Research on Identity-based Batch Anonymous Authentication Scheme for VANET |
Song, Cheng
(School of Computer Science and Technology, Henan Polytechnic University)
Gu, Xinan (School of Computer Science and Technology, Henan Polytechnic University) Wang, Lei (School of Computer Science and Technology, Henan Polytechnic University) Liu, Zhizhong (School of Computer Science and Technology, Henan Polytechnic University) Ping, Yuan (School of Information Engineering, Xuchang University) |
1 | R G Engoulou, M Bellaiche, S Pierre and A Quintero, "VANET security surveys," Computer Communications ,vol.44, pp. 1-13, 2014. DOI |
2 | X Liu, Z Fang, L Shi. "Securing Vehicular Ad Hoc Networks," International Conference on Pervasive Computing & Applications, July.2007. |
3 | D He, S Zeadally, B Xu and X Huang, "An Efficient Identity-Based Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics & Security, vol. 10, no. 12, pp. 2681-2691, Dec. 2015. DOI |
4 | J K Liu, T H Yuen, M H Au and W Susilo. "Improvements on an authentication scheme for vehicular sensor networks," Expert Systems with Applications, vol. 41, no. 5, pp. 2559-2564, April. 2014. DOI |
5 | J Whitefield, L Chen, T Giannetsos, S Schneider and H Treharne, "Privacy-enhanced capabilities for VANETs using direct anonymous attestation," Vehicular Networking Conference, pp. 123-130, Feb. 2018. |
6 | Y Wang, H Zhong, Y Xu, J Cui and F Guo. "Efficient extensible conditional privacy preserving authentication scheme supporting batch verification for VANETs," International Journal of Network Security, vol. 9, no. 18, pp. 5460-5471, 2016. |
7 | C L Chen, J Shin, Y T Tsai, A Castiglione and F Palmieri, "Securing Information Exchange in VANETs by Using Pairing-Based Cryptography," International Journal of Foundations of Computer Science, vol. 28, no. 6, pp. 781-797, 2017. DOI |
8 | C Zhang, R Lu, X Lin, P H Ho and X Shen, "An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks," in Proc. of IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246-250, 2008. |
9 | M Raya, J P Hubaux, "The security of vehicular ad hoc networks," in Proc. of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 11-21, Nov. 2005. |
10 | X Lin, X Sun, P H Ho and X Shen, "GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications," IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007. DOI |
11 | C Zhang, P H Ho and J Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Networks, vol. 17, no. 8, pp. 1851-1865, Nov. 2011. DOI |
12 | J Sun, C Zhang, Y Zhang and Y Fang, "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Transactions on Parallel & Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Jan. 2010. DOI |
13 | C C Lee, Y M Lai. "Toward a secure batch verification with group testing for VANET," Wireless Networks, vol. 19, no. 6, pp. 1441-1449, Jan. 2013. DOI |
14 | M Bayat, M Barmshoory, M Rahimi and M R Aref, "A secure authentication scheme for VANETs with batch verification," Wireless Networks, vol. 21, no. 5, pp. 1-11, Dec. 2014. DOI |
15 | Y Liu, Z He, S Zhao and L Wang, "An efficient anonymous authentication protocol using batch operations for VANETs," Multimedia Tools & Applications, vol. 75, no. 24, pp. 17689-17709 , Jun. 2016. DOI |
16 | F Brezing, A Weng, "Elliptic Curves Suitable for Pairing Based Cryptography," Designs Codes & Cryptography, vol. 37, no. 1, pp. 133-141, Oct. 2005. DOI |
17 | M Azees, P Vijayakumar and L J Deboarh, "EAAP: Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular AdHoc Networks," IEEE Transactionson Intelligent Transportation Systems, vol. 18, no. 9, pp. 1-10, Feb. 2017. DOI |
18 | P Vijayakumara, V Changb, L J Deboraha, B Balusamy and P G Shynu, "Computationally Efficient Privacy Preserving Anonymous Mutual and Batch Authentication Schemes for Vehicular Ad Hoc Networks," Future Generation Computer Systems, vol 78, pp. 943-955, Jan. 2018. DOI |
19 | S H Islam, M S Obaidat, P Vijayakumar, E Abdulhay, F Li and M K C Reddy, "A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs," Future Generation Computer Systems, vol 84, pp. 216-227, July. 2018. DOI |
20 | A Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Proc. of Workshop on the theory and application of cryptographic techniques, vol.196, no. 2, pp. 47-53, Aug. 1984. |
21 | L Chen, J Malone-Lee, "Improved identity-based signcryption," in Proc. of International Workshop on Public Key Cryptography, pp. 362-379, Jan. 2005. |
22 | Z Tong, H Lu, M Haenggi and C Poellabaure, "A Stochastic Geometry Approach to theModeling of DSRC for Vehicular Safety Communication," IEEE Trans-actions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1448-1458, Feb. 2016. DOI |