38th Annual IEEE Conference on Local Computer Networks - Workshops 2013
DOI: 10.1109/lcnw.2013.6758514
|View full text |Cite
|
Sign up to set email alerts
|

Protocol of change pseudonyms for VANETs

Abstract: We propose in this paper a security protocol based on periodic change of pseudonyms. The idea is to avoid illegal traceability of vehicles during their communications and preserve their privacy and confidential information. Two different approaches are proposed. In the first approach, each vehicle asks the central authority a new communication pseudonym after a time t. While in the second approach, each vehicle generates itself after a time t, a new communication pseudonym. Our objective is to permit at least … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
9
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 17 publications
1
9
0
Order By: Relevance
“…The results obtained by our simulation show the efficiency of our solution. Comparing them to the works of Adigun et al and Aoudjit and Bensaber, our results are better. In the aforementioned works, authors used 100 and 200 vehicles.…”
Section: Performance and Analysissupporting
confidence: 51%
See 4 more Smart Citations
“…The results obtained by our simulation show the efficiency of our solution. Comparing them to the works of Adigun et al and Aoudjit and Bensaber, our results are better. In the aforementioned works, authors used 100 and 200 vehicles.…”
Section: Performance and Analysissupporting
confidence: 51%
“…Adigun et al proposed a model of pseudonyms that change periodically, using two approaches. In the first approach, each time the vehicle requests new pseudonym from a trusted authority.…”
Section: State Of the Artmentioning
confidence: 99%
See 3 more Smart Citations