2014 International Conference on Electronics and Communication Systems (ICECS) 2014
DOI: 10.1109/ecs.2014.6892619
|View full text |Cite
|
Sign up to set email alerts
|

An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Their solution is only applicable in urban environment (max speed around 54 km/h). Another study on the behavior of vehicles was presented in a single case in the work of Mathews and Jinila . The strategy is called “Pseudonym Changing at Proper Location (PCP) for pseudonym changing.” Social spots precise the number of nodes grouped temporarily.…”
Section: State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…Their solution is only applicable in urban environment (max speed around 54 km/h). Another study on the behavior of vehicles was presented in a single case in the work of Mathews and Jinila . The strategy is called “Pseudonym Changing at Proper Location (PCP) for pseudonym changing.” Social spots precise the number of nodes grouped temporarily.…”
Section: State Of the Artmentioning
confidence: 99%
“…Authors in other works [6][7][8][9][10][13][14][15][16]19 propose no-complete solution of pseudonyms change. In the work of Calandriello et al, 6 the change of pseudonym periodically causes a low security.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…The NS-2 simulator is used with MOVE tool to setup and to stimulate the realistic vehicular ad hoc network [15]. The vehicular nodes are placed randomly and the RST with client storage option is used as a fixed node in the network.…”
Section: Performance Analysismentioning
confidence: 99%
“…In [11], Beresford has experimental proved that a single pseudonym cannot meet privacy-preserving because attackers are able to trace the public information of users. Therefore, pseudonym should be updated at regular intervals [12]- [14]. However, with the increase of vehicles, the management and maintenance of pseudonym would be a bottleneck of anonymous authentication in VANETs, and regular replacement of pseudonym would effect on routing efficiency and increase packet loss.…”
Section: Introductionmentioning
confidence: 99%