2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) 2013
DOI: 10.1109/wowmom.2013.6583472
|View full text |Cite
|
Sign up to set email alerts
|

Towards a secure and privacy-preserving multi-service vehicular architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…In this line of research, the authors in [24] considered solely pseudonym provision and resolution. VeSPA [25], and its extension [26], paved the way for multi-service, multi-domain architectures in VC systems. Nevertheless, they rely on custom authentication protocols and, thus, are not compatible with existing Internet SPs.…”
Section: Introductionmentioning
confidence: 99%
“…In this line of research, the authors in [24] considered solely pseudonym provision and resolution. VeSPA [25], and its extension [26], paved the way for multi-service, multi-domain architectures in VC systems. Nevertheless, they rely on custom authentication protocols and, thus, are not compatible with existing Internet SPs.…”
Section: Introductionmentioning
confidence: 99%
“…As such certificates and related identifiers must not be usable to track vehicles, short‐term pseudonymous certificates are applied and regularly changed in order to protect the driver's privacy. The authors in introduce and implement a distributed PKI architecture for vehicular networks, utilising pseudonymous certificates for privacy‐preserving vehicular applications complying with related standards. Using tickets as cryptographic tokens, the proposed scheme offers authentication, authorisation and accountability, while maintaining the vehicle's privacy (e.g.…”
Section: Network Technologiesmentioning
confidence: 99%
“…V2X means V2V (Vehicle-to-Vehicle), V2I (Vehicle-to-Infrastructure) and/or V2N (Vehicle-to-Nomadic Devices). [3] According to Dedicated Shot Range Communication (DSRC), vehicles broadcast traffic safety message every 100-300ms. In high traffic density scenario, verifying every message will bring great computation overhead.…”
Section: Introductionmentioning
confidence: 99%