scispace - formally typeset
Journal ArticleDOI

PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks

Reads0
Chats0
TLDR
A Privacy Preserving Revocation mechanism (PPREM) based on a universal one-way accumulator provides explicit, concise, authenticated and unforgeable information about the revocation status of each certificate while preserving the users' privacy.
About
This article is published in Computer Standards & Interfaces.The article was published on 2014-03-01. It has received 30 citations till now. The article focuses on the topics: Vehicular ad hoc network & Revocation.

read more

Citations
More filters
Journal ArticleDOI

A Security and Privacy Review of VANETs

TL;DR: The general secure process and point out authentication methods involved in these processes involved in VANETs are presented and detailed survey of these authentication algorithms followed by discussions comes afterward.
Journal ArticleDOI

An intelligent approach for building a secure decentralized public key infrastructure in VANET

TL;DR: An efficient decentralized public key infrastructure (PKI) using the concepts of Bayesian Coalition Game (BCG) and Learning Automata (LA) and the results obtained prove the superiority of the proposed scheme.
Journal ArticleDOI

Security of vehicular ad-hoc networks: A comprehensive survey

TL;DR: How the research reflects the evolutionary growth of security attacks with its future prophesy, based upon the past developments in the area of computer security is discussed.
Journal ArticleDOI

Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)

TL;DR: By simulation results, it is proved that the proposed trust-based authentication scheme for cluster-based VANETs provides high security with less overhead and delay.
Proceedings ArticleDOI

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET)

TL;DR: This work proposes PUCA - a scheme that provides full anonymity, even against colluding backend providers, until the owner of a vehicle triggers revocation himself, while still allowing revocation of long-term credentials.
References
More filters
Proceedings Article

VPriv: protecting privacy in location-based vehicular services

TL;DR: VPriv provides the first practical protocol to compute path functions for various kinds of tolling, speed and delay estimation, and insurance calculations in a way that does not reveal anything more than the result of the function to the server, and an out-of-band enforcement mechanism using random spot checks that allows the server and application to handle misbehaving users.

Certificate Revocation List Distribution in Vehicular Communication Systems : EPFL Technical Report, LCA-REPORT-2008-019

TL;DR: Certificate revocation list distribution in Vehicular Communication Systems as discussed by the authors, EPFL Technical  report, LCA-REPORT-2008-019, is the most relevant work to ours.
Book ChapterDOI

An Efficient Dynamic and Distributed Cryptographic Accumulator

TL;DR: An accumulator-based scheme for authenticated dictionaries that supports efficient incremental updates of the underlying set by insertions and deletions of elements and can optimally verify in constant time the authenticity of the answer provided by a directory with a simple and practical algorithm.
Journal ArticleDOI

DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks

TL;DR: The proposed DCS scheme offers flexible interoperability for certificate service in heterogeneous administrative authorities and an efficient way for any onboard units to update its certificate from the available infrastructure roadside units in a timely manner.

Certificate Revocation in Vehicular Networks

TL;DR: This paper proposes a protocol that enables nodes to collectively shield themselves against faulty of mali-cious operation of other nodes and contribute to theireviction, and shows that this solution is feasible and achieves a su±cient level of bustness in spite of the unique challenges of the vehic-ular networking environment.
Related Papers (5)