메뉴 건너뛰기




Volumn 59, Issue 2, 2010, Pages 533-549

DCS: An efficient distributed-certificate-service scheme for vehicular networks

Author keywords

Batch verification; Certificate service; Communication security; Revocation; Vehicular networks

Indexed keywords

BATCH VERIFICATION; CERTIFICATE MANAGEMENT; CERTIFICATE SERVICES; CERTIFICATE-BASED; COMMUNICATION SECURITY; ON-BOARD UNITS; PERFORMANCE EVALUATION; SECURITY ANALYSIS; VEHICULAR COMMUNICATIONS; VEHICULAR NETWORKS; VERIFICATION TECHNIQUES;

EID: 77249177167     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2009.2028893     Document Type: Article
Times cited : (106)

References (37)
  • 1
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • Jan.
    • M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol.15, no.1, pp. 39-68, Jan. 2007.
    • (2007) J. Comput. Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 2
    • 33746097415 scopus 로고    scopus 로고
    • Privacy issues in vehicular ad hoc networks
    • Sep.
    • F. Dötzer, "Privacy issues in vehicular ad hoc networks," in Proc. 2nd ACM Workshop Veh. Ad Hoc Netw., Sep. 2006, pp. 197-209.
    • (2006) Proc. 2nd ACM Workshop Veh. Ad Hoc Netw. , pp. 197-209
    • Dötzer, F.1
  • 5
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • May/Jun.
    • J. P. Hubaux, "The security and privacy of smart vehicles," IEEE Security Privacy, vol.2, no.3, pp. 49-55, May/Jun. 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.P.1
  • 6
    • 4544241048 scopus 로고    scopus 로고
    • IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
    • Aug.
    • M. Shi, X. Shen, and J. Mark, "IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks," Wireless Commun., vol.11, no.4, pp. 66-75, Aug. 2004.
    • (2004) Wireless Commun , vol.11 , Issue.4 , pp. 66-75
    • Shi, M.1    Shen, X.2    Mark, J.3
  • 7
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Sep.
    • Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol.5, no.9, pp. 2569-2577, Sep. 2006.
    • (2006) IEEE Trans. Wireless Commun. , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 9
    • 77249101939 scopus 로고    scopus 로고
    • 5.9 GHz DSRC. [Online]. Available
    • 5.9 GHz DSRC. [Online]. Available: http://grouper.ieee.org/groups/scc32/ dsrc/index.html
  • 10
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • DOI 10.1109/TVT.2007.906878
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol.56, no.6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.I6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 11
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Proc. Crypto, 2004, vol.3152, pp. 41-55.
    • (2004) Proc. Crypto , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 12
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. INFOCOM, 2008, pp. 1229-1237.
    • (2008) Proc. INFOCOM , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 13
    • 67349168446 scopus 로고    scopus 로고
    • BAT: A robust signature scheme for vehicular networks using binary authentication tree
    • Apr.
    • Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A robust signature scheme for vehicular networks using binary authentication tree," IEEE Trans. Wireless Commun., vol.8, no.4, pp. 1974-1983, Apr. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 15
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Sep.
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, Sep. 2004.
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 16
    • 24144479376 scopus 로고    scopus 로고
    • Computing the Tate pairing
    • Berlin, Germany: Springer-Verlag
    • M. Scott, "Computing the Tate pairing," in Topics in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 293-304.
    • (2005) Topics in Cryptology , pp. 293-304
    • Scott, M.1
  • 17
    • 70450166722 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reductions
    • A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reductions," IEIC Tech. Rep., vol.100, no.323, pp. 99-108, 2000.
    • (2000) IEIC Tech. Rep. , vol.100 , Issue.323 , pp. 99-108
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 19
    • 0348003132 scopus 로고    scopus 로고
    • The state of elliptic curve cryptography
    • Mar.
    • N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography," Des. Codes Cryptogr., vol.19, no.2, pp. 173-193, Mar. 2000.
    • (2000) Des. Codes Cryptogr. , vol.19 , Issue.2 , pp. 173-193
    • Koblitz, N.1    Menezes, A.2    Vanstone, S.3
  • 20
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for black-box fields and their application to cryptography
    • D. Boneh and R. Lipton, "Algorithms for black-box fields and their application to cryptography," in Proc. Adv. Cryptol., 1996, pp. 283-297.
    • (1996) Proc. Adv. Cryptol. , pp. 283-297
    • Boneh, D.1    Lipton, R.2
  • 21
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • S. Al-Riyami and K. Paterson, "Certificateless public key cryptography," in Proc. Adv. Cryptol., 2003, pp. 452-473.
    • (2003) Proc. Adv. Cryptol. , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.2
  • 22
    • 33744786523 scopus 로고    scopus 로고
    • On the security of certificateless signature schemes from Asiacrypt 2003
    • Berlin, Germany: Springer-Verlag
    • X. Huang, W. Susilo, Y. Mu, and F. Zhang, "On the security of certificateless signature schemes from Asiacrypt 2003," in Proc. 4th Int. Conf. CANS, Berlin, Germany: Springer-Verlag, 2005, vol.3810, pp. 13-25.
    • (2005) Proc. 4th Int. Conf. CANS , vol.3810 , pp. 13-25
    • Huang, X.1    Susilo, W.2    Mu, Y.3    Zhang, F.4
  • 24
    • 0038629626 scopus 로고    scopus 로고
    • Protecting key exchange and management protocols against resource clogging attacks
    • R. Oppliger, "Protecting key exchange and management protocols against resource clogging attacks," in Proc. JointWorking Conf. Secure Inf. Netw., 1999, pp. 163-175.
    • (1999) Proc. Joint Working Conf. Secure Inf. Netw. , pp. 163-175
    • Oppliger, R.1
  • 25
    • 76549108979 scopus 로고    scopus 로고
    • REP: Location privacy for VANETs using random encryption periods
    • DOI: 10.1007/ s11036-009- 0175-184, to be published
    • A. Wasef and X. Shen, "REP: Location privacy for VANETs using random encryption periods," Mobile Netw. Appl. (MONET). DOI: 10.1007/ s11036-009-0175-184, to be published.
    • Mobile Netw. Appl. (MONET)
    • Wasef, A.1    Shen, X.2
  • 26
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identitybased batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, 246-250.
    • (2008) Proc. IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5
  • 27
    • 0003403663 scopus 로고    scopus 로고
    • [Online]. Available
    • The network simulator-ns-2. [Online]. Available: http://nsnam.isi.edu/ nsnam/index.php/User Information
    • The Network simulator-ns-2
  • 31
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol.1, no.1, pp. 36- 63, 2001.
    • (2001) Int. J. Inf. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 32
    • 67249141008 scopus 로고    scopus 로고
    • Evaluation of certificate-based authentication in mobile ad hoc networks
    • Apr.
    • K. Sadasivam and T. Yang, "Evaluation of certificate-based authentication in mobile ad hoc networks," in Proc. IASTED NCS, Apr. 2005.
    • (2005) Proc. IASTED NCS
    • Sadasivam, K.1    Yang, T.2
  • 33
    • 77249174687 scopus 로고    scopus 로고
    • [Online]. Available
    • List of U.S. states by area. [Online]. Available: http://www. knowledgerush.com/kr/encyclopedia/List-of-U.S.-states-by-area/
    • List of U.S. States by Area
  • 34
    • 77249113656 scopus 로고    scopus 로고
    • United States Department of Transportation-Federal Highway Administration. [Online]. Available:
    • United States Department of Transportation-Federal Highway Administration. [Online]. Available: http://www.fhwa.dot.gov/policyinformation/ statistics/2007/hm20m.cfm
  • 36
    • 35148875625 scopus 로고    scopus 로고
    • Two certificateless aggregate signatures from bilinear maps
    • Z. Gong, Y. Long, X. Hong, and K. Chen, "Two certificateless aggregate signatures from bilinear maps," in Proc. 8th ACIS Int. Conf. SNPD, 2007, vol.3, pp. 188-193.
    • (2007) Proc. 8th ACIS Int. Conf. SNPD , vol.3 , pp. 188-193
    • Gong, Z.1    Long, Y.2    Hong, X.3    Chen, K.4
  • 37
    • 64049088032 scopus 로고    scopus 로고
    • A novel anonymous mutual authentication protocol with provable link-layer location privacy
    • Mar.
    • R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, "A novel anonymous mutual authentication protocol with provable link-layer location privacy," IEEE Trans. Veh. Technol., vol.58, no.3, pp. 1454-1466, Mar. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.3 , pp. 1454-1466
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.