2017
DOI: 10.1109/tits.2017.2657649
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
155
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 207 publications
(189 citation statements)
references
References 23 publications
0
155
0
Order By: Relevance
“…First, we prove the goals G1 and G2. 30 According to (13) and (14), we can getRSU ⊲ R 1 andOBU⊲ R 1 f g sk i . We can see that OBU and RSU negotiate the shorttime key through the communication of message, according to the properties of bilinear mapping and the following equation: R 2 = e R 1 , R j À Á = e B r i L j 1 , g 1=bL j 2 = e g 1 br i L j ,g 1=bL j 2 = e g 1 , g 2 ð Þ br i L j =bL j = e g 1 , g 2 ð Þ r i = R 0 2 = sk i , the proof is given.…”
Section: Prove the Proposed Security Goalsmentioning
confidence: 99%
“…First, we prove the goals G1 and G2. 30 According to (13) and (14), we can getRSU ⊲ R 1 andOBU⊲ R 1 f g sk i . We can see that OBU and RSU negotiate the shorttime key through the communication of message, according to the properties of bilinear mapping and the following equation: R 2 = e R 1 , R j À Á = e B r i L j 1 , g 1=bL j 2 = e g 1 br i L j ,g 1=bL j 2 = e g 1 , g 2 ð Þ br i L j =bL j = e g 1 , g 2 ð Þ r i = R 0 2 = sk i , the proof is given.…”
Section: Prove the Proposed Security Goalsmentioning
confidence: 99%
“…According to [5], five communications are available in the IoV framework, and they are some data transmission schemes ( [17], [18], [19], [20]) in which they have referred the IoV concept, but they have not designed data transmission protocols for all five communications. In [17], they proposed data transmission schemes for V2V, V2R, and vehicle-to-home.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [18], Liu et al suggested a communication method for V2V only using different high-computational cryptographic techniques. As a result, this scheme [18] is highly time-consuming, and thus, it is not appropriate in real-life applications. Ruan et al [19] came up with an authentication protocol using wireless sensors, and data is transmitted to the server through a cluster head from a wireless sensor.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The dual verification uses the identity and behaviour authentication in order to enhance accuracy in decision-making. By treating the identity as an element of entity in order to understand fine-grained authorization and access control, the proposed scheme can also be a comprehensive element based key agreement protocol [14]. This paper proposes an approach that helps the user to protect their privacy when they avail the location based services.…”
Section: Literature Surveymentioning
confidence: 99%