메뉴 건너뛰기




Volumn 17, Issue 8, 2016, Pages 2193-2204

An efficient anonymous batch authentication scheme based on HMAC for VANETs

Author keywords

Certificate Revocation Lists (CRLs); hash message authentication code (HMAC); privacy preserving authentication; pseudonym; vehicular ad hoc networks (VANETs)

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; TELECOMMUNICATION NETWORKS;

EID: 84959900865     PISSN: 15249050     EISSN: None     Source Type: Journal    
DOI: 10.1109/TITS.2016.2517603     Document Type: Article
Times cited : (239)

References (33)
  • 1
    • 84881591357 scopus 로고    scopus 로고
    • A conditional privacy scheme based on anonymized batch authentication in vehicular ad hoc networks
    • S. Jiang, X. Zhu, and L. Wang, "A conditional privacy scheme based on anonymized batch authentication in vehicular ad hoc networks, " in Proc. IEEE Int. WCNC, 2013, pp. 2375-2380
    • (2013) Proc. IEEE Int. WCNC , pp. 2375-2380
    • Jiang, S.1    Zhu, X.2    Wang, L.3
  • 2
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identitybased batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identitybased batch verification scheme for vehicular sensor networks, " in Proc. the 27th IEEE Conf. INFOCOM., 2008, pp. 246-250
    • (2008) Proc the 27th IEEE Conf. INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.5
  • 3
    • 77956735087 scopus 로고    scopus 로고
    • An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
    • Sep
    • Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010
    • (2010) IEEE Trans. Veh. Technol , vol.59 , Issue.7 , pp. 3589-3603
    • Sun, Y.1    Lu, R.2    Lin, X.3    Shen, X.4    Su, J.5
  • 4
  • 6
    • 35348977820 scopus 로고    scopus 로고
    • Eviction of misbehaving, and faulty nodes in vehicular networks
    • Oct
    • M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J. P. Hubaux, "Eviction of misbehaving, and faulty nodes in vehicular networks, " IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, Oct. 2007
    • (2007) IEEE J. Sel. Areas Commun , vol.25 , Issue.8 , pp. 1557-1568
    • Raya, M.1    Papadimitratos, P.2    Aad, I.3    Jungels, D.4    Hubaux, J.P.5
  • 7
    • 84870429369 scopus 로고    scopus 로고
    • Expedite message authentication protocol for vehicular ad hoc networks
    • Jan
    • A. Wasef, and X. Shen, "Expedite message authentication protocol for vehicular ad hoc networks, " IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013
    • (2013) IEEE Trans. Mobile Comput , vol.12 , Issue.1 , pp. 78-89
    • Wasef, A.1    Shen, X.2
  • 8
    • 84980542813 scopus 로고    scopus 로고
    • Secure network discovery using expedite message authentication in vanet
    • N. H. Ashwini, and S. U. Anand, "Secure network discovery using expedite message authentication in vanet, " Int. J. Comput. Technol., vol. 1, no. 5, pp. 162-169, 2014
    • (2014) Int. J. Comput. Technol , vol.1 , Issue.5 , pp. 162-169
    • Ashwini, N.H.1    Anand, S.U.2
  • 9
    • 84896875258 scopus 로고    scopus 로고
    • Efficient privacy-preserving authentication for vehicular ad hoc networks
    • Feb
    • X. Zhu, S. Jiang, L. Wang, and H. Li, "Efficient privacy-preserving authentication for vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 63, no. 2, pp. 907-919, Feb. 2014
    • (2014) IEEE Trans. Veh. Technol , vol.63 , Issue.2 , pp. 907-919
    • Zhu, X.1    Jiang, S.2    Wang, L.3    Li, H.4
  • 10
    • 78751657441 scopus 로고    scopus 로고
    • ABAKA: An anonymous batch authenticated, and key agreement scheme for value-added services in vehicular ad hoc networks
    • Jan
    • J. L. Hunag, L. Y. Yeh, and H. Y. Chien, "ABAKA: An anonymous batch authenticated, and key agreement scheme for value-added services in vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248-262, Jan. 2011
    • (2011) IEEE Trans. Veh. Technol , vol.60 , Issue.1 , pp. 248-262
    • Hunag, J.L.1    Yeh, L.Y.2    Chien, H.Y.3
  • 11
    • 84861148363 scopus 로고    scopus 로고
    • An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
    • May
    • K. A. Shim, "An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks, " IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1874-1883, May 2012
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.4 , pp. 1874-1883
    • Shim, K.A.1
  • 13
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • Jul
    • M. Raya, and J.-P. Hubaux, "Securing vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 15, no. 1, pp. 39-68, Jul. 2007
    • (2007) IEEE Trans. Veh. Technol , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 14
    • 84873898187 scopus 로고    scopus 로고
    • A framework for secure, and efficient data acquisition in vehicular ad hoc networks
    • Feb
    • K. Mershad, and H. Artail, "A framework for secure, and efficient data acquisition in vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 62, no. 2, pp. 536-551, Feb. 2013
    • (2013) IEEE Trans. Veh. Technol , vol.62 , Issue.2 , pp. 536-551
    • Mershad, K.1    Artail, H.2
  • 15
    • 84905909526 scopus 로고    scopus 로고
    • A proxy-based authentication, and billing scheme with incentive-aware multihop forwarding for vehicular networks
    • Aug
    • L. Y. Yeh, and Y. C. Lin, "A proxy-based authentication, and billing scheme with incentive-aware multihop forwarding for vehicular networks, " IEEE Trans. Intell. Transp. Syst., vol. 15, no. 4, pp. 1607-1621, Aug. 2014
    • (2014) IEEE Trans. Intell. Transp. Syst , vol.15 , Issue.4 , pp. 1607-1621
    • Yeh, L.Y.1    Lin, Y.C.2
  • 16
    • 48649088209 scopus 로고    scopus 로고
    • A group signature based secure, and privacy-preserving vehicular communication framework
    • J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure, and privacy-preserving vehicular communication framework, " in Proc. Mobile Netw. Veh. Environ., 2007, pp. 103-108
    • (2007) Proc. Mobile Netw. Veh. Environ , pp. 103-108
    • Guo, J.1    Baugh, J.P.2    Wang, S.3
  • 17
    • 38549175291 scopus 로고    scopus 로고
    • Secure vehicular communications based on group signature, and id-based ignature scheme
    • X. Sun, X. Lin, and P.-H. Ho, "Secure vehicular communications based on group signature, and id-based ignature scheme, " in Proc. IEEE ICC, 2007, pp. 1539-1545
    • (2007) Proc. IEEE ICC , pp. 1539-1545
    • Sun, X.1    Lin, X.2    Ho, P.-H.3
  • 18
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure, and privacypreserving protocol for vehicular communications
    • Nov
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure, and privacypreserving protocol for vehicular communications, " IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007
    • (2007) IEEE Trans. Veh. Technol , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 19
    • 67249115377 scopus 로고    scopus 로고
    • Distributed key management with protection against rsu compromise in group signature based vanets
    • Y. Hao, Y. Cheng, and K. Ren, "Distributed key management with protection against rsu compromise in group signature based vanets, " in Proc. IEEE GLOBECOM, 2008, pp. 1-5
    • (2008) Proc. IEEE GLOBECOM , pp. 1-5
    • Hao, Y.1    Cheng, Y.2    Ren, K.3
  • 20
    • 84864372342 scopus 로고    scopus 로고
    • A lightweight privacypreserving protocol using chameleon hashing for secure vehicular communications
    • A.-N. Shen, S. Guo, D. Zeng, and M. Guizani, "A lightweight privacypreserving protocol using chameleon hashing for secure vehicular communications, " in Proc. IEEE Int. Conf. WCNC, 2012, pp. 2543-2548
    • (2012) Proc. IEEE Int. Conf. WCNC , pp. 2543-2548
    • Shen, A.-N.1    Guo, S.2    Zeng, D.3    Guizani, M.4
  • 21
    • 80052372468 scopus 로고    scopus 로고
    • PACP: An efficient pseudonymous authentication-based conditional privacy protocol for vanets
    • Sep
    • D. Huang, S. Misra, M. Verma, and G. Xue, "PACP: An efficient pseudonymous authentication-based conditional privacy protocol for vanets, " IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 736-746, Sep. 2011
    • (2011) IEEE Trans. Intell. Transp. Syst , vol.12 , Issue.3 , pp. 736-746
    • Huang, D.1    Misra, S.2    Verma, M.3    Xue, G.4
  • 22
    • 74549134073 scopus 로고    scopus 로고
    • Flexible, extensible, and efficient vanet authentication
    • A. Studer, F. Bai, B. Bellur, and A. Perrig, "Flexible, extensible, and efficient vanet authentication, " J. Commun. Netw., vol. 11, no. 6, pp. 574-588, 2009
    • (2009) J. Commun. Netw , vol.11 , Issue.6 , pp. 574-588
    • Studer, A.1    Bai, F.2    Bellur, B.3    Perrig, A.4
  • 25
    • 0348003132 scopus 로고    scopus 로고
    • The state of elliptic curve cryptography
    • N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography, " Des., Codes Cryptography, vol. 19, no. 2, pp. 173-193, 2000
    • (2000) Des., Codes Cryptography , vol.19 , Issue.2 , pp. 173-193
    • Koblitz, N.1    Menezes, A.2    Vanstone, S.3
  • 26
    • 77950023367 scopus 로고    scopus 로고
    • Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
    • Aug
    • R. Dutta, S. Mukhopadhyay, and M. Collier, "Computationally secure self-healing key distribution with revocation in wireless ad hoc networks, " Ad hoc Netw., vol. 8, no. 6, pp. 597-613, Aug. 2010
    • (2010) Ad Hoc Netw , vol.8 , Issue.6 , pp. 597-613
    • Dutta, R.1    Mukhopadhyay, S.2    Collier, M.3
  • 27
    • 57049129831 scopus 로고    scopus 로고
    • An efficient message authentication scheme for vehicular communications
    • Nov
    • C. Zhang, X. Lin, P.-H. H. R. Lu, and X. Shen, "An efficient message authentication scheme for vehicular communications, " IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357-3368, Nov. 2008
    • (2008) IEEE Trans. Veh. Technol , vol.57 , Issue.6 , pp. 3357-3368
    • Zhang, C.1    Lin, X.2    Lu, P.-H.H.R.3    Shen, X.4
  • 28
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate, and verifiably encrypted signatures from bilinear maps
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate, and verifiably encrypted signatures from bilinear maps, " Lecture Notes Comput. Sci., vol. 2656, pp. 416-432, 2003
    • (2003) Lecture Notes Comput. Sci , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 32
    • 84855615935 scopus 로고    scopus 로고
    • On batch verification with group testing for vehicular communications
    • Nov
    • C. Zhang, P.-H. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications, " Wireless Netw., vol. 17, no. 8, pp. 1851-1865, Nov. 2011
    • (2011) Wireless Netw , vol.17 , Issue.8 , pp. 1851-1865
    • Zhang, C.1    Ho, P.-H.2    Tapolcai, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.