Biswas et al., 2012 - Google Patents
Prioritized WAVE-based Parking Assistance with Security and User Anonymity.Biswas et al., 2012
View PDF- Document ID
- 13339608089501962059
- Author
- Biswas S
- Misic J
- Publication year
- Publication venue
- J. Commun.
External Links
Snippet
We present a secure, privacy-preserving car parking assistance application using priority- based vehicular communications. The proposed technique utilizes two modified Elliptic Curve algorithms for vehicular message authentication between parking vehicles and …
- 230000000875 corresponding 0 abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feng et al. | P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks | |
Azees et al. | EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks | |
Cheng et al. | PPVF: Privacy-preserving protocol for vehicle feedback in cloud-assisted VANET | |
Horng et al. | b-SPECS+: Batch verification for secure pseudonymous authentication in VANET | |
Vijayakumar et al. | Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks | |
Rajput et al. | A hierarchical privacy preserving pseudonymous authentication protocol for VANET | |
Li et al. | ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs | |
Lu et al. | A dynamic privacy-preserving key management scheme for location-based services in VANETs | |
Tan et al. | Secure certificateless authentication and road message dissemination protocol in VANETs | |
Mahmood et al. | A provably secure mobile user authentication scheme for big data collection in IoT-enabled maritime intelligent transportation system | |
Rezazadeh Baee et al. | Authentication strategies in vehicular communications: A taxonomy and framework | |
Jiang et al. | A conditional privacy scheme based on anonymized batch authentication in vehicular ad hoc networks | |
Vasudev et al. | A lightweight authentication protocol for V2V communication in VANETs | |
Rajput et al. | Cacppa: A cloud-assisted conditional privacy preserving authentication protocol for vanet | |
Rajput et al. | A two level privacy preserving pseudonymous authentication protocol for VANET | |
Fan et al. | Strongly privacy-preserving communication protocol for VANETs | |
Adigun et al. | Protocol of change pseudonyms for VANETs | |
Tiwari et al. | A novel secure authentication scheme for VANETs | |
Alazzawi et al. | Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks | |
Teniou et al. | Efficient and dynamic elliptic curve qu‐vanstone implicit certificates distribution scheme for vehicular cloud networks | |
Akil et al. | Non-interactive privacy-preserving sybil-free authentication scheme in vanets | |
Park et al. | An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications. | |
Mallissery et al. | Cloud enabled secure communication in vehicular ad-hoc networks | |
Choi et al. | Secure and efficient protocol for vehicular ad hoc network with privacy preservation | |
Qin et al. | ECAS: An efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks |