2019
DOI: 10.1109/access.2019.2915794
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing

Abstract: In the VANET systems, the leakage of some sensitive data or communication information will cause heavy losses for life and property. Then, a higher security level is required in the VANET systems. Meanwhile, fast computation powers are needed by devices with limited computing resources. Thus, a secure and lightweight privacy-preserving protocol for VANETs is urgent. In this paper, we first propose an identity-based signature that achieves unforgeability against chosen-message attack without random oracle. In o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
46
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(46 citation statements)
references
References 36 publications
0
46
0
Order By: Relevance
“…We analyze the security of Wei et al's protocol and find a security defect in the IBS scheme [1] on which the protocol depends. Then, we analyze the impact of the security defect in the IBS on the protocol [1] and find that an RSU node can get the private keys of the OBU nodes with which it communicates through the common modulus attack. Moreover, we prove that the common modulus attack is feasible and effective in practice from the theory and experiments.…”
Section: A Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…We analyze the security of Wei et al's protocol and find a security defect in the IBS scheme [1] on which the protocol depends. Then, we analyze the impact of the security defect in the IBS on the protocol [1] and find that an RSU node can get the private keys of the OBU nodes with which it communicates through the common modulus attack. Moreover, we prove that the common modulus attack is feasible and effective in practice from the theory and experiments.…”
Section: A Contributionmentioning
confidence: 99%
“…Moreover, we prove that the common modulus attack is feasible and effective in practice from the theory and experiments. Next, we propose an improved IBS scheme to replace Wei et al's [1] to resolve the security defect. We give the updated details of the protocol after applying the improved scheme and prove our improved IBS scheme is secure against chosen-message attack without random oracle.…”
Section: A Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…V EHICULAR Ad Hoc Network (VANET), as a prominent form of Mobile Ad Hoc Network (MANET), plays an essential role in the future Intelligent Traffic System (ITS) by providing a wide range of applications to improve road safety and driving comfort. It is a distributed self-organizing network built up by high-speed vehicles [1], and is consisted of three parts: Trusted authorities (TA), Road Side Unit (RSU), and On Board Unit (OBU) [2]. TA can be regarded as an authority center that provides RSUs and OBUs with a variety of security services such as registration, identity authentication, and certificate management.…”
Section: Introductionmentioning
confidence: 99%
“…Video summarization techniques pick out image-based branches in order to identify abbreviated keyframes [13,14]. e fast growth of cloud computing boosts a broad deployment of data and computation outsourcing to cloud providers by resource-limited devices [15][16][17]. us, an efficient cryptosystem scheme is highly recommended to encrypt the sensitive data before outsourcing [18].…”
Section: Introductionmentioning
confidence: 99%