2018
DOI: 10.1016/j.future.2016.11.024
|View full text |Cite
|
Sign up to set email alerts
|

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
63
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 164 publications
(63 citation statements)
references
References 24 publications
0
63
0
Order By: Relevance
“…In recent years, few works have been proposed on the CRL distribution methods [101,102]; these methods cannot stop the revoked vehicle from continuous communication in VANETs until and unless all the pseudonyms become inactive. e drawbacks of checking CRL process make it not reliable to authenticate a large number of messages under the specific period in VANETs [103].…”
Section: Asymmetric Cryptographymentioning
confidence: 99%
“…In recent years, few works have been proposed on the CRL distribution methods [101,102]; these methods cannot stop the revoked vehicle from continuous communication in VANETs until and unless all the pseudonyms become inactive. e drawbacks of checking CRL process make it not reliable to authenticate a large number of messages under the specific period in VANETs [103].…”
Section: Asymmetric Cryptographymentioning
confidence: 99%
“…It also suffers from a high computational overhead as it depends on bilinear mapping and the Diffe‐Hellman hypothesis. The proposed privacy preservation and anonymous authentication scheme in Vijayakumar et al is based on bilinear pairing, but the overhead created from authentication process is distributed to vehicles. However, this scheme did not consider the communication overhead.…”
Section: Related Workmentioning
confidence: 99%
“…According to and , we plot P 2 t +1, c / tr simultaneously with P t +1, dis as a function of the number of shares t in Figure . In this figure, the effect of trust percentage ζ on both probabilities will be investigated.…”
Section: Analysis Of the Proposed Frameworkmentioning
confidence: 99%
“…In this context, there are several privacy requirements that should be considered when designing a privacy-preserving architecture for VANET [18], which are describedin this section as follows:…”
Section: Privacy Requirementsmentioning
confidence: 99%