2016
DOI: 10.1109/tdsc.2015.2399297
|View full text |Cite
|
Sign up to set email alerts
|

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(62 citation statements)
references
References 25 publications
0
59
0
Order By: Relevance
“…The protocol [66] uses this idea based on the Strong Diffie-Hellman assumption and the Decision Linear assumption. The protocol [67] uses three countermeasures, namely, 1) Merkle Hash Tree (MHT) [180], 2) TESLA scheme [181,182,183], and 3) Elliptic Curve Digital Signature Algorithm (ECDSA) [184]. The MHT is a binary tree structure where each leaf is assigned a hash value and an inner node is assigned the hash value of its children.…”
Section: Time-domain Transformationmentioning
confidence: 99%
“…The protocol [66] uses this idea based on the Strong Diffie-Hellman assumption and the Decision Linear assumption. The protocol [67] uses three countermeasures, namely, 1) Merkle Hash Tree (MHT) [180], 2) TESLA scheme [181,182,183], and 3) Elliptic Curve Digital Signature Algorithm (ECDSA) [184]. The MHT is a binary tree structure where each leaf is assigned a hash value and an inner node is assigned the hash value of its children.…”
Section: Time-domain Transformationmentioning
confidence: 99%
“…However, it is still critical to validate new PCs and the corresponding beacons in high node density environment or under DoS attacks in a timely manner. Prediction of the next beacon content (e.g., vehicle location) can help validating beacons based on the prediction result included in a previous beacon [14,15]. However, such an approach cannot tolerate packet losses: once a beacon is lost, the following beacon can only be verified based on its signature.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Each node broadcasts safety beacons at a rate γ. In this paper, we assume γ = 10 Hz, a typical value in the literature [23,15,14]. Thus, a PC can be used for authenticating at most L T ESLA = τ · γ beacons.…”
Section: Tesla Key Chain Generationmentioning
confidence: 99%
“…Considering that VANET has greater mobility and higher packet loss rate, it needs special technical standards, such as IEEE 802.11 and IEEE 1609 for VANETs. 23,[25][26][27][28][29][30][31][32][33] In this paper, a lightweight V2I authentication protocol (LVAP) is proposed between the OBU and RSUs. Usually, the authentication protocols in VANETs should at least satisfy the requirements including the efficiency and the confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, there are various schemes that have been proposed using asymmetric or symmetric cryptography. 23,[25][26][27][28][29][30][31][32][33] In this paper, a lightweight V2I authentication protocol (LVAP) is proposed between the OBU and RSUs. Specifically, the trusted authority (TA) predicts the RSUs that the OBU will pass by and then distributes the group key among these RSUs and OBU.…”
Section: Introductionmentioning
confidence: 99%