2023
DOI: 10.1109/tdsc.2021.3135016
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs

Abstract: Recently, the fog computing concept has been introduced into vehicular ad-hoc networks (VANETs) to formulate fog-based VANETs. Since the communication channels between vehicles and fog nodes are open and insecure, it is necessary to construct an authenticated key agreement (AKA) scheme for securing the channels. The existing AKA schemes have two main deficiencies. One is that the computational and communication overhead are not low enough to satisfy the requirements of delay-sensitive applications. The other i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 38 publications
0
15
0
Order By: Relevance
“…They employ hash functions and ECC cryptography in their proposed scheme to reduce the communication and computational overheads brought by the AKE phase. Wei et al [16] devised a lightweight AKE scheme with multitrusted authority for fog-based VANET. Their scheme ensures security in the VANETs environment by utilizing Lagrange interpolation theorem and hash and pseudo-random functions.…”
Section: Related Workmentioning
confidence: 99%
“…They employ hash functions and ECC cryptography in their proposed scheme to reduce the communication and computational overheads brought by the AKE phase. Wei et al [16] devised a lightweight AKE scheme with multitrusted authority for fog-based VANET. Their scheme ensures security in the VANETs environment by utilizing Lagrange interpolation theorem and hash and pseudo-random functions.…”
Section: Related Workmentioning
confidence: 99%
“…Aiming to solve the communication security problem in MIoT, researchers have proposed many schemes [31–35]. In 2007, based on the public key, Raya et al.…”
Section: Related Workmentioning
confidence: 99%
“…Aiming to solve the communication security problem in MIoT, researchers have proposed many schemes [31][32][33][34][35]. In 2007, based on the public key, Raya et al [36] implemented vehicular network message authentication through public/private key pairs and protected the identity privacy of users by pre-storing sufficient key pairs and certificates.…”
Section: Authentication Scheme In Miotmentioning
confidence: 99%
“…Despite its merits, the conventional centralized authentication models in VANETs suffer from a glaring vulnerability of potential communication bottleneck at the CA. With a high density of vehicles, a centralized authentication model in VANET with a single CA can get overloaded with authentication requests, which might lead to a single point of failure [7,6]. In the event of a CA failure, the entire VANET communication ecosystem can collapse, with the CA struggling to manage an overwhelming workload and consequential response delays [8].…”
Section: Introductionmentioning
confidence: 99%