[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sumra et al., 2011 - Google Patents

New card based scheme to ensure security and trust in vehicular communications

Sumra et al., 2011

View PDF
Document ID
7344507092439446183
Author
Sumra I
Hasbullah H
Ahmad I
et al.
Publication year
Publication venue
2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC)

External Links

Snippet

Potential safety and non safety applications of vehicular network provide solutions to current traffic system. Dynamic topology of the vehicular communication network and high speed of the vehicles make it a challenging task of authenticating the users. Researchers have …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Metering, charging or billing arrangements specially adapted for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services

Similar Documents

Publication Publication Date Title
CN109922475B (en) Vehicle authentication and message verification method under vehicle-mounted network environment
CN107888377B (en) VANETs position privacy protection method based on random encryption period
CN113596778A (en) Vehicle networking node anonymous authentication method based on block chain
Yeh et al. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
CN109362062B (en) ID-based group signature-based VANETs anonymous authentication system and method
Yeh et al. PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks
Shahid et al. Review of potential security attacks in VANET
Patel et al. Vehiclechain: Blockchain-based vehicular data transmission scheme for smart city
Fan et al. Strongly privacy-preserving communication protocol for VANETs
EP3439908A1 (en) System for counting passengers
Guehguih et al. Blockchain-based privacy-preserving authentication and message dissemination scheme for vanet
Zeng et al. Mix‐Context‐Based Pseudonym Changing Privacy Preserving Authentication in VANETs
Sumra et al. VANET security research and development ecosystem
Akil et al. Non-interactive privacy-preserving sybil-free authentication scheme in vanets
Sumra et al. New card based scheme to ensure security and trust in vehicular communications
Sumra et al. Using TPM to ensure security, trust and privacy (STP) in VANET
Asl et al. SyNORM: Symmetric non repudiated message authentication in vehicular ad hoc networks
Yang et al. A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature
CN117527250A (en) Revocable condition privacy protection authentication system in Internet of vehicles
CN114071463B (en) Batch authentication method of vehicle-mounted self-organizing network based on bilinear mapping
Qin et al. ECAS: An efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks
Asokraj et al. Identity-Based Authentication for On-Demand Charging of Electric Vehicles
Wang et al. A consortium blockchain-based model for data sharing in Internet of Vehicles
Lee et al. FIT: Design and implementation of fast ID tracking system on chip for vehicular ad-hoc networks
Sumra et al. Using trusted platform module (TPM) to secure business communication (SBC) in vehicular ad hoc network (VANET)