The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1109/access.2021.3053043
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography

Abstract: Vehicle in vehicular ad hoc networks (VANETs) broadcasts beacons about their traffic status wirelessly for improving traffic safety and efficiency. Before deployment of the VANET system, problems related to security and privacy should be carefully addressed. In this paper, we propose a lightweight authentication with conditional privacy-preserving scheme for guaranteeing secure communication in VANET. The proposed scheme is suitable for addressing issues related to security and privacy because it combines the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(44 citation statements)
references
References 31 publications
0
31
0
Order By: Relevance
“…To overcome the time-consuming operations of ID-based BP approaches, He et al [32] proposed an ID-based elliptic curve (EC) Cryptography to provide a signature verification process for vehicular communication. Recently, some authentication schemes based on EC have been proposed by [32][33][34][35][36][37][38][39] to tackle privacy and security proprieties for vehicular communication. Nevertheless, the operations of EC are time-consuming with an increase in the number of participating nodes.…”
Section: Related Workmentioning
confidence: 99%
“…To overcome the time-consuming operations of ID-based BP approaches, He et al [32] proposed an ID-based elliptic curve (EC) Cryptography to provide a signature verification process for vehicular communication. Recently, some authentication schemes based on EC have been proposed by [32][33][34][35][36][37][38][39] to tackle privacy and security proprieties for vehicular communication. Nevertheless, the operations of EC are time-consuming with an increase in the number of participating nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Pseudonym-based schemes were proposed [35]- [41] by using cryptographic operations associated with elliptic curve cryptography to sign and verify the traffic-related messages. He et al [35] were the first to propose the use of the elliptic curve cryptography rather than bilinear pair cryptography to achieve security and privacy requirements in 2015.…”
Section: ) Elliptic Curve Cryptographymentioning
confidence: 99%
“…In this section, we analysis a performance evaluation in terms of computation and communication overheads and give a comparison with most recent existing schemes [41]- [43] for 5G-enabled vehicular networks. The scheme in this paper uses the experiment in [50] to run on a macOS High Sierra operation system consists of an Intel Core i5 processor with, 4 GB RAM and 1.6 GHz clock frequency.…”
Section: Performance Analysis and Comparisonmentioning
confidence: 99%
“…The Chebyshev Polynomial T ω (ϕ) of degree ω is defined as indicated in (1). Its recurrence formula can be specified according to (2).…”
Section: A Cryptographic Toolsmentioning
confidence: 99%
“…Due to the massive deployment of intelligent transportation system (ITS) in smart cities, the vehicular adhoc network (VANET) has attracted a deliberate attention in the research domain; the major goals of VANET are to support numerous applications in terms of infotainment, emergency, and traffic safety services [1], [2]. In general, VANET structure has three main components as follows: Firstly, onboard units (OBUs) mounted on vehicles to allow them connect…”
Section: Introductionmentioning
confidence: 99%