2013
DOI: 10.1002/dac.2566
|View full text |Cite
|
Sign up to set email alerts
|

Privacy‐preserving authentication protocols with efficient verification in VANETs

Abstract: SUMMARYAs an important component of intelligent transportation systems, vehicular ad hoc networks can provide safer and more comfortable driving circumstance for the drivers. However, communication security and privacy issues present practical concerns to the deployment of vehicular ad hoc networks. Although recent related studies have already addressed most of these issues, most of them have only considered a posteriori countermeasures or a priori countermeasures to prevent the attacks of an adversary. To the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(22 citation statements)
references
References 33 publications
0
22
0
Order By: Relevance
“…However, the efficiency of this solutions is low. Zhang et al [10] presented two additional authentication schemes with privacy preservation; however, the computational costs of their methods are somewhat high because of the utilization of bilinear pairing. Similarly, Zheng et al [11] introduced an authenticated key agreement scheme based on bilinear pairing.…”
Section: Related Workmentioning
confidence: 99%
“…However, the efficiency of this solutions is low. Zhang et al [10] presented two additional authentication schemes with privacy preservation; however, the computational costs of their methods are somewhat high because of the utilization of bilinear pairing. Similarly, Zheng et al [11] introduced an authenticated key agreement scheme based on bilinear pairing.…”
Section: Related Workmentioning
confidence: 99%
“…Apart from the earlier discussed proposals, there are many other proposals that exist in the literature, which address the issues of routing and clustering in VANETs. Some of the most prominent protocols in this category are described in details in [23][24][25][26][27][28][29][30]. Rodrigues et al [31][32][33][34][35] explored the VANETs from different aspects such as network management, and delay tolerant.…”
Section: Related Workmentioning
confidence: 99%
“…Mausaji [24] dwelt on the integrated auditing of ERP systems. Privacy and security have been analyzed and modeled in different systems (e.g., [27][28][29][30][31]61]). She and Thruanisingham [26] presented security solution in ERP and directions for secure systems.…”
Section: Background and Motivationmentioning
confidence: 99%
“…She and Thruanisingham [26] presented security solution in ERP and directions for secure systems. Privacy and security have been analyzed and modeled in different systems (e.g., [27][28][29][30][31]61]).…”
Section: Background and Motivationmentioning
confidence: 99%