A Novel Identity-Based Privacy-Preserving Anonymous Authentication Scheme for Vehicle-to-Vehicle Communication

نویسندگان

چکیده

This paper proposes a novel bilinear pairing-free identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called “NIBPA”. Today, vehicular ad hoc networks (VANETs) offer important solutions traffic safety and efficiency. However, VANETs are vulnerable to cyberattacks due their use of wireless communication. Therefore, schemes used solve security privacy issues in VANETs. The NIBPA satisfies the requirements is robust cyberattacks. It also elliptic curve cryptography (ECC)-based lightweight scheme. pairing operation map-to-point hash function have not been because high computational costs. Moreover, it provides batch message verification improve performance. compared existing terms cost communication cost. test random oracle model (ROM). As result performance analysis, gives better results schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable fo...

متن کامل

Self-Correcting Localization Scheme for Vehicle to Vehicle Communication

Vehicle to Vehicle communication (V2V) has taken place in research interest for many purposes such as road safety and traffic management. An accurate estimation for vehicular node position is important for such type of communication. A vehicular node can be equipped with Global Positioning Systems (GPS) to estimate its position. In practice, many vehicular nodes may lose GPS signals in rural re...

متن کامل

Vehicle to Vehicle Authentication

Vehicle Authentication. In recent future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Vehicles will exchange warning messages over the wireless radio channel through Dedicated Short Range Communication (IEEE 1609) over the Wireless Access in Vehicular Environment (802.11p). Unfortunately, the wireless communication among ...

متن کامل

Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity authentication may not be sufficient or even appropriate, especially if a principal’s privacy is to be protected. In order to preserve privacy, o...

متن کامل

Anonymous authentication for privacy-preserving IoT target-driven applications

The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous authentication protocol for privacy-preserving IoT target-driven applications. Their system is set up by an ad-hoc community of decentralized founding nodes. Nodes can interact, being participants of cyberphysical ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Elektronika Ir Elektrotechnika

سال: 2023

ISSN: ['1392-1215', '2029-5731']

DOI: https://doi.org/10.5755/j02.eie.30990