A comprehensive survey on authentication and privacy-preserving schemes in VANETs
P Mundhe, S Verma, S Venkatesan - Computer Science Review, 2021 - Elsevier
Vehicular ad hoc networks (VANETs) promise to enhance transport efficiency, passenger
safety, and comfort through the exchange of traffic and infotainment information to vehicles …
safety, and comfort through the exchange of traffic and infotainment information to vehicles …
A survey on privacy-preserving authentication protocols for secure vehicular communication
K Sutradhar, BG Pillai, R Amin, DL Narayan - Computer Communications, 2024 - Elsevier
Secure vehicular communication is one of the challenges of vehicular technology. The main
goal of vehicular ad hoc networks is to prevent road accidents and collisions by transferring …
goal of vehicular ad hoc networks is to prevent road accidents and collisions by transferring …
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
LaRRS: Lattice-based revocable ring signature and its application for VANETs
J Wen, L Bai, Z Yang, H Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vehicular ad-hoc networks (VANETs) have drawn a lot of attention for their potential to
improve traffic efficiency and safety. To deal with anonymous authentication and message …
improve traffic efficiency and safety. To deal with anonymous authentication and message …
An anonymous authentication scheme with conditional privacy-preserving for Vehicular Ad hoc Networks based on zero-knowledge proof and Blockchain
JK Shahrouz, M Analoui - Ad Hoc Networks, 2024 - Elsevier
Abstract Recently, Vehicular Ad hoc Networks (VANETs) have gained extensive attention in
both academia and industry. VANETs play a seminal role in smart transportation by …
both academia and industry. VANETs play a seminal role in smart transportation by …
A certificateless ring signature scheme with batch verification for applications in VANET
S Bouakkaz, F Semchedine - Journal of Information Security and …, 2020 - Elsevier
One of the most important challenges in secure and efficient communications for Vehicular
Ad hoc NETworks (VANET) is proposing an appropriate authentication scheme. On the other …
Ad hoc NETworks (VANET) is proposing an appropriate authentication scheme. On the other …
Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks
One significant security challenge in vehicular networks is defending against malicious
members' attacks, including insiders and compromised authorities. Insiders are legitimate …
members' attacks, including insiders and compromised authorities. Insiders are legitimate …
An improved conditional privacy protection scheme based on ring signcryption for vanets
H Du, Q Wen, S Zhang, M Gao - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) can effectively provide vehicle driving safety, high-
speed data communication, intelligent traffic management, and vehicle entertainment …
speed data communication, intelligent traffic management, and vehicle entertainment …
VAIM: verifiable anonymous identity management for human-centric security and privacy in the internet of things
The human internet of things (HIoT) is a promising trend that adopts a user-centered vision
to improve life quality by interacting with heterogeneous physical and virtual entities and the …
to improve life quality by interacting with heterogeneous physical and virtual entities and the …
Location Privacy Threats and Protections in Future Vehicular Networks: A Comprehensive Review
Location privacy is critical in vehicular networks, where drivers' trajectories and personal
information can be exposed, allowing adversaries to launch data and physical attacks that …
information can be exposed, allowing adversaries to launch data and physical attacks that …