2018
DOI: 10.1109/access.2018.2826518
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…performance analysis shows that the proposed scheme has lower communication and computation overhead, and be scalable in high-density scenario. To prevent the DoS attack that caused by the complicated initial authentication process, Liu et al proposed a puzzle-based co-authentication protocol, which greatly increases the hardness to launch the DoS attack in 5G-V2X communications [121]. In [121], a hash puzzle should be solved before a message is sent.…”
Section: Security In Cellular Based V2x Communicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…performance analysis shows that the proposed scheme has lower communication and computation overhead, and be scalable in high-density scenario. To prevent the DoS attack that caused by the complicated initial authentication process, Liu et al proposed a puzzle-based co-authentication protocol, which greatly increases the hardness to launch the DoS attack in 5G-V2X communications [121]. In [121], a hash puzzle should be solved before a message is sent.…”
Section: Security In Cellular Based V2x Communicationsmentioning
confidence: 99%
“…To prevent the DoS attack that caused by the complicated initial authentication process, Liu et al proposed a puzzle-based co-authentication protocol, which greatly increases the hardness to launch the DoS attack in 5G-V2X communications [121]. In [121], a hash puzzle should be solved before a message is sent. The puzzle is to find a bitstream that when the bitstream is concatenated with the message as the input of a hash function, an arbitrary number of bits at the end of the output are all zeros.…”
Section: Security In Cellular Based V2x Communicationsmentioning
confidence: 99%
“…Puzzle-based approaches [16,17] have been proposed to defend against DoS attacks for mutual authentication in V2I and V2V communication, but they are not suitable for authenticating frequent connectionless safety beacons. Efficient pseudonym validation schemes based on alternative non-classical cryptographic primitives (e.g., ID-based cryptography) [18,19,20] rely on connection to Roadside Unit (RSU) and need to communicate with RSUs for updating pseudonyms of newly joined or revoked nodes, and could fail to validate pseudonyms when connection to RSUs is lost.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Therefore, Feng et al [5] proposed a data sharing scheme based on the cloud platform that can resist man-inthe-middle attack and collusion attacks. In addition, to prevent denial of service attacks, Hash problem based trust cluster cooperative authentication scheme [6] was proposed, which also reduced the overhead of pseudonym authentication. Recently, a data aggregation scheme based on fully homomorphic encryption [7] was used to protect the privacy of identity and location in information interaction.…”
Section: Introductionmentioning
confidence: 99%