Zhang et al., 2008 - Google Patents
RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networksZhang et al., 2008
View PDF- Document ID
- 13507412482919195872
- Author
- Zhang C
- Lin X
- Lu R
- Ho P
- Publication year
- Publication venue
- 2008 IEEE international conference on communications
External Links
Snippet
Addressing security and privacy issues is a prerequisite for a market-ready vehicular communication network. Although recent related studies have already addressed most of these issues, few of them have taken scalability issues into consideration. When the traffic …
- 238000004891 communication 0 title abstract description 39
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks | |
Zhang et al. | An efficient message authentication scheme for vehicular communications | |
Manvi et al. | A survey on authentication schemes in VANETs for secured communication | |
Sugumar et al. | Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) | |
Zhang et al. | An extensible and effective anonymous batch authentication scheme for smart vehicular networks | |
Zhang et al. | A scalable robust authentication protocol for secure vehicular communications | |
Lin et al. | Achieving efficient cooperative message authentication in vehicular ad hoc networks | |
Lim et al. | A scalable and secure key distribution scheme for group signature based authentication in VANET | |
Hao et al. | A distributed key management framework with cooperative message authentication in VANETs | |
Wang et al. | A novel secure communication scheme in vehicular ad hoc networks | |
JP6329163B2 (en) | Probabilistic key distribution in vehicle networks with infrastructure support | |
Guo et al. | Chameleon hashing for secure and privacy-preserving vehicular communications | |
Moharrum et al. | Toward secure vehicular ad-hoc networks: a survey | |
Bhoi et al. | A secure routing protocol for Vehicular Ad Hoc Network to provide ITS services | |
Wang et al. | Countermeasure uncooperative behaviors with dynamic trust-token in VANETs | |
Rawat et al. | A lightweight authentication scheme with privacy preservation for vehicular networks | |
Hu et al. | Efficient HMAC-based secure communication for VANETs | |
Oulhaci et al. | Secure and distributed certification system architecture for safety message authentication in VANET | |
Singh et al. | Secure healthcare data dissemination using vehicle relay networks | |
Teniou et al. | Efficient and dynamic elliptic curve qu‐vanstone implicit certificates distribution scheme for vehicular cloud networks | |
Roy et al. | BLAME: A blockchain-assisted misbehavior detection and event validation in VANETs | |
Liu et al. | A novel secure message delivery and authentication method for vehicular ad hoc networks | |
Park et al. | A secure and location assurance protocol for location-aware services in vanets | |
Riley et al. | Group‐based hybrid authentication scheme for cooperative collision warnings in VANETs | |
Mohanty et al. | A secure RSU-aided aggregation and batch-verification scheme for vehicular networks |