Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks
العنوان: | Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks |
---|---|
المؤلفون: | Imran Memon, Qasim Ali Arain, Hina Memon |
المصدر: | Wireless Personal Communications. 116:3309-3329 |
بيانات النشر: | Springer Science and Business Media LLC, 2020. |
سنة النشر: | 2020 |
مصطلحات موضوعية: | Authentication, Computer science, business.industry, Network packet, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Encryption, Computer Science Applications, Secure communication, Authentication protocol, Scalability, 0202 electrical engineering, electronic engineering, information engineering, Overhead (computing), 020201 artificial intelligence & image processing, Electrical and Electronic Engineering, business, Intelligent transportation system, Computer network |
الوصف: | A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks. |
تدمد: | 1572-834X 0929-6212 |
DOI: | 10.1007/s11277-020-07854-6 |
URL الوصول: | https://explore.openaire.eu/search/publication?articleId=doi_________::e4c6e53b55afddbd7212f08df6b06020 https://doi.org/10.1007/s11277-020-07854-6 |
Rights: | CLOSED |
رقم الانضمام: | edsair.doi...........e4c6e53b55afddbd7212f08df6b06020 |
قاعدة البيانات: | OpenAIRE |
تدمد: | 1572834X 09296212 |
---|---|
DOI: | 10.1007/s11277-020-07854-6 |