[go: up one dir, main page]

Wang et al., 2022 - Google Patents

Reducing revocation latency in IoV using edge computing and permissioned blockchain

Wang et al., 2022

Document ID
14252317557481236638
Author
Wang Q
Gao D
Foh C
Leung V
Publication year
Publication venue
ICC 2022-IEEE International Conference on Communications

External Links

Snippet

In Internet of Vehicles (IoV), authentication technology provides a basic security means to achieve trusted communication between legitimate vehicles. Revocation checking for vehicle certificates is an indispensable procedure in the process of authentication to protect …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Similar Documents

Publication Publication Date Title
Maria et al. BBAAS: blockchain‐based anonymous authentication scheme for providing secure communication in VANETs
CN113489733B (en) Blockchain-based content-centric network privacy protection method
Lu et al. DRRS-BC: Decentralized routing registration system based on blockchain
Wang et al. DAG blockchain-based lightweight authentication and authorization scheme for IoT devices
CN113507458B (en) Cross-domain identity authentication method based on block chain
Yu et al. DNSTSM: DNS cache resources trusted sharing model based on consortium blockchain
CN112543106A (en) Vehicle privacy anonymous protection method based on block chain and group signature
Zhang et al. Cross-domain identity authentication scheme based on blockchain and PKI system
CN115102695B (en) Internet of Vehicles Certificate Authentication Method Based on Blockchain
Xu et al. Trustworthy and transparent third-party authority
Liu et al. A blockchain-based cross-domain authentication management system for IoT devices
CN118713853A (en) Identity-driven trust management system for data center collaboration
Kubilay et al. KORGAN: An efficient PKI architecture based on PBFT through dynamic threshold signatures
Jiang et al. A distributed internet of vehicles data privacy protection method based on zero-knowledge proof and blockchain
Chen et al. IOV Privacy Protection System Based on Double‐Layered Chains
CN114553604B (en) A method for access control of IoT terminal nodes
Mahmoud et al. An efficient certificate revocation scheme for large-scale AMI networks
Wang et al. Decentralized CRL management for vehicular networks with permissioned blockchain
CN113747433B (en) Equipment authentication method based on block side chain structure in fog network
Heng et al. A strong secure V2I authentication scheme from PKI and accumulator
WO2020113546A1 (en) Privacy protection and identity management method and system for multi-mode identifier network
Wang et al. Reducing revocation latency in IoV using edge computing and permissioned blockchain
Dai et al. Dizar: An architecture of distributed public key infrastructure based on permissoned blockchain
Chen et al. Research on identity authentication of iot devices based on blockchain
Li et al. Blockchain-assisted secure message authentication with reputation management for VANETs