2020
DOI: 10.1016/j.jisa.2020.102556
|View full text |Cite
|
Sign up to set email alerts
|

On the conference key distribution system with user anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Also, some of the values (e.g., existing in Algorithm 2) are set heuristically, evaluating the performance by optimally adjusting those values dynamically would certainly enhance the obtained privacy level of WHISPER. Moreover technologies like blockchain [ 47 ], cryptography [ 48 ], IDSs [ 49 ], and Edge Computing [ 50 ] which are widely recognized as key enablers for IoV could be integrated or used in parallel with our solution. Finally, using other metrics like the number of sent BSMs, the number of verified signatures, and evaluating WHISPER’s performance under different scenarios like the free-way model are some of our future plans.…”
Section: Discussionmentioning
confidence: 99%
“…Also, some of the values (e.g., existing in Algorithm 2) are set heuristically, evaluating the performance by optimally adjusting those values dynamically would certainly enhance the obtained privacy level of WHISPER. Moreover technologies like blockchain [ 47 ], cryptography [ 48 ], IDSs [ 49 ], and Edge Computing [ 50 ] which are widely recognized as key enablers for IoV could be integrated or used in parallel with our solution. Finally, using other metrics like the number of sent BSMs, the number of verified signatures, and evaluating WHISPER’s performance under different scenarios like the free-way model are some of our future plans.…”
Section: Discussionmentioning
confidence: 99%
“…This key can be utilized as input to a symmetric algorithm to encrypt the messages exchanged inside an ad hoc group of nodes, such as industrial sensors or vehicles (Tselikis 2020). Alternatively, the routing protocol can call the services of a trust-based mechanism in order to resolve the next hop node based on the level of the nodes' reputation (Zahariadis 2010).…”
Section: Distributed Cooperative Architecturementioning
confidence: 99%
“…Another design of lightweight group key agreement presented by Harn et al [34] exploited some basic cryptographic operations and explained its potentials in several application networks. Based on principles of elliptic-curve cryptography (ECC), Tselikis et al [35] also introduced an group key distribution scheme that provided privacy protection for communications. Both Harn et al [34] and Tselikis et al [35] did not include either biometric authentication function or three-factor authentication solutions in their designs.…”
Section: User Authentication and Key Negotiation Solutionsmentioning
confidence: 99%