An anonymous access authentication scheme for vehicular ad hoc networks under edge computing
نویسندگان
چکیده
منابع مشابه
Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview
According to car crash statistics, over sixmillionmotor vehicle crashes occur onU.S. highways each year. More than 42,000 people are killed in these accidents which injure three million others, and cost more than $230 billion each year. Astonishingly, five people die every hour in these crashes in the United States which is about one death every 12 minutes IVI (2001). In order to alleviate the ...
متن کاملAn Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks
In this paper, we introduce an efficient anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) [5] to resolve the issue on anonymous authentication for communication between roadside units and vehicles. Our proposed protocol cannot only guarantee privacy, anonymity, and other basic cryptographic requirements but also provide traceability of illegal users. Our proposed protocol...
متن کاملA Study on Efficient Anonymous Authentication Scheme in Vehicular Ad - hoc Networks
Vehicular Ad-hoc Networks (VANETs) are one of typical application of wireless communication technology, which provide communications among nearby vehicles and between vehicles and roadside units (RSUs) connected the infrastructure. VANETs provide a perfect way to collect dynamic traffic information and sense various physical conditions related to traffic distribution with very low cost and high...
متن کاملProxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme
In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy vehicles with verifying multiple messages at the same time improve computational efficiency of roadside unites when there are a large number of vehicles in their coverage areas. In this paper, first ...
متن کاملProxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks
generally, authentication in vehicular adhoc net-works (VANETs) used Public Key Infrastructure to check the Message integrity and the of message senders. The problems considered in the authentication schemes are the level of security and computational efficiency in verification processes. Most of existing schemes focus mainly on the security and privacy of VANET information. However, these sche...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed Sensor Networks
سال: 2018
ISSN: 1550-1477,1550-1477
DOI: 10.1177/1550147718756581