2010
DOI: 10.1109/tvt.2009.2038222
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable Robust Authentication Protocol for Secure Vehicular Communications

Abstract: Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of computation and communication bottlenecks, and reduction of the strong reliance on tamper-proof devices. This paper efficiently copes with these challenges with a decentralized group-authentication protocol in the sense that the group is maintained by each roadside unit (RSU) rather than by a centralized authority, as in most existing protocols that are e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
166
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 278 publications
(166 citation statements)
references
References 25 publications
0
166
0
Order By: Relevance
“…Recent research in vehicular networks has included topics such as routing algorithms (Li and Wang, 2007), applications (Khaled et al, 2009), security (Zhang et al, 2009), and medium access control performance (Mittag et al, 2008). For example, studies have illustrated the suitability of IEEE 802.11p for highway applications (Bychkovsky et al, 2006;Ott and Kutscher, 2004).…”
Section: Related Workmentioning
confidence: 99%
“…Recent research in vehicular networks has included topics such as routing algorithms (Li and Wang, 2007), applications (Khaled et al, 2009), security (Zhang et al, 2009), and medium access control performance (Mittag et al, 2008). For example, studies have illustrated the suitability of IEEE 802.11p for highway applications (Bychkovsky et al, 2006;Ott and Kutscher, 2004).…”
Section: Related Workmentioning
confidence: 99%
“…Fortunately, many message authentication schemes have been proposed to address security, efficiency, and conditional privacypreserving for VANETs during the recent 10 years. [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] Related work…”
Section: Introductionmentioning
confidence: 99%
“…In the recent years, various authors have proposed privacy preserving authentication schemes for secure message communication. The two most common privacy preserving authentication schemes are the pseudonyms based privacy preserving scheme [4][5][6][7][8][9][10][11][12]22, 24], the group signature based privacy preserving scheme [13][14][15][16][17]. Each scheme provides solution to the secure privacy preserving message communication problems in VANET but all of them have some drawbacks.…”
Section: Introductionmentioning
confidence: 99%