2023
DOI: 10.1109/tits.2022.3169182
|View full text |Cite
|
Sign up to set email alerts
|

Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication

Abstract: Vehicle authentication is an essential component validating the vehicle's identity and ensuring the integrity of transformed data for intelligent transport vehicles (ITS) in the vehicular ad hoc network (VANET). Easy to deploy and operate privacyenhancing vehicle authentication mechanisms are the mainstay for the widespread ITS in the VANET. Very recently, VANET security architectures are constituting by IEEE 1609.2 group, NoW project, the SeVeCom project. However, these approaches heavily depend on the consum… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…But these two protocols required the assistance of the network entities such as the trusted system authority, and cannot support secure vehicle-to-vehicle (V2V) communications. Li et al [24] designed a novel AGKA protocol for V2V communications based on the Cramer-Shoup encryption, smooth projective hash functions (SPHF), and oblivious pseudorandom functions (oblivious PRF). But asymmetric encryptions and signatures are employed, and the protocol is not efficient.…”
Section: A Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…But these two protocols required the assistance of the network entities such as the trusted system authority, and cannot support secure vehicle-to-vehicle (V2V) communications. Li et al [24] designed a novel AGKA protocol for V2V communications based on the Cramer-Shoup encryption, smooth projective hash functions (SPHF), and oblivious pseudorandom functions (oblivious PRF). But asymmetric encryptions and signatures are employed, and the protocol is not efficient.…”
Section: A Related Workmentioning
confidence: 99%
“…We also design the Join and Leave algorithms for our protocol. To satisfy the requirements of V2V communications, Li et al [24] presented an AGKA protocol and prove the protocol's security based on the decisional Diffie-Hellman problem. But the protocol cannot realize conditional privacy.…”
Section: B Our Motivationsmentioning
confidence: 99%
See 3 more Smart Citations