Review on Identity-Based Batch Verification Schemes for Security and Privacy in VANETs

被引:0
|
作者
Eko Fajar Cahyadi [1 ,2 ]
Cahya Damarjati [1 ,3 ]
Min-Shiang Hwang [1 ,4 ]
机构
[1] Department of Computer Science and Information Engineering, Asia University
[2] Department of Telecommunication Engineering, Institut Teknologi Telkom Purwokerto  3. Department of Information Technology, Universitas Muhammadiyah Yogyakarta
[3] Department of Medical Research, China Medical University Hospital, China Medical University
关键词
D O I
暂无
中图分类号
TP309 [安全保密]; U463.6 [电气设备及附件];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
The study of vehicular ad-hoc networks(VANETs) has received significant attention among academia;even so, its security and privacy still become a central issue that is wide-open to discuss. The authentication schemes deployed in VANETs have a substantial impact on its security and privacy. Many researchers have proposed a variety of schemes related to the information verification and efficiency improvement in VANETs. In recent years, many papers have proposed identity-based batch verification(IBV) schemes in regard to diminishing overhead in the message verification process in VANETs. This survey begins with providing background information about VANETs and clarifying its security and privacy, as well as performance requirements that must be satisfied.After presenting an outlook of some relevant surveys of VANETs, a brief review of some IBV schemes published in recent years is conferred. The detailed approach of each scheme, with a comprehensive comparison between them,has been provided afterward. Finally, we summarize those recent studies and possible future improvements.
引用
收藏
页码:92 / 110
页数:19
相关论文
共 50 条
  • [41] Identity-Based Encryption with Forward Security
    Li, Hongwei
    Yang, Haomiao
    Li, Fan
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290
  • [42] Identity-based ring signcrytion schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
    Huang, XY
    Susilo, W
    Mu, Y
    Zhang, FT
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 649 - 654
  • [43] Identity-Based Proofs of Storage with Enhanced Privacy
    Tian, Miaomiao
    Ye, Shibei
    Zhong, Hong
    Wang, Lingyan
    Chen, Fei
    Cui, Jie
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 461 - 480
  • [44] An Identity-Based and Revocable Data-Sharing Scheme in VANETs
    Horng, Shi-Jinn
    Lu, Cheng-Chung
    Zhou, Wanlei
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15933 - 15946
  • [45] Identity-Based Broadcast Encryption with Recipient Privacy
    Zhang, Weimin
    Xu, Qiuliang
    He, Peng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 483 - 487
  • [46] Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System
    Zhou, Jing-xian
    Yan, Jian-hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12): : 6243 - 6259
  • [47] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [48] Interdomain Identity-Based Key Agreement Schemes
    Fan, Chun-I
    Lin, Yi-Hui
    Hsu, Tuan-Hung
    Hsu, Ruei-Hau
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [49] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [50] Argument on biometrics identity-based encryption schemes
    Tan, Syh-Yuan
    Jin, Zhe
    Teoh, Andrew Beng Jin
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1344 - 1352