scispace - formally typeset
Journal ArticleDOI

Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks

Reads0
Chats0
TLDR
This paper is among the first to provide a comprehensive survey of the existing authentication and privacy schemes and compare them based on all security and privacy requirements, computational and communicational overheads, and the level of resistance to different types of attacks.
Abstract
Vehicular ad hoc networks (VANETs) have become increasingly common in recent years due to their critical role in the field of smart transportation by supporting Vehicle-to-Vehicle and Vehicle-to-Infrastructure communication. The security and privacy of VANET are of the utmost importance due to the use of an open wireless communication medium where messages are exchanged in plain text, something which allows attackers to intercept, tamper, replay, and delete them. Hence, there is a high probability that the safety of a VANET-based smart transportation system could be compromised. Nowadays, securing and safeguarding the exchange of messages in VANETs is the focus of many security research teams, as reflected by the number of authentication and privacy schemes that have been proposed. However, these schemes have not fulfilled all aspects of the security and privacy requirements. The present paper is an effort to provide a thorough background on VANETs and their components; various types of attacks on them; and all the security and privacy requirements for authentication and privacy schemes for VANETs. This paper is among the first to provide a comprehensive survey of the existing authentication and privacy schemes and compare them based on all security and privacy requirements, computational and communicational overheads, and the level of resistance to different types of attacks. It also provides a qualitative comparison with the existing surveys. This paper could serve as a guide and reference in the design and development of any new security and privacy techniques for VANETs.

read more

Citations
More filters
Journal ArticleDOI

A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network

TL;DR: In this paper, a taxonomy of authentication schemes in VANETs has been presented, and the authentication schemes have been compared with security, privacy and scalability requirement with the use of recent technologies such as 5G, 5G-SDN, and Blockchain.
Journal ArticleDOI

Driver Fatigue Detection Systems Using Multi-Sensors, Smartphone, and Cloud-Based Computing Platforms: A Comparative Analysis.

TL;DR: In this paper, the authors reviewed state-of-the-art approaches for predicting unsafe driving styles using three common IoT-based architectures, including multi-sensors, smartphone-based, and cloud-based architecture in multimodal feature processing.
Journal ArticleDOI

CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks

TL;DR: A chaotic map-based conditional privacy-preserving authentication (CM-CPPA) scheme is proposed to provide communication security in 5G-enabled vehicular networks in this paper and decreases the overhead of computation of verifying the signatures and signing the messages.
Journal ArticleDOI

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey

TL;DR: In this paper, the authors provide a comprehensive survey on VANETs and the entities involved, attack models, and an analysis of the security and privacy requirements for identity-based Security and privacy schemes.
Journal ArticleDOI

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network

TL;DR: This paper proposes an identity-based conditional privacy-preserving authentication scheme that supports a batch verification process for the simultaneous verification of multiple messages by each node, making it viable for large-scale VANETs deployment.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Dedicated Short-Range Communications (DSRC) Standards in the United States

TL;DR: The content and status of the DSRC standards being developed for deployment in the United States are explained, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment.
Proceedings Article

Group signatures

TL;DR: A new type of signature for a group of persons, called a group signature, which has the following properties: only members of the group can sign messages; and if necessary, the signature can be "opened", so that the person who signed the message is revealed.
Journal ArticleDOI

Securing vehicular ad hoc networks

TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Proceedings ArticleDOI

The security of vehicular ad hoc networks

TL;DR: A set of security protocols are provided, it is shown that they protect privacy and the robustness of these protocols are analyzed, and a quantitative assessment of the proposed solution is carried out.
Related Papers (5)