2015
DOI: 10.1016/j.comcom.2015.08.005
|View full text |Cite
|
Sign up to set email alerts
|

Practical secure and privacy-preserving scheme for value-added applications in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 53 publications
(29 citation statements)
references
References 30 publications
0
29
0
Order By: Relevance
“…In order to overcome the limitations of the traditional certificate based management methods, the second category used the group signatures technology [18], [23], [29], [30]. However, the member revocation problem of this method incurs a verification and storage/transmission cost higher than most traditional schemes.…”
Section: A Related Workmentioning
confidence: 99%
“…In order to overcome the limitations of the traditional certificate based management methods, the second category used the group signatures technology [18], [23], [29], [30]. However, the member revocation problem of this method incurs a verification and storage/transmission cost higher than most traditional schemes.…”
Section: A Related Workmentioning
confidence: 99%
“…Verifying the sending messages using the location-based authentication method in VC is very difficult task because of high mobility nodes, in which the location of vehicles is always changing [129]. Secure privacy-preserving location-based services (LBSs) are introduced which provides the authentication, integrity, and nonrepudiation for the vehicle and service provider in each LBS event, which subsequently leads to secure the privacy of the vehicle during LBS event [130]. Zhang et al [131] introduced a secure and privacy-preserving communication scheme for establishing vehicle cloud (VC) and broadcasting data in VC.…”
Section: Node Authenticationmentioning
confidence: 99%
“…Malina et al [129] introduced a group signature with short-term linkability and categorized the batch verification, and this method produces efficient signing and verification as compared to other competent methods. In [130], Zhang et al introduced a location-based service (LBS) protocol, which is used to address the inherent challenges in terms of authentication and conditional privacy to offer LBSs in VANETs. In this scheme, the providers of RSUs and LBS are identity based, and a vehicle only requires a member key.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%