2017 12th International Conference on Computer Engineering and Systems (ICCES) 2017
DOI: 10.1109/icces.2017.8275303
|View full text |Cite
|
Sign up to set email alerts
|

A low computation message delivery and authentication VANET protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Furthermore, an ECC-based three-factor authentication for a multi-server environment is proposed by [31] and cannot resist impersonation attacks and is unable to provide perfect forward secrecy. Finally, authentication schemes [39][40][41] are proposed for VANETs. However, these schemes have security vulnerabilities.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, an ECC-based three-factor authentication for a multi-server environment is proposed by [31] and cannot resist impersonation attacks and is unable to provide perfect forward secrecy. Finally, authentication schemes [39][40][41] are proposed for VANETs. However, these schemes have security vulnerabilities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, these schemes have security vulnerabilities. For example, the scheme [39] is vulnerable to replay attacks, while the schemes [40,41] have traceability issues. Finally, the author [42] proposed an anonymous authentication scheme for mobile devices in a public cloud server.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Inside the vehicle itself: The vehicle randomly generates its private key a, then computes its own public key A by (8). Additionally, the vehicle calls the TA public key C from its memory.…”
Section: ) Generation Of Keys At Vehiclementioning
confidence: 99%
“…This scheme achieves non-repudiation feature, however, it is mainly focused on the certificate revocation list (CRL) that hinders the communication process. In [8], an efficient authentication protocol which transmits a symmetric key in the public channel depending on Chinese remainder theorem (CRT) is proposed. The protocol uses low-level computing operations such as XOR operator and hash functions, but the certificate management is its main demerit.…”
Section: Introductionmentioning
confidence: 99%
“…[ 50 ] A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs 2022 Conference PS04 Ahmed et al. [ 51 ] A low computation message delivery and authentication VANET protocol 2017 Conference PS05 Alharthi et al. [ 52 ] A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET 2021 Journal PS06 Lai et al.…”
Section: Table A1mentioning
confidence: 99%