메뉴 건너뛰기




Volumn 60, Issue 2, 2011, Pages 580-591

EP2DF: An efficient privacy-preserving data-forwarding scheme for service-oriented vehicular ad hoc networks

Author keywords

Data forwarding; Lite CA based; privacy preservation; service oriented vehicular ad hoc networks (VANETs)

Indexed keywords

COMMERCIAL SERVICES; COMPUTATIONAL OVERHEADS; CONTENT DISTRIBUTION; DATA-FORWARDING; ENCRYPTION TECHNIQUE; INTERNET ACCESS; LITE-CA BASED; PERFORMANCE COMPARISON; PRIVACY PRESERVATION; PRIVACY PRESERVING; REAL TIME TRAFFICS; RESEARCH CHALLENGES; SECURITY ANALYSIS; SERVICE ORIENTED; TRACING ATTACKS; USER DEVICES; VEHICULAR AD HOC NETWORKS;

EID: 79951900587     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2010.2095432     Document Type: Article
Times cited : (29)

References (37)
  • 2
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
    • Phoenix, AZ
    • R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE INFOCOM, Phoenix, AZ, 2008, pp. 1229-1237.
    • (2008) Proc. IEEE INFOCOM , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.4    Shen, X.5
  • 4
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • 6 I, DOI 10.1109/TVT.2007.906878
    • X. Lin, X. Sun, P. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 5
    • 70350330400 scopus 로고    scopus 로고
    • Security in service-oriented vehicular networks
    • Aug.
    • H. Zhu, R. Lu, X. Shen, and X. Lin, "Security in service-oriented vehicular networks," IEEE Wireless Commun., vol. 16, no. 4, pp. 16-22, Aug. 2009.
    • (2009) IEEE Wireless Commun. , vol.16 , Issue.4 , pp. 16-22
    • Zhu, H.1    Lu, R.2    Shen, X.3    Lin, X.4
  • 6
    • 39449084181 scopus 로고    scopus 로고
    • Routing in vehicular ad hoc networks: A survey
    • DOI 10.1109/MVT.2007.912927
    • F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Veh. Technol. Mag., vol. 2, no. 2, pp. 12-22, Jun. 2007. (Pubitemid 351267703)
    • (2007) IEEE Vehicular Technology Magazine , vol.2 , Issue.2 , pp. 12-22
    • Li, F.1    Wang, Y.2
  • 7
    • 69549116414 scopus 로고    scopus 로고
    • VANET routing on city roads using real-time vehicular traffic information
    • Sep.
    • J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, "VANET routing on city roads using real-time vehicular traffic information," IEEE Trans. Veh. Technol., vol. 58, no. 7, pp. 3609-3626, Sep. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.7 , pp. 3609-3626
    • Nzouonta, J.1    Rajgure, N.2    Wang, G.3    Borcea, C.4
  • 8
    • 55149100626 scopus 로고    scopus 로고
    • SLAB: A secure localized authentication and billing scheme for wireless mesh networks
    • Oct.
    • H. Zhu, X. Lin, R. Lu, P. Ho, and X. Shen, "SLAB: A secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun., vol. 7, no. 10, pp. 3858-3868, Oct. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.10 , pp. 3858-3868
    • Zhu, H.1    Lin, X.2    Lu, R.3    Ho, P.4    Shen, X.5
  • 9
    • 66449108023 scopus 로고    scopus 로고
    • PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks
    • Jun.
    • H. Zhu, X. Lin, M. Shi, P. Ho, and X. Shen, "PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2529-2543, Jun. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.5 , pp. 2529-2543
    • Zhu, H.1    Lin, X.2    Shi, M.3    Ho, P.4    Shen, X.5
  • 10
    • 70350238158 scopus 로고    scopus 로고
    • SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
    • Oct.
    • H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks," IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628-4639, Oct. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.8 , pp. 4628-4639
    • Zhu, H.1    Lin, X.2    Lu, R.3    Fan, Y.4    Shen, X.5
  • 11
    • 74049097109 scopus 로고    scopus 로고
    • On noncooperative location privacy: A game-theoretic analysis
    • Chicago, IL
    • J. Freudiger, M. Manshaei, J. Hubaux, and D. Parkes, "On noncooperative location privacy: A game-theoretic analysis," in Proc. 16th ACM Conf. CCS, Chicago, IL, 2009, pp. 324-337.
    • (2009) Proc. 16th ACM Conf. CCS , pp. 324-337
    • Freudiger, J.1    Manshaei, M.2    Hubaux, J.3    Parkes, D.4
  • 14
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Warsaw, Poland
    • C. Gentry, "Certificate-based encryption and the certificate revocation problem," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., Warsaw, Poland, 2003, pp. 272-293.
    • (2003) Proc. Int. Conf. Theory Appl. Cryptographic Techn. , pp. 272-293
    • Gentry, C.1
  • 15
    • 59249093973 scopus 로고    scopus 로고
    • Certificate revocation list distribution in vehicular communication systems
    • San Francisco, CA
    • P. Papadimitratos, G. Mezzour, and J. Hubaux, "Certificate revocation list distribution in vehicular communication systems," in Proc. 5th ACM Int. Workshop VANET, San Francisco, CA, 2008, pp. 86-87.
    • (2008) Proc. 5th ACM Int. Workshop VANET , pp. 86-87
    • Papadimitratos, P.1    Mezzour, G.2    Hubaux, J.3
  • 17
    • 33645584388 scopus 로고    scopus 로고
    • Generic construction of certificateless encryption
    • Assisi, Italy
    • D. Yum and P. Lee, "Generic construction of certificateless encryption," in Proc. ICCSA, Assisi, Italy, 2004, pp. 802-811.
    • (2004) Proc. ICCSA , pp. 802-811
    • Yum, D.1    Lee, P.2
  • 18
    • 24144438230 scopus 로고    scopus 로고
    • CBE from CL-PKE: A generic construction and efficient schemes
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • S. Al-Riyami and K. Paterson, "CBE from CL-PKE: A generic construction and efficient schemes," in Proc. 8th Int. Workshop Theory Practice PKC, Les Diablerets, Switzerland, 2005, pp. 398-415. (Pubitemid 41231345)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 398-415
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 19
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007. (Pubitemid 46012642)
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 20
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Santa Barbara, CA
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. 4th Int. Cryptology Conf., Santa Barbara, CA, 1984, pp. 47-53.
    • (1984) Proc. 4th Int. Cryptology Conf. , pp. 47-53
    • Shamir, A.1
  • 22
    • 84876300178 scopus 로고    scopus 로고
    • Malicious KGC attacks in certificateless cryptography
    • Singapore
    • M. Au, Y. Mu, J. Chen, D. Wong, J. Liu, and G. Yang, "Malicious KGC attacks in certificateless cryptography," in Proc. 2nd ASIACCS, Singapore, 2007, pp. 302-311.
    • (2007) Proc. 2nd ASIACCS , pp. 302-311
    • Au, M.1    Mu, Y.2    Chen, J.3    Wong, D.4    Liu, J.5    Yang, G.6
  • 23
    • 33846219987 scopus 로고    scopus 로고
    • Certificateless signature: A new security model and an improved generic construction
    • DOI 10.1007/s10623-006-9022-9
    • B. Hu, D. Wong, Z. Zhang, and X. Deng, "Certificateless signature: A new security model and an improved generic construction," Des., Codes Cryptography, vol. 42, no. 2, pp. 109-126, Feb. 2007. (Pubitemid 46094766)
    • (2007) Designs, Codes, and Cryptography , vol.42 , Issue.2 , pp. 109-126
    • Hu, B.C.1    Wong, D.S.2    Zhang, Z.3    Deng, X.4
  • 24
    • 33845956283 scopus 로고    scopus 로고
    • Simulatability and security of certificateless threshold signatures
    • DOI 10.1016/j.ins.2006.08.008, PII S002002550600243X
    • L. Wang, Z. Cao, X. Li, and H. Qian, "Simulatability and security of certificateless threshold signatures," Inf. Sci., vol. 177, no. 6, pp. 1382-1394, Mar. 2007. (Pubitemid 46037667)
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1382-1394
    • Wang, L.1    Cao, Z.2    Li, X.3    Qian, H.4
  • 25
    • 62449111027 scopus 로고    scopus 로고
    • Certificateless signcryption
    • Tokyo, Japan
    • M. Barbosa and P. Farshim, "Certificateless signcryption," in Proc. 4th ASIACCS, Tokyo, Japan, 2008, pp. 369-372.
    • (2008) Proc. 4th ASIACCS , pp. 369-372
    • Barbosa, M.1    Farshim, P.2
  • 27
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Apr.
    • S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, Apr. 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 29
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 30
    • 79951867740 scopus 로고    scopus 로고
    • State of the art in hardware implementations of cryptographic algorithms
    • Mar.
    • "State of the art in hardware implementations of cryptographic algorithms," ECRYPT Techn. Rep., Mar. 2006.
    • (2006) ECRYPT Techn. Rep.
  • 31
    • 0001057132 scopus 로고
    • Optimal normal bases
    • Dec.
    • S. Gao and H. Lenstra, "Optimal normal bases," Des., Codes Cryptography, vol. 2, no. 4, pp. 315-323, Dec. 1992.
    • (1992) Des., Codes Cryptography , vol.2 , Issue.4 , pp. 315-323
    • Gao, S.1    Lenstra, H.2
  • 32
    • 47049121755 scopus 로고    scopus 로고
    • Bit-parallel polynomial basis multiplier for new classes of finite fields
    • Aug.
    • H. Wu, "Bit-parallel polynomial basis multiplier for new classes of finite fields," IEEE Trans. Comput., vol. 57, no. 8, pp. 1023-1031, Aug. 2008.
    • (2008) IEEE Trans. Comput. , vol.57 , Issue.8 , pp. 1023-1031
    • Wu, H.1
  • 34
    • 85020399101 scopus 로고    scopus 로고
    • D. R. L. Brown SEC 2: Sep.
    • D. R. L. Brown, SEC 2: Recommended Elliptic Curve Domain Parameters, Sep. 2005. [Online]. Available: www.secg.org/download/aid-776/sec2.pdf
    • (2005) Recommended Elliptic Curve Domain Parameters
  • 35
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Fairfax, VA
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Conf. CCS, Fairfax, VA, 1993, pp. 62-73.
    • (1993) Proc. 1st ACM Conf. CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 36
    • 1642489925 scopus 로고    scopus 로고
    • OAEP reconsidered
    • V. Shoup, "OAEP reconsidered," J. Cryptology, vol. 15, no. 4, pp. 223-249, 2008.
    • (2008) J. Cryptology , vol.15 , Issue.4 , pp. 223-249
    • Shoup, V.1
  • 37
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.