2015
DOI: 10.3390/app5040973
|View full text |Cite
|
Sign up to set email alerts
|

Using a Random Secret Pre-Distribution Scheme to Implement Message Authentication in VANETs

Abstract: Abstract:In recent years, the development of the Intelligent Transportation System (ITS) has increased the popularity of vehicular ad hoc networks (VANET). A VANET is designed to enable vehicles to exchange information about traffic or vehicle conditions to help other vehicles avoid traffic accidents or traffic jams. To resist malicious attacks, all vehicles must be anonymous and their routings must be untraceable, but still verifiable. The vehicles must trust each other and communicate confidentially. In a VA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Tedious authentication operation and delay can easily cause the vehicle to be more vulnerable to malicious attacks. For the lack of security of the above proposal, the RSP-based message authentication proposed by Yein et al [8] can solve these problems through the use of public key identification and thus achieve privacy preservation, which is compatible with the scheme proposed by Li et al [9]. Oulhaci et al [10] and Kumar and Arora [11] have different solutions to enhance the privacy of the vehicle by the unicast communication in V2V (Vehicle to Vehicle) mode.…”
Section: Literature Reviewmentioning
confidence: 95%
“…Tedious authentication operation and delay can easily cause the vehicle to be more vulnerable to malicious attacks. For the lack of security of the above proposal, the RSP-based message authentication proposed by Yein et al [8] can solve these problems through the use of public key identification and thus achieve privacy preservation, which is compatible with the scheme proposed by Li et al [9]. Oulhaci et al [10] and Kumar and Arora [11] have different solutions to enhance the privacy of the vehicle by the unicast communication in V2V (Vehicle to Vehicle) mode.…”
Section: Literature Reviewmentioning
confidence: 95%
“…Schemes based on the random key distribution can be applied both to mobile and to static networks. This kind of approach has been extended even to vehicular ad hoc networks [21].…”
Section: Random Key Distributionmentioning
confidence: 99%