Investigate key management and authentication models in VANETs

  • Lu Song*
  • , Qingtong Han
  • , Jianwei Liu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Vehicular ad hoc networks (VANETs) are being designed to convenience traffic, keep safety and provide services to drivers. To meet this goal, the vehicles involved should be trustworthy which eagerly needs valid V2V, V2I, I2V authentication. As to the authentication models used in VANETs, many organizations and research centers have done lots of work. The latest authentication models used in VANETs can be divided into several categories based on the cryptographic schemes and algorithms. While the representative models have their own pros and cons which also have fixed suitable scenes, we make conclusions about the latest research results. Furthermore, the future development and difficult points are analyzed at last.

Original languageEnglish
Title of host publication2011 International Conference on Electronics, Communications and Control, ICECC 2011 - Proceedings
Pages1516-1519
Number of pages4
DOIs
StatePublished - 2011
Event2011 International Conference on Electronics, Communications and Control, ICECC 2011 - Ningbo, China
Duration: 9 Sep 201111 Sep 2011

Publication series

Name2011 International Conference on Electronics, Communications and Control, ICECC 2011 - Proceedings

Conference

Conference2011 International Conference on Electronics, Communications and Control, ICECC 2011
Country/TerritoryChina
CityNingbo
Period9/09/1111/09/11

Keywords

  • CA
  • VANETs
  • authentication
  • digital signature
  • security

Fingerprint

Dive into the research topics of 'Investigate key management and authentication models in VANETs'. Together they form a unique fingerprint.

Cite this