Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 30 publications
(6 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…Data privacy: All VANET protocols have supposed the vehicles will be part of data communication over V2V multihop communications [24]. Due to data security and control access, all participating nodes need to be identified and known to VANET [59]. In this context, individuals may be reluctant to share information about their vehicles or intended destinations to avoid potential privacy breaches.…”
Section: Distinguished Characteristics Of Vanetmentioning
confidence: 99%
“…Data privacy: All VANET protocols have supposed the vehicles will be part of data communication over V2V multihop communications [24]. Due to data security and control access, all participating nodes need to be identified and known to VANET [59]. In this context, individuals may be reluctant to share information about their vehicles or intended destinations to avoid potential privacy breaches.…”
Section: Distinguished Characteristics Of Vanetmentioning
confidence: 99%
“…To alleviate the key update overhead, the decentralized architecture consists of a key distribution center and multiple subkey distribution centers for managing IoT groups [35]. Although some blockchain-based key management techniques for VANET have been proposed [25], [36], these methods lack automatic key renewal in dynamic applications [37]. Additionally, the problem of single point of failure remains.…”
Section: B Related Workmentioning
confidence: 99%
“…However, this scheme is cannot withstand tag and server impersonation attacks and hence privacy is not assured. In addition, it fails to provide both backward and forward key secrecy [54]- [56]. On the other hand, single-use signature based scheme has been developed in [57] while a joint verification scheme has been presented in [58] based on symmetric and biometric [59] encoding techniques.…”
Section: Related Workmentioning
confidence: 99%