|
M. Azees, P. Vijayakumar, and L. J. Deborah, “Comprehensive survey on security services in vehicular ad-hoc networks,” in Intelligent Transport Systems., vol. 10, no. 6, pp. 379–388, 2016.
S. M. Hatim, S. J. Elias, N. Awang, and Md. Y. Darus, “VANETS and Internet of Things (IoT): A discussion,” in Indonesian Journal of Electrical Engineering and Computer Science., vol. 12, no. 1, pp. 218–224, 2018.
M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, “Detecting misbehaviors in VANET with integrated root-cause analysis,” in Ad Hoc Networks., vol. 8, no. 7, pp. 778–790, 2010.
S. Chang, H. Zhu, M. Dong, K. Ota, X. Liu, and X. Shen, “Private and flexible urban message delivery,” in IEEE Transactions on Vehicular Technology., vol. 65, no. 7, pp. 4900–4910, 2016
J. Camenisch, M. Drijvers, A. Lehmann, G. Neven, and P. Towa, “Zone encryption with anonymous authentication for V2V communication,” in IEEE European Symposium on Security and Privacy conference., pp. 405–424, 2020.
A. Boukerche, H. A. B. F. de Oliveira, E. F. Nakamura, and A. A. F. Loureiro, “Vehicular ad hoc networks: A new challenge for localization based systems,” in Computer Communications., vol. 31, no. 12, pp. 2838–2849, 2008.
M. Raya, P. Papadimitratos and J. Hubaux, ”SECURING VEHICULAR COMMUNICATIONS,” in IEEE Wireless Communications., vol. 13, no. 5, pp. 8-15, 2006.
D. He, S. Zeadally, B. Xu, and X. Huang, “An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks,” in IEEE Transactions on Information Forensics and Security., vol. 10, pp. 2681–2691, 2015. B. Wang, Y. Wang, and R. A. Chen, “Practical authentication framework for VANETs,” in Security and Communication Networks., Article ID 4752612, 2019.
Y. Yarom and N. Benger, “Recovering OpenSSL ECDSA nonces using the FLUSH+ RELOAD cache side-channel attack,”in International Association for Cryptologic Research, Lyon, France., vol 2014, pp. 140, 2014.
M. Raya and J. Hubaux, “Securing vehicular ad hoc networks,” in Journal of Computer Security., vol. 15, no. 1, pp. 39–68, 2007.
D. Boneh, C. Gentry , B. Lynn , H. Shacham . “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,“ Proceedings of EUROCRYPT 2003., 2002.
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” in IEEE International Conference on Computer Communications., pp. 1229–1237, 2008.
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” in IEEE International Conference on Computer Communications., pp. 246–250, 2008.
C. Wang, Z. Dai, D. Zhao, and F. Wang, “A novel identity-based authentication scheme for IoV security,” in International Journal of Network Security., vol. 22, no. 4, pp. 627–637, 2020.
K. A. Shim, “CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks,” in IEEE Transactions on Vehicular Technology., vol. 61, no. 4, pp. 1874–1883, 2012.
M. S. I. Mamun and A. Miyaji, “A. Secure VANET applications with a redefined group signature,” in 2014 12th International Conference on Privacy., Security and Trust, pp. 199–206, 2014.
I. A. Kamil and S. O. Ogundoyin, ‘‘A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based Internet of Vehicles in smart cities,’’ in Journal of Information Security and Applications., vol. 63, 2021.
Q. Mei, H. Xiong, J. Chen, M. Yang, S. Kumari and M. K. Khan, ‘‘Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV, ’’ in IEEE Systems Journal., vol. 15, no. 1, pp. 245-256, 2021.
G. Thumbur, G. S. Rao, P. V. Reddy, N. B. Gayathri, D. V. R. K. Reddy and M. Padmavathamma, ‘‘Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks, ’’ in IEEE Internet of Things Journal., vol. 8, no. 3, pp. 1908-1920, 2021.
J. Cui, J. Zhang, and H. Zhong, “SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter,” in IEEE Transactions on Vehicular Technology., vol. 66, no. 11, pp. 10283–10295, 2017.
H. Wang, L. Wang, K. Zhang, J. Li and Y. Luo, "A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs," in IEEE Access., vol. 10, pp. 15605-15618, 2022.
S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology - ASIACRYPT 2003., pp. 452–473, 2003.
J. Li, H. Yuan, and Y. Zhang, “Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks,” in International Association for Cryptologic Research., vol. 2016, p. 692, 2016.
I. Ali, Y. Chen, N. Ullah, R. Kumar and W. He, "An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs," in IEEE Transactions on Vehicular Technology., vol. 70, no. 2, pp. 1278-1291, 2021.
X. Zhou, M. Luo, P. Vijayakumar, C. Peng and D. He, "Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs," in IEEE Transactions on Vehicular Technology., vol. 71, no. 7, pp. 7863-7875, 2022.
T. Gowri, G. S. Rao, P. V. Reddy, N. B. Gayathri, D. V. R. K. Reddy, and M. Padmavathamma, “Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks,” in IEEE Internet of Things Journal, vol. 8, no. 3., pp. 1908–1920, 2021.
H. Tan , D. Choi , P. Kim , S. Pan , I. Chung, “Secure certificateless authentication and road message dissemination protocol in VANETs,” in Wireless Communications and Mobile Computing, vol. 2018., pp1–13, 2018.
X. Hu, W. Tan and C. Ma, “Certificateless Aggregate Signature schemes for Privacy Protection of Security Anlysis and Improvement, ” in 2020 International Conference on Computer Science and Management Technology., pp. 314-317, 2020.
J. Cui, J. Zhang, H. Zhong, R. Shi, Y. Xu, “An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks”, in Information Sciences., vol 451–452, pp. 1-15, 2018.
H. Zhong, L. Chen, J. Cui, J. Zhang, I. Bolodurina and L. Liu, "Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks," in IEEE Internet of Things Journal., vol. 9, no. 11, pp. 8485-8497, 2022.
D. He, S. Zeadally, B. Xu and X. Huang, "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks," in IEEE Transactions on Information Forensics and Security., vol. 10, no. 12, pp. 2681-2691, 2015.
J. Li, Y. Ji, K. -K. R. Choo and D. Hogrefe, "CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles," in IEEE Internet of Things Journal., vol. 6, no. 6, pp. 10332-10343, 2019.
H. Wang, L. Wang, K. Zhang, J. Li and Y. Luo, "A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs," in IEEE Access., vol. 10, pp. 15605-15618, 2022.
V. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology — CRYPTO ’85 Proceedings., pp. 417–426, 1985.
N. Koblitz, A. Menezes, and S. Vanstone, “The state of elliptic curve cryptography,” in Designs, Codes and Cryptography., vol. 19, no. 2, pp. 173–193, 2000.
D. Johnson, and A. Menezes, ”The Elliptic Curve Digital Signature Algorithm” in International Journal of Information Security., vol. 1, pp 36-63, 2001.
M. Bafandehkar, M. Y. Sharifah, M. Ramlan and M. H. Zurina Mohd, “Comparison of ECC and RSA Algorithm in Resource Constrained Devices.” in 2013 International Conference on IT Convergence and Security., pp 1-3, 2013.
L. Sharon. “Performance and Security of ECDSA.” ,2015.
D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to elliptic curve cryptography. Springer Science & Business Media, 2004.
"bip-0032",https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki, 2022/07/31.
"bip-0044",https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki, 2022/07/31.
"bip-00329",https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki, 2022/07/31.
J. B. Kenney, “Dedicated Short-Range Communications Standards in the United States,” in Proceedings of the IEEE., vol. 99, no. 7, pp. 1162–1182, 2011.
P. Bagga, A. K. Das, M. Wazid, J. J. Rodrigues, and Y. Park, “Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges,” in IEEE Access., vol. 8, pp. 54314–54344, 2020.
T. N. Mathew and V. Uma, "VANET security -Analysis and survey," in 2018 International Conference on Control, Power, Communication and Computing Technologies., pp. 100-106, 2020.
W. Cheng, E. Luo, Y. Tang, L. Wan and M. Wei, "A Survey on Privacy-security in Internet of Vehicles," 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress., pp. 644-650, 2021.
A. Shamir, ”How to Share a Secret,” in Communications of the Acm, vol. 22, no. 11, pp. 612-613, 1979.
G. R. Blakley, ”Safeguarding cryptographic keys,” in 1979 International Workshop on Managing Requirements Knowledge., pp. 313-318, 1979.
A. Kamil and S. O. Ogundoyin, ‘‘On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network,’’ in Security and Privacy., vol. 3, no. 3, pp. 1-20, 2020.
I. A. Kamil and S. O. Ogundoyin, “An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks,” in Journal of Information Security and Applications., vol. 44, pp. 184–200, 2019.
|