4.7 Article

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs

Chao Lin et al.

Summary: In this article, a blockchain-based conditional privacy-preserving authentication (BCPPA) protocol is proposed to balance anonymity, traceability, and key/certificate management in VANETs. The proposed protocol, named EBCPA, is more efficient and can meet the high mobility, low latency, and real-time requirements of VANETs. Implementation and comparison results show that EBCPA can reduce the time cost of traceability by at least 48.95% and verification by at least 42.21%.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Software Engineering

Multidomain security authentication for the Internet of things

Qikun Zhang et al.

Summary: This study proposes a certificateless multidomain authentication technology for IoT, which utilizes bilinear mapping and short signature technology to achieve mutual authentication among entities in different domains, addressing the security and privacy issues of multidomain interaction.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2022)

Article Engineering, Electrical & Electronic

Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network

Quanrun Li et al.

Summary: This paper proposes a lattice-based conditional privacy-preserving authentication protocol for VANETs, aiming to achieve mutual authentication and privacy protection simultaneously. The potential utility of the protocol is demonstrated by evaluating its performance.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Automation & Control Systems

Toward Cross-Domain Dynamic Accumulator Authentication Based on Blockchain in Internet of Things

Linjie Wang et al.

Summary: In this article, a solution based on relationship authentication is proposed to address the authentication problem in the Internet of Things (IoT). By constructing a undirected graph and incorporating accumulator knowledge and digital signature scheme, the legality of authentication is well-verified. Furthermore, the efficiency and online time of authority are solved by leveraging blockchain technology.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones

Chaosheng Feng et al.

Summary: This article proposes a blockchain-based cross-domain authentication scheme for intelligent 5G-enabled Internet of drones. By utilizing multiple signatures and smart contracts to establish an identity federation for collaborative domains, the scheme supports domain joining and exiting, and ensures reliable communication between cross-domain devices.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

Jing Zhang et al.

Summary: The proposed conditional privacy-preserving authentication scheme based on Chinese remainder theorem aims to address the challenge of fast authentication in Vehicular Ad-hoc Networks. By using realistic TPDs, the scheme enhances the security of the entire system.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Engineering, Electrical & Electronic

An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs

Ikram Ali et al.

Summary: In this paper, a certificateless short signature-based conditional privacy-preserving authentication (CLSS-CPPA) scheme for V2V communication is designed, improving performance in terms of computational and communication costs. The scheme is based on the elliptic curve cryptosystem (ECC) and does not use bilinear pairings or map-to-point hash functions, supporting batch signature verification for efficiency.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks

Xiang Liu et al.

Summary: This paper introduces the concept of cross-company satellite services in SGIN and proposes an anonymous authentication scheme that supports fast handover and fair billing procedures.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Theory & Methods

P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks

Xia Feng et al.

Summary: This paper proposes a novel privacy-preserving authentication protocol in bilinear groups, where registered vehicles sign traffic-related messages and send them to nearby Roadside Units (RSUs) along with blinded certificates to reduce computation time and storage overhead. The protocol provides privacy properties such as anonymity and unlinkability, showing improved performance in terms of computation overhead and latency compared to existing schemes.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs

Wanjun Xiong et al.

Summary: This paper introduces a conditional privacy-preserving authentication scheme for VANETs constructed in cyclic groups on elliptic curves. It can prevent security issues caused by private key theft and support batch verification to improve efficiency.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT

Meng Shen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Information Systems

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes

Chao Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Theory & Methods

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment

Jie Cui et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs

Yujue Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Hardware & Architecture

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

Debiao He et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Engineering, Electrical & Electronic

CPAS: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks

Kyung-Ah Shim

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Article Engineering, Electrical & Electronic

GSTS: A secure and privacy-preserving protocol for vehicular communications

Xiaodong Lin et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)