2014
DOI: 10.1109/jsyst.2012.2231792
|View full text |Cite
|
Sign up to set email alerts
|

TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 155 publications
(52 citation statements)
references
References 21 publications
0
36
0
Order By: Relevance
“…To demonstrate the performance of the proposed scheme, we compare the the critical secure communication procedure with the existing two-party secure communication schemes with session key agreement [6,11,12,15,16]. Next, we implement our scheme based on cryptographic libraries and present a concrete comparison of execution times.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To demonstrate the performance of the proposed scheme, we compare the the critical secure communication procedure with the existing two-party secure communication schemes with session key agreement [6,11,12,15,16]. Next, we implement our scheme based on cryptographic libraries and present a concrete comparison of execution times.…”
Section: Discussionmentioning
confidence: 99%
“…Meanwhile, because Porambage’s scheme uses certificates for authentication, the unlinkability of messages cannot be preserved, and a user’s anonymity can be violated. Therefore, our proposed scheme is a preferable solution for secure communication in vehicle sensor networks compared with the existing similar schemes presented in [6,11,12,15,16]. …”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, several Blockchain-based solutions for vehicular networks have been proposed for secure key management (e.g., [10]), data collection and sharing (e.g., [4,7,9,11,12]), as well as vehicle communications (e.g., [1,3,5,8,13,14,18]). With respect to key management, [10] have designed a framework to manage security keys within an heterogeneous vehicular network.…”
Section: Related Workmentioning
confidence: 99%
“…In the particular field of transportation, various Blockchain-based solutions have been proposed, for example, for interconnected smart vehicles (e.g., [7]), ITS (e.g., [8]), forensic applications (e.g., [9]), secure key management (e.g., [10]), data collection and sharing (e.g., [7,11,12]), and vehicle communications (e.g., [1,3,5,8,13,14]). In spite of the relevant approaches that have addressed vehicular communications, Blockchain solutions are still computationally expensive.…”
Section: Introductionmentioning
confidence: 99%