Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture
Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Secure communications for cluster-based ad hoc networks using node identities
Journal of Network and Computer Applications
POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS
IEEE Wireless Communications
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
The quest for personal control over mobile location privacy
IEEE Communications Magazine
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET
Information Security Applications
A security framework with strong non-repudiation and privacy in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
Journal of Network and Computer Applications
Security in vehicular adhoc networks: a survey
Proceedings of the 2011 International Conference on Communication, Computing & Security
On the security enhancement of an efficient and secure event signature protocol for p2p MMOGs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part I
Security and Communication Networks
Information Sciences: an International Journal
Unified security architecture and protocols using third party identity in V2V and V2I networks
Wireless Communications & Mobile Computing
A Distributed Secure Architecture for Vehicular Ad Hoc Networks
International Journal of Business Data Communications and Networking
Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
Multimedia Tools and Applications
Efficient communication scheme with confidentiality and privacy for vehicular networks
Computers and Electrical Engineering
A Secure Ambulance Communication Protocol for VANET
Wireless Personal Communications: An International Journal
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
Wireless Personal Communications: An International Journal
Prevention of DoS Attacks in VANET
Wireless Personal Communications: An International Journal
Mutual authentication in self-organized VANETs
Computer Standards & Interfaces
An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks
Computers and Electrical Engineering
Hi-index | 0.24 |
Privacy and security should be paid much more attention in secure vehicular ad hoc networks (VANETs). However, as far as we know, few researches on secure VANET protocols have addressed both the privacy issues and authenticated key establishment. Therefore, in this work, a lightweight authenticated key establishment scheme with privacy preservation to secure the communications between mobile vehicles and roadside infrastructure in a VANET is proposed, which is called SECSPP. Our proposed scheme not only accomplishes vehicle-to-vehicle and vehicle-to-roadside infrastructure authentication and key establishment for communication between members, but also integrates blind signature techniques into the scheme in allowing mobile vehicles to anonymously interact with the services of roadside infrastructure. We also show that our scheme is efficient in its implementation on mobile vehicles in comparison with other related proposals.