2020
DOI: 10.1109/tvt.2020.2981934
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
58
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 105 publications
(58 citation statements)
references
References 27 publications
0
58
0
Order By: Relevance
“…For the above reasons, we claim the proposed scheme is the most efficient. [25] VII. CONCLUSIONS AND DISCUSSION We propose an efficient batch verification scheme for VANET in this paper.…”
Section: Results: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…For the above reasons, we claim the proposed scheme is the most efficient. [25] VII. CONCLUSIONS AND DISCUSSION We propose an efficient batch verification scheme for VANET in this paper.…”
Section: Results: Performance Analysismentioning
confidence: 99%
“…The unit is milliseconds (ms). Except the schemes presented in related works, we also compare four other schemes: Asaar et al's scheme [10], Cui et al's scheme [11], Gayathri et al's scheme [12], Sutrala et al's scheme [25] and Wu et al's scheme [26]. Note that their schemes also use other ideas, such as proxy vehicles, Cuckoo filter, and certificateless, to solve other relevant situations.…”
Section: Results: Performance Analysismentioning
confidence: 99%
“…The proposed scheme's performance evaluation is compared with the performances of other related schemes, i.e., the HOOSC [39] scheme, SM-AKA [40] scheme. CP-VBP [20] scheme, and RSEAP [18], in terms of computational cost and communication cost; their comparison is shown in Table 5. More details are shown in the following subsections.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Hence, the network connection's availability should not be an issue when offline authentication exists. Several works [16,[20][21][22][23] tried to cope with a specific type of attack, which can be a limitation. In contrast, several others were designed to handle a specific challenge, such as authentication [24], privacy [25], or localization [26].…”
Section: Introductionmentioning
confidence: 99%
“…Internet of Vehicles (IoV) combined with VANET and IoT is considered a promising solution to resolve this problem. IoV has been rapidly evolving in the past few years due to useful features, including congestion avoidance, low operational costs, and road safety assurance features [9]. IoV refers to communication models that communicate between vehicles and other objects by utilizing "Vehicle-to-Vehicle (V2V)" and "Vehicle-to-Infrastructure (V2I)" interactions [10].…”
Section: Introductionmentioning
confidence: 99%