Skip to main content
Erschienen in:
Buchtitelbild

2022 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li

Erschienen in: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid and massive growth in the development of computer systems and wireless network communication technologies increases the range of applications of intelligent transportation systems (ITS) such as vehicular ad hoc networks (VANETs) in smart cities. In recent times, VANETs have received significant attention from academia, industries, and governments due to their importance in traffic management. According to an estimate, the market for vehicular communications in the coming years will reach several billion euros [2, 8]. VANETs can also be considered to be mobile ad hoc networks (MANETs) because they form a dynamic infrastructure in which fast moving vehicles communicate with each other in a secure and efficient way. They can also be considered to be vehicular sensor networks (VSNs) because they allow traffic-related information to be collected by road sensors [9]. In urban areas, the number of vehicles (cars, buses, trucks, etc.) is increasing on a daily bases. This results in an increase in traffic jams and accidents.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat I. Ali, A. Hassan, and F. Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey, Vehicular Communications, 16:45–61, 20019. I. Ali, A. Hassan, and F. Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey, Vehicular Communications, 16:45–61, 20019.
2.
Zurück zum Zitat L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B. Qin. Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8):2562–2574, 2016. L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B. Qin. Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8):2562–2574, 2016.
3.
Zurück zum Zitat Z. Lu, G. Qu, and Z. Liu. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2):760–776, 2018.CrossRef Z. Lu, G. Qu, and Z. Liu. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2):760–776, 2018.CrossRef
4.
Zurück zum Zitat J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, 451:1–15, 2018.MathSciNetMATH J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, 451:1–15, 2018.MathSciNetMATH
5.
Zurück zum Zitat H. Hasrouny, A. E. Samhat, C. Bassil, A. Laouiti. VANET security challenges and solutions: A survey. Vehicular Communications, 7:7–20, 2017.CrossRef H. Hasrouny, A. E. Samhat, C. Bassil, A. Laouiti. VANET security challenges and solutions: A survey. Vehicular Communications, 7:7–20, 2017.CrossRef
6.
Zurück zum Zitat R. A. Uzcategui, A. J. De Sucre, and G. A. Marum. WAVE: A tutorial. IEEE Communications Magazine, 47(5):126–133, 2009.CrossRef R. A. Uzcategui, A. J. De Sucre, and G. A. Marum. WAVE: A tutorial. IEEE Communications Magazine, 47(5):126–133, 2009.CrossRef
7.
Zurück zum Zitat Y. L. Morgan. Managing DSRC and WAVE standards operations in a V2V scenario. International Journal of Vehicular Technology, 2010:1–18, 2010. Y. L. Morgan. Managing DSRC and WAVE standards operations in a V2V scenario. International Journal of Vehicular Technology, 2010:1–18, 2010.
8.
Zurück zum Zitat I. Yaqoob, I. Ahmad, E. Ahmed, A. Gani, M. Imran, and N. Guizani. Overcoming the key challenges to establishing vehicular communication: Is SDN the answer?. IEEE Communications Magazine, 55(7):128–134, 2017.CrossRef I. Yaqoob, I. Ahmad, E. Ahmed, A. Gani, M. Imran, and N. Guizani. Overcoming the key challenges to establishing vehicular communication: Is SDN the answer?. IEEE Communications Magazine, 55(7):128–134, 2017.CrossRef
9.
Zurück zum Zitat U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi. Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications, 13(5):52–57, 2006.CrossRef U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi. Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications, 13(5):52–57, 2006.CrossRef
10.
Zurück zum Zitat M. Obaidat, M. Khodjaeva, J. Holst, and M. B. Zid. Security and privacy challenges in vehicular ad hoc networks. Connected Vehicles in the Internet of Things, Springer, Cham, pages 223–251, 2020, M. Obaidat, M. Khodjaeva, J. Holst, and M. B. Zid. Security and privacy challenges in vehicular ad hoc networks. Connected Vehicles in the Internet of Things, Springer, Cham, pages 223–251, 2020,
11.
Zurück zum Zitat M. Wazid, A. K. Das, R. Hussain, G. Succic, and J.J.P.C.Rodrigues. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. Journal of Systems Architecture, 97:185–196, 2019.CrossRef M. Wazid, A. K. Das, R. Hussain, G. Succic, and J.J.P.C.Rodrigues. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. Journal of Systems Architecture, 97:185–196, 2019.CrossRef
12.
Zurück zum Zitat I. Ali, T. Lawrence, A. A. Omala, and F. Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10):11266–11280, 2020.CrossRef I. Ali, T. Lawrence, A. A. Omala, and F. Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10):11266–11280, 2020.CrossRef
13.
Zurück zum Zitat I. Ali, Y. Chen, N. Ullah, M. Afzal, and Wen HE. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Transactions on Vehicular Technology, 70(6):5974–5989, 2021. I. Ali, Y. Chen, N. Ullah, M. Afzal, and Wen HE. Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Transactions on Vehicular Technology, 70(6):5974–5989, 2021.
14.
Zurück zum Zitat S. S. Manvi and S. Tangade. A survey on authentication schemes in VANETs for secured communication. Vehicular Communications, 9:19–30, 2017.CrossRef S. S. Manvi and S. Tangade. A survey on authentication schemes in VANETs for secured communication. Vehicular Communications, 9:19–30, 2017.CrossRef
15.
Zurück zum Zitat F. Qu, Z. Wu, F. Wang, and W. Cho. A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6):2985–2996, 2015.CrossRef F. Qu, Z. Wu, F. Wang, and W. Cho. A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6):2985–2996, 2015.CrossRef
16.
Zurück zum Zitat R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen. Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1):86–96, 2012.CrossRef R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen. Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1):86–96, 2012.CrossRef
17.
Zurück zum Zitat A. khan, M. Ishtiaq, S. Anwar, and M. A. Shah. A survey on secure routing strategies in VANETs. 25th International Conference on Automation and Computing (ICAC), Lancaster, UK, pages 1–6, 2019. A. khan, M. Ishtiaq, S. Anwar, and M. A. Shah. A survey on secure routing strategies in VANETs. 25th International Conference on Automation and Computing (ICAC), Lancaster, UK, pages 1–6, 2019.
18.
Zurück zum Zitat J. Freudiger, M. Raya, M. Felegyhazi, and P. Papadimitratos. Mix-zones for location privacy in vehicular networks. ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiNITS), Vancouver, Canada, 2007. J. Freudiger, M. Raya, M. Felegyhazi, and P. Papadimitratos. Mix-zones for location privacy in vehicular networks. ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiNITS), Vancouver, Canada, 2007.
19.
Zurück zum Zitat J. Camenisch, S. Hohenberger, and M. Ø. Pedersen. Batch verification of short signatures. Journal of Cryptology, 25(4):723–747, 2012.MathSciNetMATHCrossRef J. Camenisch, S. Hohenberger, and M. Ø. Pedersen. Batch verification of short signatures. Journal of Cryptology, 25(4):723–747, 2012.MathSciNetMATHCrossRef
20.
Zurück zum Zitat X. Wang, T. Wei, L. Kong, L. He, F. Wu, and G. Chen. ECASS: Edge computing based auxiliary sensing system for self-driving vehicles, Journal of Systems Architecture, 97:258–268, 2019.CrossRef X. Wang, T. Wei, L. Kong, L. He, F. Wu, and G. Chen. ECASS: Edge computing based auxiliary sensing system for self-driving vehicles, Journal of Systems Architecture, 97:258–268, 2019.CrossRef
21.
Zurück zum Zitat Y. Liu, C. Wang, J. Huang, J. Sun, and W. Zhang. Novel 3-D nonstationary mmwave massive MIMO channel models for 5G high-speed train wireless communications. IEEE Transactions on Vehicular Technology, 68(3):2077–2086, 2019.CrossRef Y. Liu, C. Wang, J. Huang, J. Sun, and W. Zhang. Novel 3-D nonstationary mmwave massive MIMO channel models for 5G high-speed train wireless communications. IEEE Transactions on Vehicular Technology, 68(3):2077–2086, 2019.CrossRef
22.
Zurück zum Zitat I. Ali, M. Faisal, and S. Abbas. A survey on lightweight authentication schemes in vertical handoff. International Journal of Cooperative Information Systems, 26(01):1630001, 2017.CrossRef I. Ali, M. Faisal, and S. Abbas. A survey on lightweight authentication schemes in vertical handoff. International Journal of Cooperative Information Systems, 26(01):1630001, 2017.CrossRef
23.
Zurück zum Zitat D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006. D. Jiang, V. Taliwal, A. Meier, W. Holfelder, and R. Herrtwich. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wireless Communications, 13(5):36–43, 2006.
24.
Zurück zum Zitat J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7) 1162–1182, 2011.CrossRef J. B. Kenney. Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7) 1162–1182, 2011.CrossRef
25.
Zurück zum Zitat S. Biddlestone, K. Redmill, R. Miucic, and Ü. Ozguner. An integrated 802.11p WAVE DSRC and vehicle traffic simulator with experimentally validated urban (los and nlos) propagation models. IEEE transactions on intelligent transportation systems, 13(4):1792–1802, 2012. S. Biddlestone, K. Redmill, R. Miucic, and Ü. Ozguner. An integrated 802.11p WAVE DSRC and vehicle traffic simulator with experimentally validated urban (los and nlos) propagation models. IEEE transactions on intelligent transportation systems, 13(4):1792–1802, 2012.
26.
Zurück zum Zitat IEEE draft guide for wireless access in vehicular environments (WAVE) - architecture, IEEE P1609.0/D5 2012, 1–74, Sept. 2012. IEEE draft guide for wireless access in vehicular environments (WAVE) - architecture, IEEE P1609.0/D5 2012, 1–74, Sept. 2012.
27.
Zurück zum Zitat IEEE approved draft standard for wireless access in vehicular environments (WAVE) - networking services, IEEE P1609.3v3/D6 2016, 1–162, 2015. IEEE approved draft standard for wireless access in vehicular environments (WAVE) - networking services, IEEE P1609.3v3/D6 2016, 1–162, 2015.
28.
Zurück zum Zitat IEEE standard for wireless access in vehicular environments (WAVE) - networking services - redline, IEEE Std 1609.3-2016 (Revision of IEEE Std 1609.3-2010) - Redline 2016, 1–366, 2016. IEEE standard for wireless access in vehicular environments (WAVE) - networking services - redline, IEEE Std 1609.3-2016 (Revision of IEEE Std 1609.3-2010) - Redline 2016, 1–366, 2016.
29.
Zurück zum Zitat R. Molina-Masegosa and J. Gozalvez. LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications. IEEE Vehicular Technology Magazine, 12(4):30–39, 2017.CrossRef R. Molina-Masegosa and J. Gozalvez. LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications. IEEE Vehicular Technology Magazine, 12(4):30–39, 2017.CrossRef
30.
Zurück zum Zitat M. Gonzalez-Martín, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez. Analytical models of the performance of C-V2X mode 4 vehicular communications. IEEE Transactions on Vehicular Technology, 68(2):1155–1166, 2018.CrossRef M. Gonzalez-Martín, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez. Analytical models of the performance of C-V2X mode 4 vehicular communications. IEEE Transactions on Vehicular Technology, 68(2):1155–1166, 2018.CrossRef
31.
Zurück zum Zitat L. Tellis, F. Ahmed-Zaid, J. E. Stinnett, C. Nave, T. E. Pilutti, T. D. Zwicky, J. A. Martell, and J. C. Ivan, Vehicle-to-infrastructure communication. US Patent App. 14/048,003 (Apr. 9 2015). L. Tellis, F. Ahmed-Zaid, J. E. Stinnett, C. Nave, T. E. Pilutti, T. D. Zwicky, J. A. Martell, and J. C. Ivan, Vehicle-to-infrastructure communication. US Patent App. 14/048,003 (Apr. 9 2015).
32.
Zurück zum Zitat National Highway Traffic Safety Administration. Federal motor vehicle safety standards; V2V communications, PUB. L 82, 3854–4019, 2017. National Highway Traffic Safety Administration. Federal motor vehicle safety standards; V2V communications, PUB. L 82, 3854–4019, 2017.
33.
Zurück zum Zitat G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials 13(4):584–616, 2011.CrossRef G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials 13(4):584–616, 2011.CrossRef
34.
Zurück zum Zitat G. Singh. Video streaming communication over VANET. Recent Advances in Computational Intelligence, Springer, Cham, pages. 189–197, 2019. G. Singh. Video streaming communication over VANET. Recent Advances in Computational Intelligence, Springer, Cham, pages. 189–197, 2019.
35.
Zurück zum Zitat Y. Lai, Y. Xu, F. Yang, W. Lu, and Q. Yu. Privacy-aware query processing in vehicular ad-hoc networks. Ad Hoc Networks, 91:101876, 2019.CrossRef Y. Lai, Y. Xu, F. Yang, W. Lu, and Q. Yu. Privacy-aware query processing in vehicular ad-hoc networks. Ad Hoc Networks, 91:101876, 2019.CrossRef
36.
Zurück zum Zitat K. Li, M. H. Au, W. H. Ho, and Y. L. Wang. An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature. International Conference on Provable Security, Springer, Cham, pages 59–76, 2019. K. Li, M. H. Au, W. H. Ho, and Y. L. Wang. An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature. International Conference on Provable Security, Springer, Cham, pages 59–76, 2019.
37.
Zurück zum Zitat I. Ali and F. Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Vehicular Communications, 22:100228, 2020.CrossRef I. Ali and F. Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Vehicular Communications, 22:100228, 2020.CrossRef
38.
Zurück zum Zitat X. Yang, X. Yi, I. Khalil, Y. Zeng, X. Huang, S. Nepal, X. Yang, and H. Cui. A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Vehicular Communications, 15:16–27, 2019.CrossRef X. Yang, X. Yi, I. Khalil, Y. Zeng, X. Huang, S. Nepal, X. Yang, and H. Cui. A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Vehicular Communications, 15:16–27, 2019.CrossRef
39.
Zurück zum Zitat C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen. An efficient identity-based batch verification scheme for vehicular sensor networks. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, IEEE, Phoenix, AZ, USA, pages 246–250, 2008. C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen. An efficient identity-based batch verification scheme for vehicular sensor networks. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, IEEE, Phoenix, AZ, USA, pages 246–250, 2008.
40.
Zurück zum Zitat M. Raya and J.-P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39–68, 2007.CrossRef M. Raya and J.-P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39–68, 2007.CrossRef
41.
Zurück zum Zitat S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015.MathSciNetMATHCrossRef S.-J. Horng, S.-F. Tzeng, P.-H. Huang, X. Wang, T. Li, and M. K. Khan. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences, 317:48–66, 2015.MathSciNetMATHCrossRef
42.
Zurück zum Zitat W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–654, 1976.MathSciNetMATHCrossRef W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–654, 1976.MathSciNetMATHCrossRef
43.
Zurück zum Zitat R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, pages 1229–1237, 2008. R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, pages 1229–1237, 2008.
44.
Zurück zum Zitat C. Zhang, X. Lin, R. Lu, and P.-H. Ho. RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. IEEE international conference on communications, Beijing, China, pages 1451–1457, 2008. C. Zhang, X. Lin, R. Lu, and P.-H. Ho. RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. IEEE international conference on communications, Beijing, China, pages 1451–1457, 2008.
45.
Zurück zum Zitat A. Wasef and X. Shen. EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1):78–89, 2013.CrossRef A. Wasef and X. Shen. EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1):78–89, 2013.CrossRef
46.
Zurück zum Zitat P. Cincilla, O. Hicham, and B. Charles. Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios. IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, pages. 1–8, 2016. P. Cincilla, O. Hicham, and B. Charles. Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios. IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, pages. 1–8, 2016.
47.
Zurück zum Zitat A. Joshi, P. Gaonkar, and J. Bapat. A reliable and secure approach for efficient car-to-car communication in intelligent transportation systems. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE, Chennai, India, pages 1617–1620, 2017. A. Joshi, P. Gaonkar, and J. Bapat. A reliable and secure approach for efficient car-to-car communication in intelligent transportation systems. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE, Chennai, India, pages 1617–1620, 2017.
48.
Zurück zum Zitat M. Azees, P. Vijayakumar, and L. J. Deboarh. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9):2467–2476, 2017.CrossRef M. Azees, P. Vijayakumar, and L. J. Deboarh. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9):2467–2476, 2017.CrossRef
49.
Zurück zum Zitat M. Asghar, R. R. M. Doss, and L. Pan. A scalable and efficient PKI based authentication protocol for VANETs. 28th International Telecommunication Networks and Applications Conference (ITNAC), IEEE, Sydney, NSW, Australia, pages 1–3, 2018. M. Asghar, R. R. M. Doss, and L. Pan. A scalable and efficient PKI based authentication protocol for VANETs. 28th International Telecommunication Networks and Applications Conference (ITNAC), IEEE, Sydney, NSW, Australia, pages 1–3, 2018.
50.
Zurück zum Zitat P. Gutmann. PKI: It’s not dead, just resting. Computer, 35(8):41–49, 2002.CrossRef P. Gutmann. PKI: It’s not dead, just resting. Computer, 35(8):41–49, 2002.CrossRef
51.
Zurück zum Zitat A. J. Slagell and R. Bonilla. PKI scalability issues. arXiv preprint cs/0409018, 2004. A. J. Slagell and R. Bonilla. PKI scalability issues. arXiv preprint cs/0409018, 2004.
52.
Zurück zum Zitat N. Islam. Certificate revocation in vehicular ad hoc networks: a novel approach. International Conference on Networking Systems and Security (NSysS), IEEE, Dhaka, Bangladesh, pages 1–5, 2016. N. Islam. Certificate revocation in vehicular ad hoc networks: a novel approach. International Conference on Networking Systems and Security (NSysS), IEEE, Dhaka, Bangladesh, pages 1–5, 2016.
53.
Zurück zum Zitat A. Shamir. Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques, Springer, Berlin, Heidelberg, pages 47–53, 1984.MATH A. Shamir. Identity-based cryptosystems and signature schemes. Workshop on the theory and application of cryptographic techniques, Springer, Berlin, Heidelberg, pages 47–53, 1984.MATH
54.
Zurück zum Zitat C. Zhang, P.-H. Ho, and J. Tapolcai. On batch verification with group testing for vehicular communications. Wireless Networks, 17(8):1851–1865, 2011.CrossRef C. Zhang, P.-H. Ho, and J. Tapolcai. On batch verification with group testing for vehicular communications. Wireless Networks, 17(8):1851–1865, 2011.CrossRef
55.
Zurück zum Zitat J. Sun, C. Zhang, Y. Zhang, and Y. Fang. An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(9):1227–1239, 2010.CrossRef J. Sun, C. Zhang, Y. Zhang, and Y. Fang. An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(9):1227–1239, 2010.CrossRef
56.
Zurück zum Zitat T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li. SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2):189–203, 2011.CrossRef T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li. SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2):189–203, 2011.CrossRef
57.
Zurück zum Zitat K.-A. Shim. CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4):1874–1883, 2012.CrossRef K.-A. Shim. CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4):1874–1883, 2012.CrossRef
58.
Zurück zum Zitat K.-A. Shim. Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications, 12(11):5386–5393, 2013.CrossRef K.-A. Shim. Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications, 12(11):5386–5393, 2013.CrossRef
59.
Zurück zum Zitat C.-C. Lee and Y.-M. Lai. Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6):1441–1449, 2013.CrossRef C.-C. Lee and Y.-M. Lai. Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6):1441–1449, 2013.CrossRef
60.
Zurück zum Zitat S.-J. Horng, S.-F. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, and M. K. Khan. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11):1860–1875, 2013.CrossRef S.-J. Horng, S.-F. Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, and M. K. Khan. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Transactions on Information Forensics and Security, 8(11):1860–1875, 2013.CrossRef
61.
Zurück zum Zitat J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo. Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5):2559–2564, 2014.CrossRef J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo. Improvements on an authentication scheme for vehicular sensor networks. Expert Systems with Applications, 41(5):2559–2564, 2014.CrossRef
62.
Zurück zum Zitat Z. Jianhong, X. Min, and L. Liying. On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5):351–358, 2014. Z. Jianhong, X. Min, and L. Liying. On the security of a secure batch verification with group testing for VANET. International Journal of Network Security, 16(5):351–358, 2014.
63.
Zurück zum Zitat M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref. A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5):1733–1743, 2015.CrossRef M. Bayat, M. Barmshoory, M. Rahimi, and M. R. Aref. A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5):1733–1743, 2015.CrossRef
64.
Zurück zum Zitat Y. Zhang, L. Yang, and S. Wang. An efficient identity-based signature scheme for vehicular communications. 11th International Conference on Computational Intelligence and Security (CIS), IEEE, Shenzhen, China, pages 326–330, 2015. Y. Zhang, L. Yang, and S. Wang. An efficient identity-based signature scheme for vehicular communications. 11th International Conference on Computational Intelligence and Security (CIS), IEEE, Shenzhen, China, pages 326–330, 2015.
65.
Zurück zum Zitat S. Wang and N. Yao. LIAP: A local identity-based anonymous message authentication protocol in VANETs, Computer Communications, 112:154–164, 2017.CrossRef S. Wang and N. Yao. LIAP: A local identity-based anonymous message authentication protocol in VANETs, Computer Communications, 112:154–164, 2017.CrossRef
66.
Zurück zum Zitat J. Liu, Y. Yu, Y. Zhao, J. Jia, and S. Wang. An efficient privacy preserving batch authentication scheme with deterable function for VANETs. International Conference on Network and System Security, Springer, Cham, pages 288–303, 2018. J. Liu, Y. Yu, Y. Zhao, J. Jia, and S. Wang. An efficient privacy preserving batch authentication scheme with deterable function for VANETs. International Conference on Network and System Security, Springer, Cham, pages 288–303, 2018.
67.
Zurück zum Zitat J. Li, Y. Liu, Z. Zhang, B. Li, H. Liu, and J. Cheng. Efficient ID-based message authentication with enhanced privacy in wireless ad-hoc networks. International Conference on Computing, Networking and Communications (ICNC), IEEE, Maui, HI, USA, pages 322–326, 2018. J. Li, Y. Liu, Z. Zhang, B. Li, H. Liu, and J. Cheng. Efficient ID-based message authentication with enhanced privacy in wireless ad-hoc networks. International Conference on Computing, Networking and Communications (ICNC), IEEE, Maui, HI, USA, pages 322–326, 2018.
68.
Zurück zum Zitat P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. Annual International Cryptology Conference, Springer, Berlin, Heidelberg, pages 354–369, 2002. P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. Annual International Cryptology Conference, Springer, Berlin, Heidelberg, pages 354–369, 2002.
69.
Zurück zum Zitat J.-L. Tsai, and N.-W. Lo. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3):805–815, 2015.CrossRef J.-L. Tsai, and N.-W. Lo. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3):805–815, 2015.CrossRef
70.
Zurück zum Zitat D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef D. He, S. Zeadally, B. Xu, and X. Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12):2681–2691, 2015.CrossRef
71.
Zurück zum Zitat N.-W. Lo and J.-L. Tsai. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5):1319–1328, 2016.CrossRef N.-W. Lo and J.-L. Tsai. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5):1319–1328, 2016.CrossRef
72.
Zurück zum Zitat J. Cui, J. Zhang, H. Zhong, and Y. Xu. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11):10283–10295, 2017.CrossRef J. Cui, J. Zhang, H. Zhong, and Y. Xu. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11):10283–10295, 2017.CrossRef
73.
Zurück zum Zitat Y. Xie, F. Xu, D. Li, and Y. Nie. Efficient message authentication scheme with conditional privacy-preserving and signature aggregation for vehicular cloud network. Wireless Communications and Mobile Computing, 2018:1–13, 2018. Y. Xie, F. Xu, D. Li, and Y. Nie. Efficient message authentication scheme with conditional privacy-preserving and signature aggregation for vehicular cloud network. Wireless Communications and Mobile Computing, 2018:1–13, 2018.
74.
Zurück zum Zitat X. Zhang, L. Mu, J. Zhao, and C. Xu. An efficient anonymous authentication scheme with secure communication in intelligent vehicular ad-hoc networks. KSII Transactions on Internet and Information Systems (TIIS), 13 (6) (2019) 3280–3298. X. Zhang, L. Mu, J. Zhao, and C. Xu. An efficient anonymous authentication scheme with secure communication in intelligent vehicular ad-hoc networks. KSII Transactions on Internet and Information Systems (TIIS), 13 (6) (2019) 3280–3298.
75.
Zurück zum Zitat I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.CrossRef I. Ali, T. Lawrence, and F. Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 103:101692, 2020.CrossRef
76.
Zurück zum Zitat S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pages 452–473, 2003. S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pages 452–473, 2003.
77.
Zurück zum Zitat L. Zhang, and F. Zhang. A new certificateless aggregate signature scheme. Computer Communications, 32(6):1079–1085, 2009.MathSciNetCrossRef L. Zhang, and F. Zhang. A new certificateless aggregate signature scheme. Computer Communications, 32(6):1079–1085, 2009.MathSciNetCrossRef
78.
Zurück zum Zitat L. Zhang, B. Qin, Q. Wu, and F. Zhang. Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks, 54(14):2482–2491, 2010.MATHCrossRef L. Zhang, B. Qin, Q. Wu, and F. Zhang. Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks, 54(14):2482–2491, 2010.MATHCrossRef
79.
Zurück zum Zitat H. Xiong, Q. Wu, and Z. Chen. An efficient provably secure certificateless aggregate signature applicable to mobile computation. Control and Cybernetics, 41(2):373–391, 2012.MathSciNetMATH H. Xiong, Q. Wu, and Z. Chen. An efficient provably secure certificateless aggregate signature applicable to mobile computation. Control and Cybernetics, 41(2):373–391, 2012.MathSciNetMATH
80.
Zurück zum Zitat H. Xiong, Z. Guan, Z. Chen, and F. Li. An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219:225–235, 2013.MathSciNetMATHCrossRef H. Xiong, Z. Guan, Z. Chen, and F. Li. An efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 219:225–235, 2013.MathSciNetMATHCrossRef
81.
Zurück zum Zitat L. Zhang, F. Zhang, and Q. Wu. Delegation of signing rights using certificateless proxy signatures. Information Sciences, 184(1):298–309, 2012.MathSciNetMATHCrossRef L. Zhang, F. Zhang, and Q. Wu. Delegation of signing rights using certificateless proxy signatures. Information Sciences, 184(1):298–309, 2012.MathSciNetMATHCrossRef
82.
Zurück zum Zitat D. He, M. Tian, and J. Chen. Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 268:458–462, 2014.MathSciNetMATHCrossRef D. He, M. Tian, and J. Chen. Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Information Sciences, 268:458–462, 2014.MathSciNetMATHCrossRef
83.
Zurück zum Zitat L. Cheng, Q. Wen, Z. Jin, H. Zhang, and L. Zhou. Cryptanalysis and improvement of a certificateless aggregate signature scheme. Information Sciences, 295:337–346, 2015.MathSciNetMATHCrossRef L. Cheng, Q. Wen, Z. Jin, H. Zhang, and L. Zhou. Cryptanalysis and improvement of a certificateless aggregate signature scheme. Information Sciences, 295:337–346, 2015.MathSciNetMATHCrossRef
84.
Zurück zum Zitat A. Malip, S.-L. Ng, and Q. Li. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks, 7(3):588–601, 2014.CrossRef A. Malip, S.-L. Ng, and Q. Li. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks, 7(3):588–601, 2014.CrossRef
85.
Zurück zum Zitat A. K. Malhi and S. Batra. An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics and Theoretical Computer Science, 17(1):317–338, 2015.MathSciNetMATH A. K. Malhi and S. Batra. An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics and Theoretical Computer Science, 17(1):317–338, 2015.MathSciNetMATH
86.
Zurück zum Zitat J. Li, H. Yuan, and Y. Zhang. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317:48–66, 2015. J. Li, H. Yuan, and Y. Zhang. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Networks, 317:48–66, 2015.
87.
Zurück zum Zitat J.-L. Tsai. A new efficient certificateless short signature scheme using bilinear pairings. IEEE Systems Journal, 11(4):2395–2402, 2015.CrossRef J.-L. Tsai. A new efficient certificateless short signature scheme using bilinear pairings. IEEE Systems Journal, 11(4):2395–2402, 2015.CrossRef
88.
Zurück zum Zitat P. Kumar and V. Sharma. On the security of certificateless aggregate signature scheme in vehicular ad hoc networks. Soft Computing: Theories and Applications, Springer, Singapore, pages 715–722, 2018. P. Kumar and V. Sharma. On the security of certificateless aggregate signature scheme in vehicular ad hoc networks. Soft Computing: Theories and Applications, Springer, Singapore, pages 715–722, 2018.
89.
Zurück zum Zitat X. Yang, C. Chen, T. Ma, Y. Li, and C. Wang. An improved certificateless aggregate signature scheme for vehicular ad-hoc networks. IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, pages. 2334–2338, 2018. X. Yang, C. Chen, T. Ma, Y. Li, and C. Wang. An improved certificateless aggregate signature scheme for vehicular ad-hoc networks. IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, pages. 2334–2338, 2018.
90.
Zurück zum Zitat P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam. Secure CLS and CL-AS schemes designed for VANETs. The Journal of Supercomputing, 75(6):3076–3098, 2019.CrossRef P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam. Secure CLS and CL-AS schemes designed for VANETs. The Journal of Supercomputing, 75(6):3076–3098, 2019.CrossRef
91.
Zurück zum Zitat I. Ali, M. Gervais, E. Ahene, and F. Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99:101636, 2019.CrossRef I. Ali, M. Gervais, E. Ahene, and F. Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99:101636, 2019.CrossRef
92.
Zurück zum Zitat L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213–241, 2007.CrossRef L. Chen, Z. Cheng, and N. P. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213–241, 2007.CrossRef
93.
Zurück zum Zitat H. Debiao, C. Jianhua, and Z. Rui. Efficient and provably-secure certificateless signature scheme without bilinear pairings. Cryptology ePrint Archive: Report 2010/632, 2010. H. Debiao, C. Jianhua, and Z. Rui. Efficient and provably-secure certificateless signature scheme without bilinear pairings. Cryptology ePrint Archive: Report 2010/632, 2010.
94.
Zurück zum Zitat D. He, J. Chen, and R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 25(11):1432–1442, 2012.CrossRef D. He, J. Chen, and R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 25(11):1432–1442, 2012.CrossRef
95.
Zurück zum Zitat S. H. Islam, and G. Biswas. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics, 90(11):2244–2258, 2013.MATHCrossRef S. H. Islam, and G. Biswas. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. International Journal of Computer Mathematics, 90(11):2244–2258, 2013.MATHCrossRef
96.
Zurück zum Zitat N. Tiwari. On the security of pairing-free certificateless digital signature schemes using ECC. ICT Express, 1(2):94–95, 2015.MathSciNetCrossRef N. Tiwari. On the security of pairing-free certificateless digital signature schemes using ECC. ICT Express, 1(2):94–95, 2015.MathSciNetCrossRef
97.
Zurück zum Zitat Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang. An efficient V2I authentication scheme for VANETs. Mobile Information Systems 2018, 2018. Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang. An efficient V2I authentication scheme for VANETs. Mobile Information Systems 2018, 2018.
98.
Zurück zum Zitat J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH J. Cui, J. Zhang, H. Zhong, R. Shi, and Y. Xu. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 451:1–15, 2018.MathSciNetMATH
99.
Zurück zum Zitat I. A. Kamil and S. O. Ogundoyin. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications, 44:184–200, 2019.CrossRef I. A. Kamil and S. O. Ogundoyin. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications, 44:184–200, 2019.CrossRef
100.
Zurück zum Zitat A. K. Sutrala, P. Bagga, A. K. Das, N. Kumar, J. J. Rodrigues, and P. Lorenz. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Transactions on Vehicular Technology, 6(5):5535–5548, 2020.CrossRef A. K. Sutrala, P. Bagga, A. K. Das, N. Kumar, J. J. Rodrigues, and P. Lorenz. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Transactions on Vehicular Technology, 6(5):5535–5548, 2020.CrossRef
101.
Zurück zum Zitat I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291, 2021.CrossRef I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He. An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2):1278–1291, 2021.CrossRef
102.
Zurück zum Zitat P. Bagga, A. K. Das, M. Wazid, J. Rodrigues, K.-K. R. Choo, and Y. Park. On the design of mutual authentication and key agreement protocol in Internet of vehicles-enabled intelligent transportation system. IEEE Transactions on Vehicular Technology, 70(2):1736–1751, 2021.CrossRef P. Bagga, A. K. Das, M. Wazid, J. Rodrigues, K.-K. R. Choo, and Y. Park. On the design of mutual authentication and key agreement protocol in Internet of vehicles-enabled intelligent transportation system. IEEE Transactions on Vehicular Technology, 70(2):1736–1751, 2021.CrossRef
103.
Zurück zum Zitat Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), in: Annual International Cryptology Conference, Springer, 1997, pp. 165–179. Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption), in: Annual International Cryptology Conference, Springer, 1997, pp. 165–179.
Metadaten
Titel
Introduction
verfasst von
Ikram Ali
Yong Chen
Mohammad Faisal
Meng Li
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8586-6_1

Neuer Inhalt