2021
DOI: 10.1109/tifs.2021.3098971
|View full text |Cite
|
Sign up to set email alerts
|

P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(21 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…Several other protocols employing multiple entities such as cloud servers (CS), fog servers (FS), pad owners (POs) and road-side units (RSU) have been proposed in [13,14,15,16]. However, all these approaches consider a decentralised infrastructure involving multiple mutual authentications between the EV and various other entities of the DWPT system.…”
Section: Related Workmentioning
confidence: 99%
“…Several other protocols employing multiple entities such as cloud servers (CS), fog servers (FS), pad owners (POs) and road-side units (RSU) have been proposed in [13,14,15,16]. However, all these approaches consider a decentralised infrastructure involving multiple mutual authentications between the EV and various other entities of the DWPT system.…”
Section: Related Workmentioning
confidence: 99%
“…Firstly, some schemes do not provide satisfactory performance as they involve bilinear pairing operation. Therefore, high computation and communication costs are caused, such as in schemes [8], [9], [10], [11], and [12]. Moreover, according to dedicated short-range communications (DSRC) protocol, vehicles send a safety message every 100-300 milliseconds.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the scheme in [9] cannot provide unlinkability, and scheme in [15] is unable to resist replay attacks, and scheme in [11] cannot resist impersonation attacks. Thirdly, certificate-based authentication schemes imply that the public key has to be accompanied by the certificate generated by the certification authority (CA); consequently, vehicles are required to store the public key and certificate issued by the CA, which leads to high storage costs, such as in scheme [12]. More importantly, although the existing certificateless or identity-based authentication schemes can avoid this problem, some schemes require a remote authentication server (AS) to participate in the authentication process online.…”
Section: Introductionmentioning
confidence: 99%
“…Cui et al [29] proposed a privacy-preserving data downloading scheme by adopting the concept of edge computing for VANETs, and Zhang et al [30] proposed an authentication scheme by combining 5G technology and edge computing. As mentioned in [35], [36] similar to RSUaided schemes, [29] impose a high communicational cost to the system, and once the TRDs of the proposed scheme in [30] fall into the single point of failure, the entire network faces privacy disclosure.…”
Section: Introductionmentioning
confidence: 99%