[go: up one dir, main page]

Zhang et al., 2008 - Google Patents

RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks

Zhang et al., 2008

View PDF
Document ID
13507412482919195872
Author
Zhang C
Lin X
Lu R
Ho P
Publication year
Publication venue
2008 IEEE international conference on communications

External Links

Snippet

Addressing security and privacy issues is a prerequisite for a market-ready vehicular communication network. Although recent related studies have already addressed most of these issues, few of them have taken scalability issues into consideration. When the traffic …
Continue reading at www.inf.ufpr.br (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Similar Documents

Publication Publication Date Title
Zhang et al. RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
Zhang et al. An efficient message authentication scheme for vehicular communications
Manvi et al. A survey on authentication schemes in VANETs for secured communication
Sugumar et al. Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)
Zhang et al. An extensible and effective anonymous batch authentication scheme for smart vehicular networks
Zhang et al. A scalable robust authentication protocol for secure vehicular communications
Lin et al. Achieving efficient cooperative message authentication in vehicular ad hoc networks
Lim et al. A scalable and secure key distribution scheme for group signature based authentication in VANET
Hao et al. A distributed key management framework with cooperative message authentication in VANETs
Wang et al. A novel secure communication scheme in vehicular ad hoc networks
JP6329163B2 (en) Probabilistic key distribution in vehicle networks with infrastructure support
Guo et al. Chameleon hashing for secure and privacy-preserving vehicular communications
Moharrum et al. Toward secure vehicular ad-hoc networks: a survey
Bhoi et al. A secure routing protocol for Vehicular Ad Hoc Network to provide ITS services
Wang et al. Countermeasure uncooperative behaviors with dynamic trust-token in VANETs
Rawat et al. A lightweight authentication scheme with privacy preservation for vehicular networks
Hu et al. Efficient HMAC-based secure communication for VANETs
Oulhaci et al. Secure and distributed certification system architecture for safety message authentication in VANET
Singh et al. Secure healthcare data dissemination using vehicle relay networks
Teniou et al. Efficient and dynamic elliptic curve qu‐vanstone implicit certificates distribution scheme for vehicular cloud networks
Roy et al. BLAME: A blockchain-assisted misbehavior detection and event validation in VANETs
Liu et al. A novel secure message delivery and authentication method for vehicular ad hoc networks
Park et al. A secure and location assurance protocol for location-aware services in vanets
Riley et al. Group‐based hybrid authentication scheme for cooperative collision warnings in VANETs
Mohanty et al. A secure RSU-aided aggregation and batch-verification scheme for vehicular networks