Review on Identity-Based Batch Verification Schemes for Security and Privacy in VANETs

被引:0
|
作者
Eko Fajar Cahyadi [1 ,2 ]
Cahya Damarjati [1 ,3 ]
Min-Shiang Hwang [1 ,4 ]
机构
[1] Department of Computer Science and Information Engineering, Asia University
[2] Department of Telecommunication Engineering, Institut Teknologi Telkom Purwokerto  3. Department of Information Technology, Universitas Muhammadiyah Yogyakarta
[3] Department of Medical Research, China Medical University Hospital, China Medical University
关键词
D O I
暂无
中图分类号
TP309 [安全保密]; U463.6 [电气设备及附件];
学科分类号
080204 ; 081201 ; 082304 ; 0839 ; 1402 ;
摘要
The study of vehicular ad-hoc networks(VANETs) has received significant attention among academia;even so, its security and privacy still become a central issue that is wide-open to discuss. The authentication schemes deployed in VANETs have a substantial impact on its security and privacy. Many researchers have proposed a variety of schemes related to the information verification and efficiency improvement in VANETs. In recent years, many papers have proposed identity-based batch verification(IBV) schemes in regard to diminishing overhead in the message verification process in VANETs. This survey begins with providing background information about VANETs and clarifying its security and privacy, as well as performance requirements that must be satisfied.After presenting an outlook of some relevant surveys of VANETs, a brief review of some IBV schemes published in recent years is conferred. The detailed approach of each scheme, with a comprehensive comparison between them,has been provided afterward. Finally, we summarize those recent studies and possible future improvements.
引用
收藏
页码:92 / 110
页数:19
相关论文
共 50 条
  • [31] Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing
    Zhao, Jining
    Xu, Chunxiang
    Chen, Kefei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 1043 - 1063
  • [32] Identity-based cryptography for grid security
    Lim, HW
    Paterson, KG
    FIRST INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2005, : 395 - 404
  • [33] Identity-Based Batch Provable Data Possession
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    Xu, Zifeng
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 112 - 129
  • [34] EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs
    Yong Xie
    LiBing Wu
    Jian Shen
    Abdulhameed Alelaiwi
    Telecommunication Systems, 2017, 65 : 229 - 240
  • [35] Identity-based cryptography for grid security
    Lim, Hoon Wei
    Paterson, Kenneth G.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 15 - 32
  • [36] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [37] EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs
    Xie, Yong
    Wu, LiBing
    Shen, Jian
    Alelaiwi, Abdulhameed
    TELECOMMUNICATION SYSTEMS, 2017, 65 (02) : 229 - 240
  • [38] Survey of security on identity-based cryptography
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2009, 9 (1537-1548):
  • [39] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [40] Identity-Based Encryption with Forward Security
    Li, Hongwei
    Yang, Haomiao
    Li, Fan
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290