A Formal Ticket-Based Authentication Scheme for VANETs
- 1 January 2019
- book chapter
- other
- Published by IGI Global
Abstract
Vehicular ad hoc networks (VANETs) enable vehicles to exchange safety-related messages in order to raise drivers' awareness about surrounding traffic and roads conditions. Nevertheless, since these messages have a crucial effect on people's lives and as we cannot disregard the probability of attackers intending to subvert the proper operation of these networks, stringent security support should be applied on these messages before they can be relied on. Authenticating these messages before considering them is one of the key security requirements since it enables the receiver to make sure of the received message's integrity and the genuineness of its originator. This chapter presents a conditional privacy-preserving authentication scheme for VANETs.Keywords
This publication has 17 references indexed in Scilit:
- Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc NetworksIEEE Transactions on Information Forensics and Security, 2015
- Game-theory-based batch identification of invalid signatures in wireless mobile networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Provably secure and pairing‐free identity‐based handover authentication protocol for wireless mobile networksInternational Journal of Communication Systems, 2014
- Strongly Privacy-Preserving Communication Protocol for VANETsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Overview of Security Issues in Vehicular Ad-hoc NetworksPublished by IGI Global ,2011
- Towards an Independent Semantics and Verification Technology for the HLPSL Specification LanguageElectronic Notes in Theoretical Computer Science, 2005
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and ApplicationsLecture Notes in Computer Science, 2005
- Security Proofs for Identity-Based Identification and Signature SchemesLecture Notes in Computer Science, 2004
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983