메뉴 건너뛰기




Volumn 12, Issue 1, 2013, Pages 78-89

EMAP: Expedite message authentication protocol for vehicular ad hoc networks

Author keywords

certificate revocation; communication security; message authentication; Vehicular networks

Indexed keywords

AUTHENTICATION METHODS; CERTIFICATE REVOCATION; CERTIFICATE REVOCATION LIST; COMMUNICATION SECURITY; KEY DISTRIBUTION; KEYED-HASH MESSAGE AUTHENTICATION CODES; MESSAGE AUTHENTICATION; MESSAGE AUTHENTICATION PROTOCOLS; MESSAGE LOSS; ON-BOARD UNITS; PERFORMANCE EVALUATION; PKI SYSTEMS; PUBLIC-KEY INFRASTRUCTURE; SECRET KEY; SECURITY ANALYSIS; VEHICULAR NETWORKS;

EID: 84870429369     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2011.246     Document Type: Article
Times cited : (192)

References (34)
  • 3
    • 77249177167 scopus 로고    scopus 로고
    • DCS: An efficient distributed certificate service scheme for Vehicular Networks
    • Feb
    • A. Wasef, Y. Jiang, and X. Shen, "DCS: An Efficient Distributed Certificate Service Scheme for Vehicular Networks," IEEE Trans. Vehicular Technology, vol. 59, no. 2 pp. 533-549, Feb. 2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.2 , pp. 533-549
    • Wasef, A.1    Jiang, Y.2    Shen, X.3
  • 4
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J.-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007. (Pubitemid 46012642)
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 5
    • 77956735087 scopus 로고    scopus 로고
    • An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
    • Sept
    • Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.7 , pp. 3589-3603
    • Sun, Y.1    Lu, R.2    Lin, X.3    Shen, X.4    Su, J.5
  • 6
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in vanets
    • Jan
    • R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, "Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in Vanets," IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan. 2012.
    • (2012) IEEE Trans. Vehicular Technology , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, H.3    Liang, X.4    Shen, X.5
  • 7
    • 84870404010 scopus 로고    scopus 로고
    • US Bureau of Transit Statistics, http://en.wikipedia.org/wiki/Passenger/ vehicles/in/the/United/States, 2012.
    • (2012) US Bureau of Transit Statistics
  • 10
    • 84870466972 scopus 로고    scopus 로고
    • 5.9 GHz DSRC
    • "5.9 GHz DSRC," http://grouper.ieee.org/groups/scc32/dsrc/ index.html, 2012.
    • (2012)
  • 11
    • 77951613883 scopus 로고    scopus 로고
    • MAAC: Message authentication acceleration protocol for vehicular ad hoc networks
    • A. Wasef and X. Shen, "MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks," Proc. IEEE GlobeCom, 2009.
    • (2009) Proc. IEEE GlobeCom
    • Wasef, A.1    Shen, X.2
  • 12
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • May/June
    • J.P. Hubaux, "The Security and Privacy of Smart Vehicles," IEEE Security and Privacy, vol. 2, no. 3, pp. 49-55, May/June 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.P.1
  • 19
    • 33750258287 scopus 로고    scopus 로고
    • GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
    • S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks," J. Computer Security, vol. 14, pp. 301-325, 2006. (Pubitemid 44609973)
    • (2006) Journal of Computer Security , vol.14 , Issue.4 , pp. 301-325
    • Zhu, S.1    Setia, S.2    Xu, S.3    Jajodia, S.4
  • 20
    • 51249107509 scopus 로고    scopus 로고
    • PPGCV: Privacy preserving group communications protocol for vehicular ad hoc networks
    • A. Wasef and X. Shen, "PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm. (ICC '08), pp. 1458-1463, 2008.
    • (2008) Proc. IEEE Int'l Conf. Comm. (ICC '08) , pp. 1458-1463
    • Wasef, A.1    Shen, X.2
  • 21
    • 70450180562 scopus 로고    scopus 로고
    • EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks
    • Nov
    • A. Wasef and X. Shen, "EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks," IEEE Trans. Vehicular Technology, vol. 58, no. 9, pp. 5214-5224, Nov. 2009.
    • (2009) IEEE Trans. Vehicular Technology , vol.58 , Issue.9 , pp. 5214-5224
    • Wasef, A.1    Shen, X.2
  • 22
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 23
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • DOI 10.1007/s00145-004-0314-9
    • D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, 2004. (Pubitemid 41201461)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 24
    • 24144479376 scopus 로고    scopus 로고
    • Computing the Tate pairing
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • M. Scott, "Computing the Tate Pairing," Proc. Int'l Conf. Topics in Cryptology, pp. 293-304, 2005. (Pubitemid 41231218)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 293-304
    • Scott, M.1
  • 26
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Comm. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 28
    • 33746050083 scopus 로고    scopus 로고
    • The AES-CBC cipher algorithm and its use with IPsec
    • Sept
    • S. Frankel, R. Glenn, and S. Kelly, "The AES-CBC Cipher Algorithm and Its Use with IPsec," IETF RFC 3602, Sept. 2003.
    • (2003) IETF RFC , vol.3602
    • Frankel, S.1    Glenn, R.2    Kelly, S.3
  • 29
    • 1542265638 scopus 로고    scopus 로고
    • US Secure hash algorithm 1 (SHA1)
    • Sept
    • D. Eastlake and P. Jones, "US Secure Hash Algorithm 1 (SHA1)," IETF RFC 3174, Sept. 2001.
    • (2001) IETF RFC , vol.3174
    • Eastlake, D.1    Jones, P.2
  • 30
    • 84870410729 scopus 로고    scopus 로고
    • Crypto++ Library 5.5.2
    • "Crypto++ Library 5.5.2," http://www.cryptopp.com, 2012.
    • (2012)
  • 31
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," Int'l J. Information Security, vol. 1, no. 1, pp. 36-63, 2001.
    • (2001) Int'l J. Information Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 32
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," Proc. IEEE INFOCOM, pp. 246-250, 2008.
    • (2008) Proc. IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5
  • 33
    • 84870399822 scopus 로고    scopus 로고
    • The Network Simulator-ns-2
    • "The Network Simulator-ns-2," http://nsnam.isi.edu/nsnam/index. php/User Information, 2012.
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.