[go: up one dir, main page]

Biswas et al., 2012 - Google Patents

Prioritized WAVE-based Parking Assistance with Security and User Anonymity.

Biswas et al., 2012

View PDF
Document ID
13339608089501962059
Author
Biswas S
Misic J
Publication year
Publication venue
J. Commun.

External Links

Snippet

We present a secure, privacy-preserving car parking assistance application using priority- based vehicular communications. The proposed technique utilizes two modified Elliptic Curve algorithms for vehicular message authentication between parking vehicles and …
Continue reading at www.jocm.us (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Similar Documents

Publication Publication Date Title
Feng et al. P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks
Azees et al. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks
Cheng et al. PPVF: Privacy-preserving protocol for vehicle feedback in cloud-assisted VANET
Horng et al. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET
Vijayakumar et al. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks
Rajput et al. A hierarchical privacy preserving pseudonymous authentication protocol for VANET
Li et al. ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
Lu et al. A dynamic privacy-preserving key management scheme for location-based services in VANETs
Tan et al. Secure certificateless authentication and road message dissemination protocol in VANETs
Mahmood et al. A provably secure mobile user authentication scheme for big data collection in IoT-enabled maritime intelligent transportation system
Rezazadeh Baee et al. Authentication strategies in vehicular communications: A taxonomy and framework
Jiang et al. A conditional privacy scheme based on anonymized batch authentication in vehicular ad hoc networks
Vasudev et al. A lightweight authentication protocol for V2V communication in VANETs
Rajput et al. Cacppa: A cloud-assisted conditional privacy preserving authentication protocol for vanet
Rajput et al. A two level privacy preserving pseudonymous authentication protocol for VANET
Fan et al. Strongly privacy-preserving communication protocol for VANETs
Adigun et al. Protocol of change pseudonyms for VANETs
Tiwari et al. A novel secure authentication scheme for VANETs
Alazzawi et al. Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks
Teniou et al. Efficient and dynamic elliptic curve qu‐vanstone implicit certificates distribution scheme for vehicular cloud networks
Akil et al. Non-interactive privacy-preserving sybil-free authentication scheme in vanets
Park et al. An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications.
Mallissery et al. Cloud enabled secure communication in vehicular ad-hoc networks
Choi et al. Secure and efficient protocol for vehicular ad hoc network with privacy preservation
Qin et al. ECAS: An efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks