An anonymous access authentication scheme for vehicular ad hoc networks under edge computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview

According to car crash statistics, over sixmillionmotor vehicle crashes occur onU.S. highways each year. More than 42,000 people are killed in these accidents which injure three million others, and cost more than $230 billion each year. Astonishingly, five people die every hour in these crashes in the United States which is about one death every 12 minutes IVI (2001). In order to alleviate the ...

متن کامل

An Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks

In this paper, we introduce an efficient anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) [5] to resolve the issue on anonymous authentication for communication between roadside units and vehicles. Our proposed protocol cannot only guarantee privacy, anonymity, and other basic cryptographic requirements but also provide traceability of illegal users. Our proposed protocol...

متن کامل

A Study on Efficient Anonymous Authentication Scheme in Vehicular Ad - hoc Networks

Vehicular Ad-hoc Networks (VANETs) are one of typical application of wireless communication technology, which provide communications among nearby vehicles and between vehicles and roadside units (RSUs) connected the infrastructure. VANETs provide a perfect way to collect dynamic traffic information and sense various physical conditions related to traffic distribution with very low cost and high...

متن کامل

Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme

In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy vehicles with verifying multiple messages at the same time improve computational efficiency of roadside unites when there are a large number of vehicles in their coverage areas. In this paper, first ...

متن کامل

Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks

generally, authentication in vehicular adhoc net-works (VANETs) used Public Key Infrastructure to check the Message integrity and the of message senders. The problems considered in the authentication schemes are the level of security and computational efficiency in verification processes. Most of existing schemes focus mainly on the security and privacy of VANET information. However, these sche...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Distributed Sensor Networks

سال: 2018

ISSN: 1550-1477,1550-1477

DOI: 10.1177/1550147718756581