Sumra et al., 2011 - Google Patents
New card based scheme to ensure security and trust in vehicular communicationsSumra et al., 2011
View PDF- Document ID
- 7344507092439446183
- Author
- Sumra I
- Hasbullah H
- Ahmad I
- et al.
- Publication year
- Publication venue
- 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC)
External Links
Snippet
Potential safety and non safety applications of vehicular network provide solutions to current traffic system. Dynamic topology of the vehicular communication network and high speed of the vehicles make it a challenging task of authenticating the users. Researchers have …
- 238000004891 communication 0 abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Metering, charging or billing arrangements specially adapted for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109922475B (en) | Vehicle authentication and message verification method under vehicle-mounted network environment | |
CN107888377B (en) | VANETs position privacy protection method based on random encryption period | |
CN113596778A (en) | Vehicle networking node anonymous authentication method based on block chain | |
Yeh et al. | PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks | |
CN109362062B (en) | ID-based group signature-based VANETs anonymous authentication system and method | |
Yeh et al. | PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks | |
Shahid et al. | Review of potential security attacks in VANET | |
Patel et al. | Vehiclechain: Blockchain-based vehicular data transmission scheme for smart city | |
Fan et al. | Strongly privacy-preserving communication protocol for VANETs | |
EP3439908A1 (en) | System for counting passengers | |
Guehguih et al. | Blockchain-based privacy-preserving authentication and message dissemination scheme for vanet | |
Zeng et al. | Mix‐Context‐Based Pseudonym Changing Privacy Preserving Authentication in VANETs | |
Sumra et al. | VANET security research and development ecosystem | |
Akil et al. | Non-interactive privacy-preserving sybil-free authentication scheme in vanets | |
Sumra et al. | New card based scheme to ensure security and trust in vehicular communications | |
Sumra et al. | Using TPM to ensure security, trust and privacy (STP) in VANET | |
Asl et al. | SyNORM: Symmetric non repudiated message authentication in vehicular ad hoc networks | |
Yang et al. | A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature | |
CN117527250A (en) | Revocable condition privacy protection authentication system in Internet of vehicles | |
CN114071463B (en) | Batch authentication method of vehicle-mounted self-organizing network based on bilinear mapping | |
Qin et al. | ECAS: An efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks | |
Asokraj et al. | Identity-Based Authentication for On-Demand Charging of Electric Vehicles | |
Wang et al. | A consortium blockchain-based model for data sharing in Internet of Vehicles | |
Lee et al. | FIT: Design and implementation of fast ID tracking system on chip for vehicular ad-hoc networks | |
Sumra et al. | Using trusted platform module (TPM) to secure business communication (SBC) in vehicular ad hoc network (VANET) |