2014
DOI: 10.1007/s11277-014-2245-6
|View full text |Cite
|
Sign up to set email alerts
|

Pseudonyms Based Blind Signature Approach for an Improved Secured Communication at Social Spots in VANETs

Abstract: Preserving the privacy of the vehicle on the move is an important challenge in VANET's. Vehicles can be loaded with Pseudonyms that can be changed frequently in specific intervals to prevent tracking of the vehicle by a third party. Yet, this scheme supports only a short travel from home and moreover the RSUs' do not play a major role. Therefore, this paper proposes a scheme of implementing a security mechanism using Blind Signature, where the Road Side Units in collaboration with the Trusted Authority generat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…The rationale behind PKI-based is primarily to preload many anonymous certifications and the relevant pair of keys (private/public keys) to each enrolled vehicle in advance. Many researchers [9][10][11][12][13][14][15][16][17] have proposed the PKI-based scheme for satisfying privacy and security in vehicular networks. However, the three main limitations of this approach are (i) huge certification management burden for TA, since massive numbers of anonymous certifications and the relevant pair of keys are required; (ii) storage management burden due to the small storage capacity of the vehicle; and (iii) low efficiency of the system, since the certificate is also verified in the verification method.…”
Section: Public Key Infrastructure (Pki)-basedmentioning
confidence: 99%
“…The rationale behind PKI-based is primarily to preload many anonymous certifications and the relevant pair of keys (private/public keys) to each enrolled vehicle in advance. Many researchers [9][10][11][12][13][14][15][16][17] have proposed the PKI-based scheme for satisfying privacy and security in vehicular networks. However, the three main limitations of this approach are (i) huge certification management burden for TA, since massive numbers of anonymous certifications and the relevant pair of keys are required; (ii) storage management burden due to the small storage capacity of the vehicle; and (iii) low efficiency of the system, since the certificate is also verified in the verification method.…”
Section: Public Key Infrastructure (Pki)-basedmentioning
confidence: 99%
“…The main idea of the public key infrastructure-based CPPA schemes [22][23][24][25][26][27][28][29][30] is to preload a massive pool of private/public keys and their matching certificates to the OBUs of vehicles, generated by the TA during the registration process. This approach supports privacy-preserving, since a massive pool of private/public keys and their matching certificates are preloaded in advance.…”
Section: Public Key Infrastructure-based Cppamentioning
confidence: 99%
“…In PKI-based schemes [10][11][12][13][14], the safety-related message is signed with a pseudonym ID by the vehicle to preserve privacy. In order to demonstrate its validity, each message contains the corresponding pseudonym certificate.…”
Section: Pki-based Conditional Privacy-preserving Authentication Schemesmentioning
confidence: 99%