2018 27th International Conference on Computer Communication and Networks (ICCCN) 2018
DOI: 10.1109/icccn.2018.8487337
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…It can be seen from the discussion in related work and the comparative analysis of performance that our scheme is more efficient than [7], [10], [14], [36]- [38], [45]. Though [42], [44], [46] also show obvious advantages in efficiency, [42] has key escrow problem, and those three all have the threat of Sybil attack. It is worth mentioning that although [46] does not address cross-domain issues, its distributed framework can also be extended to adjust to this scenario.…”
Section: A Anonymous Identity Authentication Efficiencymentioning
confidence: 93%
See 2 more Smart Citations
“…It can be seen from the discussion in related work and the comparative analysis of performance that our scheme is more efficient than [7], [10], [14], [36]- [38], [45]. Though [42], [44], [46] also show obvious advantages in efficiency, [42] has key escrow problem, and those three all have the threat of Sybil attack. It is worth mentioning that although [46] does not address cross-domain issues, its distributed framework can also be extended to adjust to this scenario.…”
Section: A Anonymous Identity Authentication Efficiencymentioning
confidence: 93%
“…Though [42], [44], [46] also show obvious advantages in efficiency, [42] has key escrow problem, and those three all have the threat of Sybil attack. It is worth mentioning that although [46] does not address cross-domain issues, its distributed framework can also be extended to adjust to this scenario.…”
Section: A Anonymous Identity Authentication Efficiencymentioning
confidence: 99%
See 1 more Smart Citation
“…Conditional privacy of the vehicle: Privacy preserving is the main challenges in the VANETs. The conditional privacy preserving is the preservation of vehicle's identity and traceability 33,34 . In our proposed method, the vehicle is communicating with TA through RSU using an anonymous identity.…”
Section: Security Analysismentioning
confidence: 99%
“…The protocol proposed in the work of He et al 33 required three scale multiplication operation in a group based on ECC, two hash function operations, and two point addition operations based on ECC and totally required that the execution time of message verification is ≅ 2.0858. The protocol proposed in the work of Bayat et al 34 required one bilinear pairing operation, one map to point hash operation, one scale multiplication operation in a group based bilinear pairing, and one hash functioning operation and totally required that the execution time of message verification is ≅ 8.8943. Finally, our proposed method required only one a scale multiplication operation in a group based on ECC and four hash functioning operations and totally required the execution time of ≅ 06944. The execution time of the existing protocols needs more time to process the message verification, but our proposed method required execution time of ≅ 0.6944, which more less and most deployable in VANETs.…”
Section: Security Analysismentioning
confidence: 99%