메뉴 건너뛰기




Volumn 58, Issue 9, 2009, Pages 5214-5224

EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks

Author keywords

Ad hoc; Decentralized; Revocation protocol; Vehicular networks

Indexed keywords

CERTIFICATE REVOCATION LIST; KEY DISTRIBUTION; PERFORMANCE EVALUATION; RELIABLE OPERATION; SAFETY LEVEL; SECURITY ISSUES; THRESHOLD SCHEMES; VEHICULAR AD HOC NETWORKS; VEHICULAR NETWORKS;

EID: 70450180562     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2009.2023662     Document Type: Article
Times cited : (64)

References (34)
  • 2
    • 33746097415 scopus 로고    scopus 로고
    • Privacy issues in vehicular ad hoc networks
    • Sep
    • F. Dötzer, "Privacy issues in vehicular ad hoc networks," in Proc. 2nd ACM Workshop Veh. Ad Hoc Netw., Sep. 2006, pp. 197-209.
    • (2006) Proc. 2nd ACM Workshop Veh. Ad Hoc Netw. , pp. 197-209
    • Dötzer, F.1
  • 3
    • 78650984146 scopus 로고    scopus 로고
    • IEEE trial-use standard for wireless access in vehicular environments-security services for applications and management messages
    • IEEE Trial-Use Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages, IEEE Std. 1609.2-2006, 2006.
    • (2006) IEEE Std.1609.2-2006
  • 6
    • 51249100419 scopus 로고    scopus 로고
    • RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
    • C. Zhang, X. Lin, R. Lu, and P.-H. Ho, "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks," in Proc. ICC, 2008, pp. 1451-1457.
    • (2008) Proc. ICC , pp. 1451-1457
    • Zhang, C.1    Lin, X.2    Lu, R.3    Ho, P.-H.4
  • 8
    • 34547533155 scopus 로고    scopus 로고
    • Enforcing privacy using symmetric random key-set in vehicular networks
    • Y. Xi, K. Sha, W. Shi, L. Schwiebert, and T. Zhang, "Enforcing privacy using symmetric random key-set in vehicular networks," in Proc. ISADS, 2007, pp. 344-351.
    • (2007) Proc. ISADS , pp. 344-351
    • Xi, Y.1    Sha, K.2    Shi, W.3    Schwiebert, L.4    Zhang, T.5
  • 10
    • 48649088209 scopus 로고    scopus 로고
    • A group signature based secure and privacy-preserving vehicular communication framework
    • J. Guo, J. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. Mobile Netw. Veh. Environ., 2007, pp. 103-108.
    • (2007) Proc. Mobile Netw. Veh. Environ. , pp. 103-108
    • Guo, J.1    Baugh, J.2    Wang, S.3
  • 11
    • 51349103067 scopus 로고    scopus 로고
    • Adaptive privacypreserving authentication in vehicular networks
    • K. Sha, Y. Xi, W. Shi, L. Schwiebert, and T. Zhang, "Adaptive privacypreserving authentication in vehicular networks," in Proc. ChinaCom, 2006, pp. 1-8.
    • (2006) Proc. ChinaCom , pp. 1-8
    • Sha, K.1    Xi, Y.2    Shi, W.3    Schwiebert, L.4    Zhang, T.5
  • 12
    • 38549175291 scopus 로고    scopus 로고
    • Secure vehicular communications based on group signature and id-based signature scheme
    • X. Sun, X. Lin, and P.-H. Ho, "Secure vehicular communications based on group signature and id-based signature scheme," in Proc. ICC, 2007, pp. 1539-1545.
    • (2007) Proc. ICC , pp. 1539-1545
    • Sun, X.1    Lin, X.2    Ho, P.-H.3
  • 13
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • DOI 10.1109/TVT.2007.906878
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol.56, no.6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 I , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 14
    • 67249107220 scopus 로고    scopus 로고
    • ECMV: Efficient certificate management scheme for vehicular networks
    • A. Wasef, Y. Jiang, and X. Shen, "ECMV: Efficient certificate management scheme for vehicular networks," in Proc. IEEE GLOBECOM, 2008, pp. 1-5.
    • (2008) Proc. IEEE GLOBECOM , pp. 1-5
    • Wasef, A.1    Jiang, Y.2    Shen, X.3
  • 15
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. INFOCOM, 2008, pp. 1229-1237.
    • (2008) Proc. INFOCOM , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 16
  • 18
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
    • S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," in Proc. 11th IEEE Int. Conf. Netw. Protocols, 2003, pp. 326-335.
    • (2003) Proc. 11th IEEE Int. Conf. Netw. Protocols , pp. 326-335
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 19
    • 33750258287 scopus 로고    scopus 로고
    • GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
    • S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks," J. Comput. Secur., vol.14, no.4, pp. 301-325, 2006.
    • (2006) J. Comput. Secur. , vol.14 , Issue.4 , pp. 301-325
    • Zhu, S.1    Setia, S.2    Xu, S.3    Jajodia, S.4
  • 20
    • 51249107509 scopus 로고    scopus 로고
    • PPGCV: Privacy preserving group communications protocol for vehicular ad hoc networks
    • A. Wasef and X. Shen, "PPGCV: Privacy preserving group communications protocol for vehicular ad hoc networks," in Proc. ICC, 2008, pp. 1458-1463.
    • (2008) Proc. ICC , pp. 1458-1463
    • Wasef, A.1    Shen, X.2
  • 23
  • 25
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Sep
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, Sep. 2004.
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 26
    • 24144479376 scopus 로고    scopus 로고
    • Computing the Tate pairing
    • Berlin, Germany: Springer-Verlag
    • M. Scott, "Computing the Tate pairing," in Topics in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 293-304.
    • (2005) Topics in Cryptology , pp. 293-304
    • Scott, M.1
  • 27
    • 0348003132 scopus 로고    scopus 로고
    • The state of elliptic curve cryptography
    • Mar
    • N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography," Designs Codes Cryptogr., vol. 19, no. 2/3, pp. 173-193, Mar. 2000.
    • (2000) Designs Codes Cryptogr. , vol.19 , Issue.2-3 , pp. 173-193
    • Koblitz, N.1    Menezes, A.2    Vanstone, S.3
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir, "How to share a secret," Commun. ACM, vol.22, no.11, pp. 612-613, Nov. 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 29
    • 0003403663 scopus 로고    scopus 로고
    • [Online]. Available
    • The Network Simulator-ns-2. [Online]. Available: http://nsnam.isi.edu/ nsnam/index.php/User-Information
    • The Network Simulator-ns-2
  • 32
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identitybased batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
    • (2008) Proc. IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5
  • 33
    • 70450166722 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reductions
    • A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reductions," IEIC Tech. Rep., vol.100, no.323, pp. 99-108, 2000.
    • (2000) IEIC Tech. Rep. , vol.100 , Issue.323 , pp. 99-108
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 34
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • Aug
    • D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Secur., vol.1, no.1, pp. 36-63, Aug. 2001.
    • (2001) Int. J. Inf. Secur. , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.