메뉴 건너뛰기




Volumn 64, Issue 8, 2015, Pages 3697-3710

Message authentication using proxy vehicles in vehicular ad hoc networks

Author keywords

Key negotiation; privacy preservation; proxy vehicle; proxybased authentication; vehicular ad hoc network (VANET)

Indexed keywords

AD HOC NETWORKS; AMPHIBIOUS VEHICLES; AUTHENTICATION; COMPUTATIONAL EFFICIENCY; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; TELECOMMUNICATION NETWORKS; VEHICLES;

EID: 84939444130     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2014.2358633     Document Type: Article
Times cited : (159)

References (40)
  • 1
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • Jan.
    • M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, Jan. 2007.
    • (2007) J. Comput. Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 2
    • 84892424414 scopus 로고    scopus 로고
    • VSPN: VANET-based secure and privacy-preserving navigation
    • Feb.
    • T. W. Chim, S. M. Yiu, C. K. Hui, and O. K. Li, "VSPN: VANET-based secure and privacy-preserving navigation," IEEE Trans. Comput., vol. 63, no. 2, pp. 510-524, Feb. 2014.
    • (2014) IEEE Trans. Comput. , vol.63 , Issue.2 , pp. 510-524
    • Chim, T.W.1    Yiu, S.M.2    Hui, C.K.3    Li, O.K.4
  • 3
    • 77956926901 scopus 로고    scopus 로고
    • Security attacks and solutions for vehicular ad hoc networks
    • Apr.
    • J. T. Isaac, S. Zeadally, and J. S. Camara, "Security attacks and solutions for vehicular ad hoc networks," IET Commun., vol. 4, no. 7, pp. 894-903, Apr. 2010.
    • (2010) IET Commun. , vol.4 , Issue.7 , pp. 894-903
    • Isaac, J.T.1    Zeadally, S.2    Camara, J.S.3
  • 4
    • 84870443892 scopus 로고    scopus 로고
    • Vehicular ad hoc networks (VANETS): Status, results, challenges
    • Aug.
    • S. Zeadally, R. Hunt, Y. S. Chen, A. Irwin, and A. Hassan, "Vehicular ad hoc networks (VANETS): Status, results, challenges," Telecommun. Syst., vol. 50, no. 4, pp. 217-241, Aug. 2012.
    • (2012) Telecommun. Syst. , vol.50 , Issue.4 , pp. 217-241
    • Zeadally, S.1    Hunt, R.2    Chen, Y.S.3    Irwin, A.4    Hassan, A.5
  • 5
    • 74549134073 scopus 로고    scopus 로고
    • Flexible, extensible, efficient VANET authentication
    • Dec.
    • A. Studer, F. Bai, B. Bellur, and A. Perrig, "Flexible, extensible, efficient VANET authentication," J. Commun. Netw., vol. 11, no. 6, pp. 574-588, Dec. 2009.
    • (2009) J. Commun. Netw. , vol.11 , Issue.6 , pp. 574-588
    • Studer, A.1    Bai, F.2    Bellur, B.3    Perrig, A.4
  • 6
    • 57049129831 scopus 로고    scopus 로고
    • An efficient message authentication scheme for vehicular communications
    • Nov.
    • C. Zhang, X. Lin, R. Lu, P. Ho, and X. Shen, "An efficient message authentication scheme for vehicular communications," IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357-3368, Nov. 2008.
    • (2008) IEEE Trans. Veh. Technol. , vol.57 , Issue.6 , pp. 3357-3368
    • Zhang, C.1    Lin, X.2    Lu, R.3    Ho, P.4    Shen, X.5
  • 7
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
    • (2008) Proc. IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.4    Shen, X.5
  • 8
    • 84939459513 scopus 로고    scopus 로고
    • Dedicated Short Range Commun. (DSRC)
    • Dedicated Short Range Commun. (DSRC). [Online]. Available: http:// standards.ieee.org/develop/wg/1609-WG.html
  • 10
    • 78751657441 scopus 로고    scopus 로고
    • ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
    • Jan.
    • J. L. Huang, L. Y. Yeh, and H. Y. Chien, "ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248-262, Jan. 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.60 , Issue.1 , pp. 248-262
    • Huang, J.L.1    Yeh, L.Y.2    Chien, H.Y.3
  • 11
    • 84887266426 scopus 로고    scopus 로고
    • B-SPECS+: Batch verification for secure pseudonymous authentication in VANET
    • Nov.
    • S. J. Horng et al., "b-SPECS+: Batch verification for secure pseudonymous authentication in VANET," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1860-1875, Nov. 2013.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1860-1875
    • Horng, S.J.1
  • 12
    • 84861148363 scopus 로고    scopus 로고
    • CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
    • May
    • K. A. Shim, "CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks," IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1874-1883, May 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.4 , pp. 1874-1883
    • Shim, K.A.1
  • 13
    • 84868122743 scopus 로고    scopus 로고
    • A rapid certification protocol from bilinear pairing for vehicular ad hoc networks
    • X. Li and L. Wang, "A rapid certification protocol from bilinear pairing for vehicular ad hoc networks," in Proc. IEEE Conf. TrustCOM, 2012, pp. 890-895.
    • (2012) Proc. IEEE Conf. TrustCOM , pp. 890-895
    • Li, X.1    Wang, L.2
  • 14
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • Aug.
    • D. Johnson and A. Menezes, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, Aug. 2001.
    • (2001) Int. J. Inf. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2
  • 15
    • 77949831002 scopus 로고    scopus 로고
    • Analysis of ECDSA authentication processing in VANETs
    • J. Petit, "Analysis of ECDSA authentication processing in VANETs," in Proc. IEEE Conf. NTMS, 2009, vol. 1, pp. 1-5.
    • (2009) Proc. IEEE Conf. NTMS , vol.1 , pp. 1-5
    • Petit, J.1
  • 16
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • A. Perring, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. NDSS, 2001, pp. 35-46.
    • (2001) Proc. NDSS , pp. 35-46
    • Perring, A.1    Canetti, R.2    Song, D.3    Tygar, D.4
  • 19
    • 84855615935 scopus 로고    scopus 로고
    • On batch verification with group testing for vehicular communications
    • Nov.
    • C. Zhang, P. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Netw., vol. 17, no. 8, pp. 1851-1865, Nov. 2011.
    • (2011) Wireless Netw. , vol.17 , Issue.8 , pp. 1851-1865
    • Zhang, C.1    Ho, P.2    Tapolcai, J.3
  • 20
    • 77957259997 scopus 로고    scopus 로고
    • SPECS: Secure and privacy enhancing communications schemes for VANETs
    • T. W. Chim, S. M. Yiu, C. K. Hui, and O. K. Li, "SPECS: Secure and privacy enhancing communications schemes for VANETs," Ad Hoc Netw., vol. 12, pp. 189-203, 2011.
    • (2011) Ad Hoc Netw. , vol.12 , pp. 189-203
    • Chim, T.W.1    Yiu, S.M.2    Hui, C.K.3    Li, O.K.4
  • 21
    • 77958084781 scopus 로고    scopus 로고
    • Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks]
    • Oct.
    • A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks]," IEEE Wireless Commun., vol. 17, no. 5, pp. 22-28, Oct. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.5 , pp. 22-28
    • Wasef, A.1    Lu, R.2    Lin, X.3    Shen, X.4
  • 23
    • 70450180562 scopus 로고    scopus 로고
    • EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks
    • Nov.
    • A. Wasef and X. Shen, "EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 58, no. 9, pp. 5214-5224, Nov. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.9 , pp. 5214-5224
    • Wasef, A.1    Shen, X.2
  • 24
    • 77249177167 scopus 로고    scopus 로고
    • DCS: An efficient distributedcertificate-service scheme for vehicular networks
    • Feb.
    • A. Wasef, Y. Jiang, and X. Shen, "DCS: An efficient distributedcertificate-service scheme for vehicular networks," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 533-549, Feb. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.2 , pp. 533-549
    • Wasef, A.1    Jiang, Y.2    Shen, X.3
  • 25
    • 84870429369 scopus 로고    scopus 로고
    • EMAP: Expedite message authentication protocol for vehicular ad hoc networks
    • Jan.
    • A.Wasef and X. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks," IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
    • (2010) IEEE Trans. Mobile Comput. , vol.12 , Issue.1 , pp. 78-89
    • Wasef, A.1    Shen, X.2
  • 26
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
    • Jan.
    • R. Lu, X. Lin, and H. Luan, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, H.3
  • 27
    • 77956735087 scopus 로고    scopus 로고
    • An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
    • Sep.
    • Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications," IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.7 , pp. 3589-3603
    • Sun, Y.1    Lu, R.2    Lin, X.3    Shen, X.4    Su, J.5
  • 28
    • 63749115331 scopus 로고    scopus 로고
    • A security framework with strong non-repudiation and privacy in VANETs
    • J. Choi and S. Jung, "A security framework with strong non-repudiation and privacy in VANETs," in Proc. IEEE Conf. CCNC, 2009, pp. 1-5.
    • (2009) Proc. IEEE Conf. CCNC , pp. 1-5
    • Choi, J.1    Jung, S.2
  • 29
    • 84884179626 scopus 로고    scopus 로고
    • A lightweight conditional privacypreservation protocol for vehicular traffic-monitoring systems
    • May/Jun.
    • R. Lu, X. Lin, Z. Shi, and X. Shen, "A lightweight conditional privacypreservation protocol for vehicular traffic-monitoring systems," IEEE Intell. Syst., vol. 28, no. 3, pp. 62-65, May/Jun. 2013.
    • (2010) IEEE Intell. Syst. , vol.28 , Issue.3 , pp. 62-65
    • Lu, R.1    Lin, X.2    Shi, Z.3    Shen, X.4
  • 30
    • 84896875258 scopus 로고    scopus 로고
    • Efficient privacy-preserving authentication for vehicular ad hoc networks
    • Feb.
    • X. Zhu, S. Jiang, L. Wang, and H. Li, "Efficient privacy-preserving authentication for vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 63, no. 2, pp. 907-919, Feb. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.2 , pp. 907-919
    • Zhu, X.1    Jiang, S.2    Wang, L.3    Li, H.4
  • 31
    • 67249143973 scopus 로고    scopus 로고
    • A secure VANET MAC protocol for DSRC applications
    • Y. Qian, K. Lu, and N. Moayeri, "A secure VANET MAC protocol for DSRC applications," in Proc. IEEE GLOBECOM, 2008, pp. 1-5.
    • (2008) Proc. IEEE GLOBECOM , pp. 1-5
    • Qian, Y.1    Lu, K.2    Moayeri, N.3
  • 32
    • 78650369686 scopus 로고    scopus 로고
    • Security analysis of vehicular ad hoc networks (VANET)
    • G. Samara, W. A. H. A. Salihy, and R. Sures, "Security analysis of vehicular ad hoc networks (VANET)," in Proc. IEEE Conf. NETAPPS, 2010, pp. 55-60.
    • Proc. IEEE Conf. NETAPPS , vol.2010 , pp. 55-60
    • Samara, G.1    Salihy, W.A.H.A.2    Sures, R.3
  • 33
    • 70350785887 scopus 로고    scopus 로고
    • Report on the "secure vehicular communications: Results and challenges ahead" workshop"
    • P. Papadimitratos and J. P. Hubaux, "Report on the "secure vehicular communications: Results and challenges ahead" workshop," ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 12, no. 2, 2008.
    • (2008) ACM SIGMOBILE Mobile Comput. Commun. Rev. , vol.12 , Issue.2
    • Papadimitratos, P.1    Hubaux, J.P.2
  • 35
    • 84877842588 scopus 로고    scopus 로고
    • Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols
    • May
    • S. Dietzel, J. Petit, G. Heijenk, and F. Kargl, "Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols," IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1505-1518, May 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.4 , pp. 1505-1518
    • Dietzel, S.1    Petit, J.2    Heijenk, G.3    Kargl, F.4
  • 37
    • 47749095986 scopus 로고    scopus 로고
    • Design of secure and application-oriented VANETs
    • Y. Qian and N. Moayeri, "Design of secure and application-oriented VANETs," in Proc. IEEE VTC Spring 2008, 2008, pp. 2794-2799.
    • (2008) Proc. IEEE VTC Spring 2008 , pp. 2794-2799
    • Qian, Y.1    Moayeri, N.2
  • 38
    • 84884387687 scopus 로고    scopus 로고
    • Achieving efficient cooperative message authentication in vehicular ad hoc networks
    • Sep.
    • X. Lin and X. Li, "Achieving efficient cooperative message authentication in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 62, pp. 3339-3348, Sep. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , pp. 3339-3348
    • Lin, X.1    Li, X.2
  • 39
    • 84939433021 scopus 로고    scopus 로고
    • The Network Simulator NS-2. [Online]
    • The Network Simulator NS-2. [Online]. Available: http://www.isi.edu/ nsnam/ns
  • 40
    • 84939453613 scopus 로고    scopus 로고
    • VanetMobiSim Project Home Page
    • VanetMobiSim Project Home Page. [Online]. Available: http://vanet. eurecom.fr


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.