2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) 2019
DOI: 10.1109/iotsms48152.2019.8939216
|View full text |Cite
|
Sign up to set email alerts
|

Secure V2V Communication with Identity-based Cryptography from License Plate Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 24 publications
0
5
0
2
Order By: Relevance
“…On the other hand, it is important to notice that there are works on the literature dealing with vehicle plate identification using technologies not listed above. For instance, Andreica and Groza [42] experiment the use of the license to identify vehicles and use this identification number to bootstrap security based on identity-based cryptography schemes. In this sense, their performed experiments with Android smartphones in order to determine the feasibility of the solution.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, it is important to notice that there are works on the literature dealing with vehicle plate identification using technologies not listed above. For instance, Andreica and Groza [42] experiment the use of the license to identify vehicles and use this identification number to bootstrap security based on identity-based cryptography schemes. In this sense, their performed experiments with Android smartphones in order to determine the feasibility of the solution.…”
Section: Related Workmentioning
confidence: 99%
“…El uso de criptografía basada en identidades para la comunicación intervehicular ha sido considerado previamente [19], [20], así como en el contexto de las VANETS (Vehicle Adhoc Networks) [19] se han propuesto esquemas donde la autenticación se basa en pseudónimos (identificadores aleatorios) [21] o se utilizan esquemas de firma de grupo [22].…”
Section: Ii-b Comunicaciones V2v Seguras Usando Criptografía Basada E...unclassified
“…La mayoría de estas propuestas no especifican qué información usar como identidad. En [20] se propone utilizar como identidades las matrículas de los coches, previamente reconocidas a través de cámaras de teléfonos inteligentes disponibles en los vehículos. Sin embargo, la cadena de caracteres que suele usarse en la identificación de vehículos es el número de bastidor dado que es único, a diferencia de la matricula, que puede variar por cambio de país o por propia re-matriculación del vehículo.…”
Section: Ii-b Comunicaciones V2v Seguras Usando Criptografía Basada E...unclassified
“…However, public groups and average citizens have questioned whether they maintain private information tied to recognized license plates. Due to the numerous time entries in the ALPR database and its restricted access, which poses a serious privacy risk, law enforcement agencies have dramatically boosted their use of ALPR devices [13,14]. Additionally, the ALPR approach may mistakenly identify similar objects like billboards and traffic signs as license plates [15].…”
Section: Introductionmentioning
confidence: 99%