to avoid network failure. Aggregate signature is an efficient approach to realize quick data verification quickly. In this paper, we propose a m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…Obviously, the cost increases linearly with the number of signers. The costs of aggregate verify stage of the proposed scheme, overlap while that of Reference slightly performs better than these three schemes. However, the scheme in Reference is insecure against forgery attack and is vulnerable to collusion attack.…”
Section: Security Analysis and Performance Evaluationmentioning
confidence: 91%
See 4 more Smart Citations
“…Obviously, the cost increases linearly with the number of signers. The costs of aggregate verify stage of the proposed scheme, overlap while that of Reference slightly performs better than these three schemes. However, the scheme in Reference is insecure against forgery attack and is vulnerable to collusion attack.…”
Section: Security Analysis and Performance Evaluationmentioning
confidence: 91%
“…We present an extensive analysis of the computation cost and communication overhead of the proposed scheme and those in References , and then make comparison. The method of evaluation developed in Reference is adopted in our analysis in which an 80‐bit level of security is obtained using a bilinear map eˆ:G1×G1GT, where G 1 is an additive group produced using a point P with prime order q on a super‐singular elliptic curve E : y 2 = x 3 + x mod p of embedding degree 2, where p and q are 512 bits and 160 bits, respectively.…”
Section: Security Analysis and Performance Evaluationmentioning
confidence: 99%
See 3 more Smart Citations