Kerberos: a network authentication system
Kerberos: a network authentication system
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Balancing auditability and privacy in vehicular networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Vehicle Ad Hoc networks: applications and related technical issues
IEEE Communications Surveys & Tutorials
TSVC: timed efficient and secure vehicular communications with privacy preserving
IEEE Transactions on Wireless Communications - Part 1
A tutorial survey on vehicular ad hoc networks
IEEE Communications Magazine
Hi-index | 0.00 |
Message authentication that ensures a message is genuine and verifies the source of the sender is a key issue in vehicular ad hoc networks (VANETs). Because messages may provide life-critical traffic information or emergency messages transmitted by unfamiliar sources. Because the vehicle in a VANET transmits messages in real-time in a high-mobility environment, traditional PKI security schemes are not suitable for VANET. The use of roadside units (RSUs) makes message authentication in VANET easy, but it also causes two problems and needed to be solved: how to authenticate messages transmitted between two different RSU ranges, and how to hand off messages for the vehicles moving across different RSU communication ranges. This paper proposes a comprehensive message authentication scheme that enables the message authentication within intra and between inter RSU ranges and hand-off between different RSUs. The proposed scheme balances the overhead for computation and communication with security against attacks. Efficiency analysis and comparison with related works demonstrate that the proposed scheme is a superior message authentication method for VANET.