Review on Identity-Based Batch Verification Schemes for Security and Privacy in VANETs

被引:0
|
作者
Eko Fajar Cahyadi [1 ,2 ]
Cahya Damarjati [1 ,3 ]
Min-Shiang Hwang [1 ,4 ]
机构
[1] Department of Computer Science and Information Engineering, Asia University
[2] Department of Telecommunication Engineering, Institut Teknologi Telkom Purwokerto  3. Department of Information Technology, Universitas Muhammadiyah Yogyakarta
[3] Department of Medical Research, China Medical University Hospital, China Medical University
关键词
D O I
暂无
中图分类号
TP309 [安全保密]; U463.6 [电气设备及附件];
学科分类号
080204 ; 081201 ; 082304 ; 0839 ; 1402 ;
摘要
The study of vehicular ad-hoc networks(VANETs) has received significant attention among academia;even so, its security and privacy still become a central issue that is wide-open to discuss. The authentication schemes deployed in VANETs have a substantial impact on its security and privacy. Many researchers have proposed a variety of schemes related to the information verification and efficiency improvement in VANETs. In recent years, many papers have proposed identity-based batch verification(IBV) schemes in regard to diminishing overhead in the message verification process in VANETs. This survey begins with providing background information about VANETs and clarifying its security and privacy, as well as performance requirements that must be satisfied.After presenting an outlook of some relevant surveys of VANETs, a brief review of some IBV schemes published in recent years is conferred. The detailed approach of each scheme, with a comprehensive comparison between them,has been provided afterward. Finally, we summarize those recent studies and possible future improvements.
引用
收藏
页码:92 / 110
页数:19
相关论文
共 50 条
  • [21] Comments on an identity-based signature scheme for VANETs
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [22] An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
    Sun, Jinyuan
    Zhang, Chi
    Zhang, Yanchao
    Fang, Yuguang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (09) : 1227 - 1239
  • [23] Privacy in an identity-based DRM system
    Conrado, C
    Kamperman, F
    Schrijen, GJ
    Jonker, W
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 389 - 395
  • [24] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [25] Hierarchical Identity-Based Identification Schemes
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 93 - +
  • [26] Identity-Based Trace and Revoke Schemes
    Duong Hieu Phan
    Viet Cuong Trinh
    PROVABLE SECURITY, 2011, 6980 : 204 - 221
  • [27] Identity-based proxy signcryption schemes
    Jian, Wu
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [28] On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
    Wang, Ding
    Cheng, Haibo
    He, Debiao
    Wang, Ping
    IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 916 - 925
  • [29] Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs
    Shim, Kyung-Ah
    IEEE ACCESS, 2023, 11 : 33956 - 33963
  • [30] A Novel Identity-based Broadcast Authentication Scheme with Batch Verification for Wireless Sensor Networks
    Feng, Meng
    Lai, Chin-Feng
    Liu, Hong
    Qi, Rongxin
    Shen, Jian
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1303 - 1311