2018
DOI: 10.1109/tvt.2018.2822768
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
85
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(86 citation statements)
references
References 28 publications
0
85
0
1
Order By: Relevance
“…This ID-based signature scheme is further applied in order to develop a conditional privacy-preserving authentication scheme. In order to guarantee message authenticity sent between vehicles and roadside units, Asaar et al [29] proposes an identity-based message authentication scheme using proxy vehicles (ID-MAP), without bilinear pairings. The certificateless public key cryptography is used in the authentication scheme of [30].…”
Section: Related Workmentioning
confidence: 99%
“…This ID-based signature scheme is further applied in order to develop a conditional privacy-preserving authentication scheme. In order to guarantee message authenticity sent between vehicles and roadside units, Asaar et al [29] proposes an identity-based message authentication scheme using proxy vehicles (ID-MAP), without bilinear pairings. The certificateless public key cryptography is used in the authentication scheme of [30].…”
Section: Related Workmentioning
confidence: 99%
“…This scheme has greatly improved compared with the traditional authentication scheme. However, in 2018, Asaar et al pointed out that Liu's scheme could not guarantee the integrity of messages, it cannot resist the attack of simulation and modification by attackers, and incorrectly accept invalid signature messages in batches. They proposed a new authentication scheme (ID‐MAP) based on proxy vehicle; it can satisfy the message authentication requirement, and ID‐MAP is more efficient than PBAS.…”
Section: Related Workmentioning
confidence: 99%
“…Authentication based on the robust and efficient protocol by using biometrics and security key for E-Health services for the prevention of users identity and personal attacks. A scalable Video Coding (SVC) stream is used for secure and efficient authentication and also for a better quality of videos on decoding dependency graph for wireless multimedia systems [18] [19]. Mobile authentication based on touch screen devices using BEAT authentication scheme by signatures and gestures to improve the sensitive privacy information [20].…”
Section: Dna Computing Based Encryption Algorithm For Wireless Multimmentioning
confidence: 99%