2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726769
|View full text |Cite
|
Sign up to set email alerts
|

A secure message authentication scheme for VANET using ECDSA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 8 publications
0
8
0
1
Order By: Relevance
“…The two upcoming and interesting research area in distributed computing and mobile communication domain are integrating peer-to-peer network and vehicle ad hoc network (VANET). Integrating P2P on top of VANET'sphysical infrastructure works effectively as the advantage of P2P network adds better connectivity which is very suitable for dynamic network likeVANET [8]. Large scale files like a multimedia file, or a huge text file in VANET is a challinging task.…”
Section: Combining P2p and Vanetmentioning
confidence: 99%
See 1 more Smart Citation
“…The two upcoming and interesting research area in distributed computing and mobile communication domain are integrating peer-to-peer network and vehicle ad hoc network (VANET). Integrating P2P on top of VANET'sphysical infrastructure works effectively as the advantage of P2P network adds better connectivity which is very suitable for dynamic network likeVANET [8]. Large scale files like a multimedia file, or a huge text file in VANET is a challinging task.…”
Section: Combining P2p and Vanetmentioning
confidence: 99%
“…Hence implementing P2P network for file sharing shheme, as P2P nd VANET work similarly in file sharing, self oaragiseing, self sustainable to failures and distributed network. In addition, like P2P, VANET nodes are decentralized, very high mobile in nature and independent, as shown in Figure 5 below [8].…”
Section: Combining P2p and Vanetmentioning
confidence: 99%
“…Because this work does not cover message authentication, we have the following assumptions. Based on key management and authentication mechanism for VANET , we assume that mobile nodes are authenticated by a central authority, located at EOC, before they participate in the rescue mission and join a vehicular network. A key management sub‐system, located on MEOC, allows nodes to verify public keys and corresponding IP addresses.…”
Section: Emergency Scenario and Adversary Modelmentioning
confidence: 99%
“…Therefore, MoTIVE is scalable and low‐overhead. Besides, MoTIVE combines digital signature and specification‐based detection , which can detect unknown attacks. In terms of AODV specification analysis, MoTIVE concludes an adversary model to illustrate a set of routing attack methods exploiting AODV vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Para a assinatura digital de mensagens, algoritmos como RSA (Rivest-Shamir-Adleman), ECDSA (Elliptic Curve Digital Signature Algorithm) e Ed25519 vêm sendo empregados nosúltimos anos. Em redes veiculares, o algoritmo ECDSA tem sido usado a bastante tempo devido ao seu baixo custo computacional em relação ao RSA, pois utiliza chaves menores com o mesmo nível de segurança [Johnson et al 2001, Manvi et al 2009, Ravi and Kulkarni 2013. O Ed25519é um algoritmo relativamente novo, de padrão totalmente aberto e leve que tem ganhado espaço para a assinatura digital.…”
Section: Introductionunclassified