2019
DOI: 10.1371/journal.pone.0221213
|View full text |Cite
|
Sign up to set email alerts
|

ASPA: Advanced Strong Pseudonym based Authentication in Intelligent Transport System

Abstract: Intelligent Transport System (ITS) uses the IEEE 802.11P standard for the wireless communication among vehicles. A wireless ad hoc network of vehicles is established to improve road safety, comfort, security, and traffic efficiency. Wireless communication in ITS leads to many security and privacy challenges. Security and privacy of ITS are important issues that demand incorporation of confidentiality, privacy, authentication, integrity, non-repudiation, and restrictive obscurity. In order to ensure the privacy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 49 publications
0
13
0
Order By: Relevance
“…It can be seen from the discussion in related work and the comparative analysis of performance that our scheme is more efficient than [7], [10], [14], [36]- [38], [45]. Though [42], [44], [46] also show obvious advantages in efficiency, [42] has key escrow problem, and those three all have the threat of Sybil attack. It is worth mentioning that although [46] does not address cross-domain issues, its distributed framework can also be extended to adjust to this scenario.…”
Section: A Anonymous Identity Authentication Efficiencymentioning
confidence: 93%
See 1 more Smart Citation
“…It can be seen from the discussion in related work and the comparative analysis of performance that our scheme is more efficient than [7], [10], [14], [36]- [38], [45]. Though [42], [44], [46] also show obvious advantages in efficiency, [42] has key escrow problem, and those three all have the threat of Sybil attack. It is worth mentioning that although [46] does not address cross-domain issues, its distributed framework can also be extended to adjust to this scenario.…”
Section: A Anonymous Identity Authentication Efficiencymentioning
confidence: 93%
“…KMC is a single threat model so the system is obviously not secure. To distribute the capability of identity resolution between authorities, Ali et al [43], [44] presented an authentication framework, which can avoid pseudonyms being linked. The pseudonyms validity is set as between 10 to 50 milliseconds [44] and the vehicle interacts with Pseudonym Provider (PP) frequently.…”
Section: Introductionmentioning
confidence: 99%
“…We can notice in Figure . 13 that the average number of key establishments in ASPA (Advanced Strong Pseudonym-based Authentication) [82] and in PACP (Pseudonym Authentication Based Conditional Confidentiality Protocol) [83] becomes more important when the groups are not used. Note that when the beams are not brought into play within the 180 s time interval, 13 independent keys have been transmitted.…”
Section: Figure 10 Packet Delivery Ratio (Pdr)mentioning
confidence: 99%
“…Traditional blockchain cannot be enough in the case of large amount of patient's storage and sharing data so a double blockchain solution is presented by Lejun Zhang [148]. An ITS aims to improve road safety and traffic management [149,150]. Vehicles share the information regarding their position, speed and direction etc.…”
Section: Blockchain-based Research Issues In Healthcarementioning
confidence: 99%