【摘 要】
:
To solve the efficiency problem of batch anonymous authentication for vehicular Ad-hoc networks (VANET),an improved scheme is proposed by using bilinear pairing on elliptic curves.The signature is jointly generated by roadside unit (RSU) node and vehicle,
【机 构】
:
School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China
论文部分内容阅读
To solve the efficiency problem of batch anonymous authentication for vehicular Ad-hoc networks (VANET),an improved scheme is proposed by using bilinear pairing on elliptic curves.The signature is jointly generated by roadside unit (RSU) node and vehicle,thus reducing the burden of VANET certification center and improving the authentication efficiency,and making it more difficult for attacker to extract the key.Furthermore,under random oracle model (ROM) security proof is provided.Analyses show that the proposed scheme can defend against many kinds of security problems,such as anonymity,man-in-the-middle (MITM) attack,collusion attack,unforgeability,forward security and backward security etc.,while the computational overheads are significantly reduced and the authentication efficiency is effectively improved.Therefore,the scheme has great theoretical significance and application value under computational capability constrained Internet of things (IoT) environments.
其他文献
Aimed at enhancing privacy protection of location-based services (LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is proposed.In circular region of Euclidian d
Cloud storage is getting more and more popular as a new trend of data management.Data replication has been widely used to increase the data availability in cloud storage systems.However,most data replication schemes do not fully consider cost and latency
The new encoding tools of high efficiency video coding (HEVC) make the interpolation operation more complex in motion compensation (MC) for better video compression,but impose higher requirements on the computational efficiency and control logic of the ha
Network virtualization provides a powerful way of sharing substrate networks.Efficient allocation of network resources for multiple virtual networks (VNs) has always been a challenging task.Especially under the ever-increasing demand of customized VN requ
With the boom of wireless devices,the number of wireless users under wireless local area networks (WLANs) has increased dramatically.However,the standard backoff mechanism in IEEE 802.11 adopts fixed initial contention window (CW) size without considering
A two-dimensional direction-of-arrival (DOA) estimation method for non-uniform two-L-shaped array is presented in which the element spacing is larger than half-wavelength.To extract automatically paired low-variance cyclically ambiguous direction cosines
As a kind of cryptocurrency,bitcoin has attracted much attention with its decentralization.However,there is two problems in the bitcoin transactions:the account security and transaction privacy.In view of the above problems,a new partially blind threshold
Layer 2 network technology is extending beyond its traditional local area implementation and finding wider acceptance in provider\'s metropolitan area networks and large-scale cloud data center networks.This is mainly due to its plug-and-play capability
With the popularity of adaptive multi-rate wideband (AMR-WB) audio in mobile communication,many AMRWB based techniques,such as a similar compression architecture to transmit secret information during the process of compression,were proposed to transmit co
Non-binary low density parity check (NB-LDPC) codes are considered as preferred candidate in conditions where short/medium codeword length codes and better performance at low signal to noise ratios (SNR) are required.They have better burst error correctin