2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) 2016
DOI: 10.1109/scopes.2016.7955730
|View full text |Cite
|
Sign up to set email alerts
|

Secure key management in vehicular ad-hoc network: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
1
0
Order By: Relevance
“…The major challenge that still needs to be resolved is related to the privacy and security of the data exchanged between two or more vehicles in the network, along with their surroundings, and keeping the identities of all the stakeholders of the network private. The current solutions for achieving a trusted message exchange mechanism are based on group key management techniques [ 7 , 8 ]. However, depending only on key management over a centralized network of autonomous vehicles is not effective in preserving the privacy of all the stakeholders of the vehicular network [ 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…The major challenge that still needs to be resolved is related to the privacy and security of the data exchanged between two or more vehicles in the network, along with their surroundings, and keeping the identities of all the stakeholders of the network private. The current solutions for achieving a trusted message exchange mechanism are based on group key management techniques [ 7 , 8 ]. However, depending only on key management over a centralized network of autonomous vehicles is not effective in preserving the privacy of all the stakeholders of the vehicular network [ 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…A Modular , Reconfigurable and Updateable Embedded Cyber Security Hardware Solution for Automotive [99] Secure vehicular data communication in named data networking [100] Evaluation of a zone encryption scheme for vehicular networks [101] A secure cooperative transmission model in VANET using attribute based encryption [102] Secure data encryption in vanet [103] Conventional and hybrid encryption schemes for security against attacks in vehicular adhoc network [104] Security architecture for automotive communication networks with CAN FD [105] Secure key management in vehicular ad-hoc network: A review [106] An efficient authentication scheme for secured service provisioning in edge-enabled vehicular cloud networks towards sustainable smart cities [107] Energy-efficient end-to-end security for software-defined vehic-ular networks [108] FPGA synthesis of an AES encoder circuit for vehicular communication networks [109]…”
Section: Data Encryptionmentioning
confidence: 99%