2009 6th IEEE Consumer Communications and Networking Conference 2009
DOI: 10.1109/ccnc.2009.4784943
|View full text |Cite
|
Sign up to set email alerts
|

SeGCom: Secure Group Communication in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 6 publications
0
18
0
Order By: Relevance
“…It creates a reliable and secure environment for communication. Verma et al [6], proposed secure group communication method in which vehicles communicate by two ways. In the first way, they authenticate y RSUs and secondly communicate by creating a group.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It creates a reliable and secure environment for communication. Verma et al [6], proposed secure group communication method in which vehicles communicate by two ways. In the first way, they authenticate y RSUs and secondly communicate by creating a group.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There can be tens or even up to thousands of signatures within a short period of time, thus the notification messages induce a heavy message overhead. Group communications in VANETs, on the other hand, have been considered in three papers [Chim, Yiu, Hui, Jiang & Li (2009) ;Wasef & Shen (2008); Verma & Huang (2009)]. In [Chim, Yiu, Hui, Jiang & Li (2009)], a scheme is proposed to allow a set of vehicles to form a group with the help of an RSU such that subsequently, encrypted group messages can be broadcasted by any member to all other members without the intervention of RSU.…”
Section: State Of the Artmentioning
confidence: 99%
“…In [Verma & Huang (2009)], another group communications protocol, SeGCom, was proposed. However, its concern is totally different from ours and privacy is not considered.…”
Section: State Of the Artmentioning
confidence: 99%
“…If a session key as the common key with authenticity of the owners is exchanged, a public key encryption must be used. The public key certificates are used in the public key encryptionbased communications [8], [9]. As the authors of [10] say, the most challenging part of cryptographic algorithms or applications in vehicular network is key management and the Vehicular Public Key Infrastructure (VPKI) is one of the most important schemes to provide key management among vehicles.…”
Section: Introductionmentioning
confidence: 99%