2020
DOI: 10.1109/access.2020.3027718
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs

Abstract: With the development of Intelligent Transportation Systems (ITS), Vehicular Ad hoc Networks (VANETs) have become a research hotspot in recent years. However, the vehicle communication system is vulnerable, resulting in threats to the privacy of users. This paper proposes a secure and efficient identity-based anonymous authentication scheme and uses pseudonyms to enhance the privacy protection of vehicle users. By improving the existing vehicle public key infrastructure and introducing Bloom filter to compress … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 44 publications
0
20
0
Order By: Relevance
“…e execution step up is carried out using CYGWIN software [25] installed in 4 GHz PC having 8 GB memory. e execution time for scalar multiplication (Ex m ), one-point modular multiplication (Ex pm ), hashing operation (Ex h ), pairing function (Ex p ), and one-point addition (Ex a ) are calculated as 0.0212 ms, 2.226 ms, 0.0023 ms, 2.91 ms, and 0.011 ms. e proposed protocol is compared with the relevant similar schemes such as Zhou et al [26], Kumar et al [27], Wu et al [28], and Qi et al [29].…”
Section: Computational Costmentioning
confidence: 99%
See 1 more Smart Citation
“…e execution step up is carried out using CYGWIN software [25] installed in 4 GHz PC having 8 GB memory. e execution time for scalar multiplication (Ex m ), one-point modular multiplication (Ex pm ), hashing operation (Ex h ), pairing function (Ex p ), and one-point addition (Ex a ) are calculated as 0.0212 ms, 2.226 ms, 0.0023 ms, 2.91 ms, and 0.011 ms. e proposed protocol is compared with the relevant similar schemes such as Zhou et al [26], Kumar et al [27], Wu et al [28], and Qi et al [29].…”
Section: Computational Costmentioning
confidence: 99%
“…e overall communication cost for the proposed work is 1120 bits. As indicated in Table 3, the proposed scheme communication analysis is compared to current relevant schemes such as Zhou et al [26], Kumar et al [27], Wu et al [28], and Qi et al [29]. A schematic diagram of communication analysis for so many schemes is shown in Figure 3.…”
Section: Communication Costmentioning
confidence: 99%
“…According to Table 2, the security analysis is evaluated to gain a full understanding of the security properties that are negligible in each scheme. It is found that the schemes [6], [7] achieve non-repudiation based on exchanging certificates between the entities within the network. As a result of this, a high communication burden is introduced, leading to a waste in the network bandwidth.…”
Section: ) Comparison Based On Security Featuresmentioning
confidence: 99%
“…Although the scheme does not require a fully trusted TA to generate the vehicle secrets, exchanging certificates is still a communication drawback in this scheme. Additionally, an identity-based authentication scheme that utilizes pseudonyms to ensure the privacy of the vehicle's driver is presented in [7]. This scheme achieves non-repudiation feature, however, it is mainly focused on the certificate revocation list (CRL) that hinders the communication process.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, several features, like the proximity of emergency centers, hospitals, police stations, driving weather conditions, and so on, are to be shared with the nearby vehicles for efficient communication. With the introduction of the VANET system, the sharing of critical information has been made possible [1]. VANETs are distributed, self-organizing communication networks comprised of moving vehicles.…”
Section: Introductionmentioning
confidence: 99%