2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) 2011
DOI: 10.1109/vetecs.2011.5956543
|View full text |Cite
|
Sign up to set email alerts
|

Secure Clustering Scheme Based Keys Management in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…To avoid this problem, VANETs have to furnish non-repudiation of the messages, using asymmetric cryptography based on two keys [23-25-38]. As known, VANETs access infrastructure via RSUs or Hot Spots, and the vehicles are registered with CA, which is suitable for asymmetric cryptography [39]. The CA guarantees the non-repudiation of messages because it manages the identities and credentials of all nodes registered with it.…”
Section: Challenges and Opportunitiesmentioning
confidence: 99%
“…To avoid this problem, VANETs have to furnish non-repudiation of the messages, using asymmetric cryptography based on two keys [23-25-38]. As known, VANETs access infrastructure via RSUs or Hot Spots, and the vehicles are registered with CA, which is suitable for asymmetric cryptography [39]. The CA guarantees the non-repudiation of messages because it manages the identities and credentials of all nodes registered with it.…”
Section: Challenges and Opportunitiesmentioning
confidence: 99%
“…Tahani g. et al [10], proposed trust model depends on public key infrastructure for trust management and distributed cluster algorithm. VANET dynamic demilitarized zone, its set of vehicles of neighbours provide confident and there is registration authority (RA) provide authentication to each vehicles within particular cluster head (CH).…”
Section: Related Workmentioning
confidence: 99%
“…The proposals introduced for the election of cluster heads in mobile ad -hoc networks include the Highest-Degree, the Lowest-Identifier, Distributed Clustering Algorithm, the Weighted Clustering Algorithm (WCA) [8].…”
Section: Cluster Formation In Ad Hoc Networkmentioning
confidence: 99%