The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.14429/dsj.71.15534
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Pseudonym Assignment and Encryption Scheme for Preserving the Privacy of Military Vehicles

Abstract: In this digital era, security has become one of the important topics of concern, and things become more critical for military vehicles where safety plays a vital role. In this paper, we have discussed a pseudonym-based approach that preserves the real identity of military vehicles. This paper also focuses on military vehicles’ location privacy by deploying a novel pseudonym assignment and encryption schemes. The proposed security scheme is based on a hybrid approach of matrix array symmetric key and the intell… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 8 publications
(3 reference statements)
0
2
0
Order By: Relevance
“…The authors (Farman et al , 2022) propose source location privacy preservation algorithm for VANET. The authors propose location privacy preservation scheme for military vehicles using pseudonym and encryption schemes (Tandon and Gupta, 2021). Arivarasi and Ramesh (2021) uses trust-based authentication and encryption algorithm to address source location privacy protection.…”
Section: Related Workmentioning
confidence: 99%
“…The authors (Farman et al , 2022) propose source location privacy preservation algorithm for VANET. The authors propose location privacy preservation scheme for military vehicles using pseudonym and encryption schemes (Tandon and Gupta, 2021). Arivarasi and Ramesh (2021) uses trust-based authentication and encryption algorithm to address source location privacy protection.…”
Section: Related Workmentioning
confidence: 99%
“…The inspiration for the attacker may rise from different intentions. The most attractive ones would be system vulnerabilities and valuable information [9,25,29]. The number of attacks over a network and other mediums has enlarged radically in recent years.…”
Section: Introductionmentioning
confidence: 99%