Wang et al., 2022 - Google Patents
Reducing revocation latency in IoV using edge computing and permissioned blockchainWang et al., 2022
- Document ID
- 14252317557481236638
- Author
- Wang Q
- Gao D
- Foh C
- Leung V
- Publication year
- Publication venue
- ICC 2022-IEEE International Conference on Communications
External Links
Snippet
In Internet of Vehicles (IoV), authentication technology provides a basic security means to achieve trusted communication between legitimate vehicles. Revocation checking for vehicle certificates is an indispensable procedure in the process of authentication to protect …
- 238000000034 method 0 abstract description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maria et al. | BBAAS: blockchain‐based anonymous authentication scheme for providing secure communication in VANETs | |
CN113489733B (en) | Blockchain-based content-centric network privacy protection method | |
Lu et al. | DRRS-BC: Decentralized routing registration system based on blockchain | |
Wang et al. | DAG blockchain-based lightweight authentication and authorization scheme for IoT devices | |
CN113507458B (en) | Cross-domain identity authentication method based on block chain | |
Yu et al. | DNSTSM: DNS cache resources trusted sharing model based on consortium blockchain | |
CN112543106A (en) | Vehicle privacy anonymous protection method based on block chain and group signature | |
Zhang et al. | Cross-domain identity authentication scheme based on blockchain and PKI system | |
CN115102695B (en) | Internet of Vehicles Certificate Authentication Method Based on Blockchain | |
Xu et al. | Trustworthy and transparent third-party authority | |
Liu et al. | A blockchain-based cross-domain authentication management system for IoT devices | |
CN118713853A (en) | Identity-driven trust management system for data center collaboration | |
Kubilay et al. | KORGAN: An efficient PKI architecture based on PBFT through dynamic threshold signatures | |
Jiang et al. | A distributed internet of vehicles data privacy protection method based on zero-knowledge proof and blockchain | |
Chen et al. | IOV Privacy Protection System Based on Double‐Layered Chains | |
CN114553604B (en) | A method for access control of IoT terminal nodes | |
Mahmoud et al. | An efficient certificate revocation scheme for large-scale AMI networks | |
Wang et al. | Decentralized CRL management for vehicular networks with permissioned blockchain | |
CN113747433B (en) | Equipment authentication method based on block side chain structure in fog network | |
Heng et al. | A strong secure V2I authentication scheme from PKI and accumulator | |
WO2020113546A1 (en) | Privacy protection and identity management method and system for multi-mode identifier network | |
Wang et al. | Reducing revocation latency in IoV using edge computing and permissioned blockchain | |
Dai et al. | Dizar: An architecture of distributed public key infrastructure based on permissoned blockchain | |
Chen et al. | Research on identity authentication of iot devices based on blockchain | |
Li et al. | Blockchain-assisted secure message authentication with reputation management for VANETs |