Citation: | XIE Yong, WU Libing, ZHANG Yubo, et al., “Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs,” Chinese Journal of Electronics, vol. 25, no. 5, pp. 950-956, 2016, doi: 10.1049/cje.2016.08.027 |
M.S. Kakkasageri and S.S. Manvi, "Information management in vehicular ad hoc networks:A review", Journal of Network and Computer Applications, Vol.39, pp.334-350, 2014.
|
H. Hartenstein and K.P. Laberteaux, "A tutorial survey on vehicular ad hoc networks", IEEE Communications Magazine, Vol.46, No.6, pp.164-171,2008.
|
D.B. He, N. Kumar and N. Chilamkurti, "A secure temporalcredential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks", Information Sciences, Vol.321, pp.263-277, 2015.
|
J. Li, H. Lu and M. Guizani, "ACPN:A novel authentication framework with conditional privacy-preservation and nonrepudiation for VANETs", IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.4, pp.938-948, 2015.
|
M. Bayat, M. Barmshoory, M. Rahimi, et al., "A secure authentication scheme for VANETs with batch verification", Wireless networks, Vol.21, No.5, pp.1733-1743, 2015.
|
D. He, S. Zeadally, N. Kumar, et al., "One-to-many authentication for access control in mobile pay-TV systems", Science China Information Sciences, Vol.59, No.5, pp.1-14, 2016.
|
M. Raya and J.P. Hubaux, "Securing vehicular ad hoc networks", Journal of Computer Security, Vol.15, No.1, pp.39-68, 2007.
|
J. Freudiger, M. Raya, Z. Felegyha, et al., "Mix-zones for location privacy in vehicular networks", Proc. of ACM Workshop on Wireless Networking for Intelligent Transportation Systems, Vancouver, CA, pp.1-7, 2007.
|
R. Lu, X. Lin, H. Zhu, et al., "ECPP:Efficient conditional privacy preservation protocol for secure vehicular communications", Proc. of IEEE INFOCOM08, Phoenix, AZ, pp.1903-1911, 2008.
|
C. Zhang, X. Lin, R. Lu, et al., "RAISE:An efficient RSU-aided message authentication scheme in vehicular communication networks", Proc. of IEEE ICC'08, Beijing, China, pp.1451-1457, 2008.
|
C. Zhang, R. Lu, X. Lin, et al., "An efficient identity-based batch verification scheme for vehicular sensor networks", Proc. of IEEE INFOCOM08, Phoenix, AZ, pp.816-824, 2008.
|
C.C. Lee and Y.M. Lai, "Toward a secure batch verification with group testing for VANET", Wireless Networks, Vol.19, No.6, pp.1441-1449, 2013.
|
T.W. Chim, S.M. Yiu, L.C.K. Hui, et al., "SPECS:Secure and privacy enhancing communications schemes for VANETs", Ad Hoc Networks, Vol.9, No.2, pp.189-203, 2011.
|
S.J. Horng, S.F. Tzeng, Y. Pan, et al., "b-SPECS+:Batch verification for secure pseudonymous authentication in VANET", IEEE Transactions on Information Forensics and Security, Vol.8, No.11, pp.1860-1875, 2013.
|
J.L. Huang, L.Y. Yeh and H.Y. Chien, "ABAKA:An anonymous batch authenticated and key agreement scheme for valueadded services in vehicular ad hoc networks", IEEE Transactions on Vehicular Technology, Vol.60, No.1, pp.248-262, 2011.
|
K.A. Shim, "An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks", IEEE Transactions on Vehicular Technology, Vol.61, No.4, pp.1874-1883, 2012.
|
J.K. Liu, T.H. Yuen, M.H. Au, et al., "Improvements on an authentication scheme for vehicular sensor networks", Expert Systems with Applications, Vol.41, No.5, pp.2559-2564, 2014.
|
C. Zhang, P.H. Ho and J. Tapolcai, "On batch verification with group testing for vehicular communications", Wireless Networks, Vol.17, No.8, pp.1851-1865, 2011.
|
J.H. Zhang, M. Xu and L.Y. Liu, "On the security of a secure batch verification with group testing for VANET", International Journal of Network Security, Vol.16, No.4, pp.313-3320, 2014.
|
D. He, S. Zeadally, N. Kumar, et al., "Anonymous authentication for wireless body area networks with provable security", IEEE System Journal, Vol.21, No.1, pp.1-12, 2016.
|
K.A. Shim, "An ID-based aggregate signature scheme with constant pairing computations", Journal of Systems and Software, Vol.83, No.10, pp.1873-1880, 2010.
|
J. Shen, H. Tan, J. Wang, et al., "A novel routing protocol providing good transmission reliability in underwater sensor networks", Journal of Internet Technology, Vol.16, No.1, pp.171-178, 2015.
|
D. He and S. Zeadally, "Authentication protocol for ambient assisted living system", IEEE Communications Magazine, Vol.53, No.1, pp.71-77, 2015.
|
P.Guo, J. Wang, B. Li, et al., "A variable threshold-value authentication architecture for wireless mesh networks", Journal of Internet Technology, Vol.15, No.6, pp.929-936, 2014.
|