2018 28th International Telecommunication Networks and Applications Conference (ITNAC) 2018
DOI: 10.1109/atnac.2018.8615224
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable and Efficient PKI Based Authentication Protocol for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…Their scheme utilizes the signer of verification based on the PKI to test the beacon validity. Asghar et al [12] conducted a feasible scheme based on PKI to address the process of authenticating requests, which means that the amount of the certificate revocation list (CRL) linear. Hence, their scheme offers vehicles to get services in improve scalability and valid time.…”
Section: Related Work a Public Key Infrastructure (Pki)mentioning
confidence: 99%
“…Their scheme utilizes the signer of verification based on the PKI to test the beacon validity. Asghar et al [12] conducted a feasible scheme based on PKI to address the process of authenticating requests, which means that the amount of the certificate revocation list (CRL) linear. Hence, their scheme offers vehicles to get services in improve scalability and valid time.…”
Section: Related Work a Public Key Infrastructure (Pki)mentioning
confidence: 99%
“…In the following, we briefly analyze current authentication protocols for WBANs and IoT. Some proposed authentication protocols are based on PKI, including [12], [13], [31]. PKI systems require a certificate authority (CA) to generate a certificate that binds the user's identity with his/her public key.…”
Section: Related Workmentioning
confidence: 99%
“…Many PKI-based [7], [8], [9], [10], [11], [12] schemes have been proposed. The major shortfall of these approaches is that a large number of anonymous certificates and their respective public-private keys are placed in the OBU of the vehicle, which causes a massive certificate management burden for the TA.…”
Section: A Pki-based Schemesmentioning
confidence: 99%