2016
DOI: 10.1007/s11276-016-1197-z
|View full text |Cite
|
Sign up to set email alerts
|

Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…In order to overcome the limitations of the traditional certificate based management methods, the second category used the group signatures technology [18], [23], [29], [30]. However, the member revocation problem of this method incurs a verification and storage/transmission cost higher than most traditional schemes.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to overcome the limitations of the traditional certificate based management methods, the second category used the group signatures technology [18], [23], [29], [30]. However, the member revocation problem of this method incurs a verification and storage/transmission cost higher than most traditional schemes.…”
Section: A Related Workmentioning
confidence: 99%
“…The fourth category is a software based approach without involving TPDs [23]- [26], developed with the motivation of overcoming the fundamental storage issues of hardware based systems. Such software-based schemes only use two shared secrets in order to meet the security and privacy requirement.…”
Section: A Related Workmentioning
confidence: 99%
“…It shows superior performance under complex network environment and attack, greatly reduces the false alarm rate and false alarm rate. In addition, a packet-key authentication and malicious behavior detection model is designed [19]. Handshakes and the message signatures are preformed among nodes within a certain transmission range.…”
mentioning
confidence: 99%