Proceedings Inaugural International Symposium on Vehicle Security &Amp; Privacy 2023
DOI: 10.14722/vehiclesec.2023.23007
|View full text |Cite
|
Sign up to set email alerts
|

Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs

Abstract: In vehicular ad hoc networks (VANETs), vehicles exchange messages to improve traffic and passengers' safety. In VANETs, (passive) adversaries can track vehicles (and their drivers) by analyzing the data exchanged in the network. The use of privacy-enhancing technologies can prevent vehicle tracking but solutions so far proposed either require an intermittent connection to a fixed infrastructure or allow vehicles to generate concurrent pseudonyms which could lead to identity-based (Sybil) attacks. In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 25 publications
0
0
0
Order By: Relevance
“…Short-time lived [6,107,119,122,139] and transaction pseudonyms [85] have been mostly used in vehicular networks in vehicle-to-vehicle (V2V) communication, whereas a person pseudonym [84,94] is used in addition for communication between a vehicle and the trusted authority (TA). In a survey [103] on pseudonymous authentication solutions in vehicleto-everything (V2X) communication, authors identify different requirements that necessitate pseudonymity in vehicular networks as well as deriving an abstract pseudonym lifecycle applicable to the majority of pseudonym approaches for vehicular networks.…”
Section: Privacy-preserving Identifiers For Smart Environmentsmentioning
confidence: 99%
“…Short-time lived [6,107,119,122,139] and transaction pseudonyms [85] have been mostly used in vehicular networks in vehicle-to-vehicle (V2V) communication, whereas a person pseudonym [84,94] is used in addition for communication between a vehicle and the trusted authority (TA). In a survey [103] on pseudonymous authentication solutions in vehicleto-everything (V2X) communication, authors identify different requirements that necessitate pseudonymity in vehicular networks as well as deriving an abstract pseudonym lifecycle applicable to the majority of pseudonym approaches for vehicular networks.…”
Section: Privacy-preserving Identifiers For Smart Environmentsmentioning
confidence: 99%