Anonymous Group Message Authentication Protocol for LTE-based V2X Communications

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Group Message Authentication Protocol for LTE-based V2X Communications

Correspondence Dongxiao Liu, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo Canada N2L 3G1 Email: [email protected] Cellular technologies, in particular the current long-term evolution (LTE) and future 5G, are suitable for implementing vehicle-to-everything (V2X) services, due to the existing network infrastructure, device-to-device (D2D) communicati...

متن کامل

An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications

As vehicular communications bring the promise of improved road safety and optimized road traffic through cooperative systems applications, it becomes a prerequisite to make vehicular communications secure for the successful deployment of vehicular ad hoc networks. In this paper, we propose an efficient authentication protocol with anonymous public key certificates for secure vehicular communica...

متن کامل

Unsupervised LTE D2D - Case Study for Safety-Critical V2X Communications

This article explores the recent 3GPP LTE D2D rel. 14 Radio Resource Management specification to identify the challenges and evaluate the potentials of Unsupervised LTE D2D (mode 2) for Safety-critical V2X Communications. It also proposes two distributed resource allocation strategies for unlicensed band access. Complementary to DSRC/ITS-G5, unsupervised LTE D2D is an opportunity to provide red...

متن کامل

A robust smart card-based anonymous user authentication protocol for wireless communications

Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart card-based anonymous user authentication protocol for wireless communications. The scheme can protect user privacy and is believed to be secure against a range of network attacks even if the secret information stored in the smart card is compromised. In this pa...

متن کامل

Investigating Anonymity in Group Based Anonymous Authentication

In this paper we discuss anonymity in context of group based anonymous authentication (GBAA). Methods for GBAA provide mechanisms such that a user is able to prove membership in a group U ′ ⊆ U of authorized users U to a verifier, whereas the verifier does not obtain any information on the actual identity of the authenticating user. They can be used in addition to anonymous communication channe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Internet Technology Letters

سال: 2018

ISSN: 2476-1508

DOI: 10.1002/itl2.25