2019
DOI: 10.1109/access.2019.2911924
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network

Abstract: Recent years have witnessed that the new mobility Intelligent Transportation System is booming, especially the development of Vehicular Ad Hoc Networks (VANETs). It brings convenience and a good experience for drivers. Unfortunately, VANETs are suffering from potential security and privacy issues due to the inherent openness of VANETs. In the past few years, to address security and privacy-preserving problems, many identity-based privacy-preserving authentication schemes have been proposed by researchers. Howe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(51 citation statements)
references
References 31 publications
0
44
0
Order By: Relevance
“…They use an ECC to protect entities' real identities and protect against internal attacks. In 2019, Wu et al [19] pointed out that Zhou et al's proposed protocol cannot prevent identity guessing and impersonation attacks and also cannot guarantee user's anonymity. In 2017, Zhang et al [1] proposed a personal information protection system based on distributed aggregation to conditionally block user's anonymity.…”
Section: Authentication Protocol For Vehicle Communicationmentioning
confidence: 99%
“…They use an ECC to protect entities' real identities and protect against internal attacks. In 2019, Wu et al [19] pointed out that Zhou et al's proposed protocol cannot prevent identity guessing and impersonation attacks and also cannot guarantee user's anonymity. In 2017, Zhang et al [1] proposed a personal information protection system based on distributed aggregation to conditionally block user's anonymity.…”
Section: Authentication Protocol For Vehicle Communicationmentioning
confidence: 99%
“…This ranges from the level of network aspects such as vehicular ad hoc network VANET routing [1], clustering [2], reliability analysis [3], congestion solutions [4], internet of vehicles [5], etc., to the level of the road protocols for both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications [4]. Also, with the assistance of technology of long term evolution LTE [6] and handover [7], it became important to develop mature VANET models to solve various issues of networks performance in terms of quality of service QoS [8], throughput, stability [2] [9], scalability [10], security [11] [12], robustness,
.etc. Clustering in VANETs is essential in various applications.…”
Section: Introductionmentioning
confidence: 99%
“…In the past decades, the numerous authentication and key agreement schemes for vehicular systems in IoT have been studied to achieve essential security requirements [2,3,4,5,6,7,8,9,10]. Although these schemes try to ensure privacy and enhance efficiency, their scheme is vulnerable to various potential attacks such as distributed denial of service and privileged insider attacks because it is based on trusted third party to provide high security level.…”
Section: Introductionmentioning
confidence: 99%
“…Numerous privacy protection schemes for a vehicular system in IoT ensure security and improve efficiency [2,3,4,5,6,7,8,9,10]. In 2016, Lo and Tasi [2] proposed an efficient authentication scheme for vehicular sensor networks to improve performance.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation