Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks 2007
DOI: 10.1145/1287748.1287752
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and robust pseudonymous authentication in VANET

Abstract: Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the VANET technology. In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
334
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 442 publications
(335 citation statements)
references
References 25 publications
0
334
0
Order By: Relevance
“…The proposed scheme suggests the usage of PASS [8] as the mechanism for authentication of videos uploaded to the Cloud Platform, not only because it has one of the lowest overheads in terms of time for signing, certificate validation, and signature verification (see Table 2), but also because it solves the limitation of BP [16]. However, other algorithms such as BP [16], ECPP [17], DCS [18], and hybrid one [19] can be considered. Table 2 shows the time required for generation and verification of signatures and certificate verification using different algorithms [8] (same for both Eiza-Ni-Shi Scheme and proposed scheme).…”
Section: Overhead Generated In Video Transmission Protocolmentioning
confidence: 99%
“…The proposed scheme suggests the usage of PASS [8] as the mechanism for authentication of videos uploaded to the Cloud Platform, not only because it has one of the lowest overheads in terms of time for signing, certificate validation, and signature verification (see Table 2), but also because it solves the limitation of BP [16]. However, other algorithms such as BP [16], ECPP [17], DCS [18], and hybrid one [19] can be considered. Table 2 shows the time required for generation and verification of signatures and certificate verification using different algorithms [8] (same for both Eiza-Ni-Shi Scheme and proposed scheme).…”
Section: Overhead Generated In Video Transmission Protocolmentioning
confidence: 99%
“…By incorporating HAB and GSB approaches, Calandriello [5] proposed a hybrid scheme. In this scheme, each vehicle is equipped with a group signing key and a group public key.…”
Section: Identity-based Anonymitymentioning
confidence: 99%
“…To solve the problem mentioned above, the authors in [2][3][4][5] proposed schemes to remove the correlation between locations and identifiers by periodically or randomly updating vehicles' pseudo identifiers. Although these methods could make vehicles unidentifiable within an anonymity set in motionless states, it can still be traced by movement tracking [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Systems based on symmetric key cryptosystems were developed in [6]- [8] to provide security to VANETs while minimizing the overhead and increasing the encryption/decryption speeds compared with those of the PKI. In [9]- [13], the group signature technique was used to provide security and privacy to VANETs. All of the foregoing systems rely on the CRL as a revocation method without considering the special characteristics of VANETs.…”
Section: Related Workmentioning
confidence: 99%