Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks

التفاصيل البيبلوغرافية
العنوان: Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks
المؤلفون: Imran Memon, Qasim Ali Arain, Hina Memon
المصدر: Wireless Personal Communications. 116:3309-3329
بيانات النشر: Springer Science and Business Media LLC, 2020.
سنة النشر: 2020
مصطلحات موضوعية: Authentication, Computer science, business.industry, Network packet, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Encryption, Computer Science Applications, Secure communication, Authentication protocol, Scalability, 0202 electrical engineering, electronic engineering, information engineering, Overhead (computing), 020201 artificial intelligence & image processing, Electrical and Electronic Engineering, business, Intelligent transportation system, Computer network
الوصف: A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks.
تدمد: 1572-834X
0929-6212
DOI: 10.1007/s11277-020-07854-6
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::e4c6e53b55afddbd7212f08df6b06020
https://doi.org/10.1007/s11277-020-07854-6
Rights: CLOSED
رقم الانضمام: edsair.doi...........e4c6e53b55afddbd7212f08df6b06020
قاعدة البيانات: OpenAIRE
الوصف
تدمد:1572834X
09296212
DOI:10.1007/s11277-020-07854-6