메뉴 건너뛰기




Volumn 62, Issue 5, 2013, Pages 2182-2192

A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs

Author keywords

Access categories; authentication; elliptic curve digital signature algorithm (ECDSA); enhanced distributed channel access (EDCA); identity based (ID based) signature; IEEE 802.11p

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; MEDIUM ACCESS CONTROL; STANDARDS; VEHICULAR AD HOC NETWORKS;

EID: 84879136091     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2013.2238566     Document Type: Article
Times cited : (75)

References (29)
  • 1
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Santa Barbara, CA, USA, Aug
    • T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms, " in Proc. CRYPTO, Santa Barbara, CA, USA, Aug. 1985, pp. 10-18.
    • (1985) Proc. CRYPTO , pp. 10-18
    • El Gamal, T.1
  • 2
    • 0003735739 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • Mississauga, ON, Canada, Tech. Rep Aug
    • D. Johnson and A. Menezes, "The elliptic curve digital signature algorithm (ECDSA), " Certicom, Mississauga, ON, Canada, Tech. Rep., Aug. 1999.
    • (1999) Certicom
    • Johnson, D.1    Menezes, A.2
  • 3
    • 84879146717 scopus 로고    scopus 로고
    • IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)-Security Services for Applications and Management Messages, IEEE Std. 1609. 2, Jul. 2006
    • IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)-Security Services for Applications and Management Messages, IEEE Std. 1609. 2, Jul. 2006.
  • 4
    • 0003508562 scopus 로고    scopus 로고
    • Nat. Inst. Stand. Technol., Washington, DC, Fed. Inf. Process. Std. 1862. [Online]. Available
    • Digital Signature Standard (DSS), Nat. Inst. Stand. Technol., Washington, DC, 2000, Fed. Inf. Process. Std. 1862. [Online]. Available: http://csrc. nist. gov/publications/fips/
    • (2000) Digital Signature Standard (DSS)
  • 5
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cirencester, U. K., Dec
    • C. Cocks, "An identity based encryption scheme based on quadratic residues, " in Proc. IMA Int. Conf., Cirencester, U. K., Dec. 2001, pp. 360-363.
    • (2001) Proc. IMA Int. Conf , pp. 360-363
    • Cocks, C.1
  • 6
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Aug. , Lecture Notes in Computer Science
    • F. Hess, "Efficient identity based signature schemes based on pairings, " in Proc. Revised Papers 9th Annu. Int. Workshop Sel. Areas Cryptograph., Aug. 2003, vol. 2595, pp. 310-324, Lecture Notes in Computer Science.
    • (2003) Proc. Revised Papers 9th Annu. Int. Workshop Sel. Areas Cryptograph , vol.2595 , pp. 310-324
    • Hess, F.1
  • 11
    • 77956735087 scopus 로고    scopus 로고
    • An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
    • Sep
    • Y. Sun, R. Lu, X. Lin, X. S. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.7 , pp. 3589-3603
    • Sun, Y.1    Lu, R.2    Lin, X.3    Shen, X.S.4    Su, J.5
  • 12
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
    • Phoenix, AZ, USA, Apr
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications, " in Proc. 27th IEEE INFOCOM, Phoenix, AZ, USA, Apr. 2008, pp. 1229-1237.
    • (2008) Proc. 27th IEEE INFOCOM , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5
  • 13
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacypreserving protocol for vehicular communications
    • Nov
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications, " IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
    • (2007) IEEE Trans. Veh. Technol. , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 14
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol, " CryptoBytes, vol. 5, no. 2, pp. 2-13, Summer 2002.
    • (2002) CryptoBytes , vol.5 , Issue.2 SUMMER , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 15
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing, " SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 16
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Santa Barbara, CA, USA, Aug. , LNCS series
    • D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures, " in Proc. 24th Annu. Int. CRYPTO, Santa Barbara, CA, USA, Aug. 2004, pp. 41-55, LNCS series.
    • (2004) Proc. 24th Annu. Int. CRYPTO , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 18
    • 77955406142 scopus 로고    scopus 로고
    • On resource-aware message verification in vanets
    • Cape Town, South Africa, May
    • Z. Li and C. Chigan, "On Resource-Aware Message Verification in VANETs, " in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 2010, pp. 1-6.
    • (2010) Proc. IEEE Int. Conf. Commun , pp. 1-6
    • Li, Z.1    Chigan, C.2
  • 19
    • 67349168446 scopus 로고    scopus 로고
    • BAT: A robust signature scheme for vehicular networks using binary authentication tree
    • Apr
    • Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A robust signature scheme for vehicular networks using binary authentication tree, " IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1974-1983, Apr. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 20
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identitybased batch verification scheme for vehicular sensor networks
    • Phoenix, AZ, Apr
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks, " in Proc. 27th IEEE INFOCOM, Phoenix, AZ, Apr. 2008, pp. 246-250.
    • (2008) Proc. 27th IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5
  • 21
    • 38049081057 scopus 로고    scopus 로고
    • Fast batch verification of multiple signatures
    • Beijing, China, Apr
    • J. H. Cheon and J. H. Yi, "Fast batch verification of multiple signatures, " in Proc. 10th Int. Conf. Pract. Theory PKC, Beijing, China, Apr. 2007, pp. 442-457.
    • (2007) Proc. 10th Int. Conf. Pract. Theory PKC , pp. 442-457
    • Cheon, J.H.1    Yi, J.H.2
  • 22
    • 48649088209 scopus 로고    scopus 로고
    • A group signature based secure and privacy-preserving vehicular communication framework
    • Anchorage, AK, USA, May
    • J. Guo, J. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework, " in Proc. Mobile Netw. Veh. Environ., Anchorage, AK, USA, May 2007, pp. 103-108.
    • (2007) Proc. Mobile Netw. Veh. Environ , pp. 103-108
    • Guo, J.1    Baugh, J.2    Wang, S.3
  • 23
    • 77249157951 scopus 로고    scopus 로고
    • Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
    • Feb
    • Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications, " IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, Feb. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.2 , pp. 559-573
    • Wu, Q.1    Domingo-Ferrer, J.2    Gonzalez-Nicolas, U.3
  • 25
    • 84877664124 scopus 로고    scopus 로고
    • DDoS attack on WAVE-enabled VANET through synchronization
    • Dec
    • S. Biswas, J. Misic, and V. Misic, "DDoS attack on WAVE-enabled VANET through synchronization, " in Proc. IEEE GLOBECOM, Dec. 2012, pp. 1-6.
    • (2012) Proc. IEEE GLOBECOM , pp. 1-6
    • Biswas, S.1    Misic, J.2    Misic, V.3
  • 26
    • 84879168930 scopus 로고    scopus 로고
    • NIST: National Institute of Standards and Technology
    • NIST: National Institute of Standards and Technology, 2011. [Online]. Available: http://www.nist. gov/index. html
    • (2011)
  • 27
    • 80052406758 scopus 로고    scopus 로고
    • ID-based safety message authentication for security and trust in vehicular networks
    • Minneapolis, MN, USA, Jun
    • S. Biswas, J. Misic, and V. Misic, "ID-based safety message authentication for security and trust in vehicular networks, " in Proc. 31st ICDCSW, Minneapolis, MN, USA, Jun. 2011, pp. 323-331.
    • (2011) Proc. 31st ICDCSW , pp. 323-331
    • Biswas, S.1    Misic, J.2    Misic, V.3
  • 29
    • 34250668863 scopus 로고    scopus 로고
    • Approximately detecting duplicates for streaming data using stable bloom filters
    • Jun
    • F. Deng and D. Rafiei, "Approximately detecting duplicates for streaming data using stable bloom filters, " in Proc. ACM SIGMOD Int. Conf. Manage. Data, Jun. 2006, pp. 25-36.
    • (2006) Proc. ACM SIGMOD Int. Conf. Manage. Data , pp. 25-36
    • Deng, F.1    Rafiei, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.