Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Privacy-Preserving Authentication in VANETs

View through CrossRef
Vehicular Ad Hoc Networks (VANETs) are transforming urban transportation by addressing challenges like traffic congestion, road safety, and vehicular pollution. They enable real-time communication between vehicles and infrastructure, improving traffic flow, reducing accidents, and lowering emissions through optimized route planning and reduced idle times. With advanced sensors and data analytics, VANETs adapt dynamically to traffic conditions and facilitate efficient navigation for emergency vehicles, enhancing urban mobility amid growing transportation demands. The continuous broadcasting of vehicle information raises privacy concerns, as this data can be exploited to track and identify drivers. These concerns become even more complex in the context of privacy-preserving vehicle rentals, where existing protocols do not adequately protect the security needs of owners and renters, especially when vehicles are shared. Addressing these privacy and security issues is crucial for the widespread adoption of VANETs. This thesis presents a comprehensive framework that enhances privacy and security in VANETs through novel authentication schemes. The proposed protocols ensure secure, privacy-preserving communications and allow vehicles to be shared among multiple drivers without compromising network security. Additionally, the thesis analyzes the underlying security requirements and proposes robust, scalable solutions compatible with future transportation advancements. These contributions lay the foundation for broader VANET adoption, supporting the transition to smarter, more efficient, and more secure urban transportation systems.
Karlstad University Press
Title: Privacy-Preserving Authentication in VANETs
Description:
Vehicular Ad Hoc Networks (VANETs) are transforming urban transportation by addressing challenges like traffic congestion, road safety, and vehicular pollution.
They enable real-time communication between vehicles and infrastructure, improving traffic flow, reducing accidents, and lowering emissions through optimized route planning and reduced idle times.
With advanced sensors and data analytics, VANETs adapt dynamically to traffic conditions and facilitate efficient navigation for emergency vehicles, enhancing urban mobility amid growing transportation demands.
The continuous broadcasting of vehicle information raises privacy concerns, as this data can be exploited to track and identify drivers.
These concerns become even more complex in the context of privacy-preserving vehicle rentals, where existing protocols do not adequately protect the security needs of owners and renters, especially when vehicles are shared.
Addressing these privacy and security issues is crucial for the widespread adoption of VANETs.
This thesis presents a comprehensive framework that enhances privacy and security in VANETs through novel authentication schemes.
The proposed protocols ensure secure, privacy-preserving communications and allow vehicles to be shared among multiple drivers without compromising network security.
Additionally, the thesis analyzes the underlying security requirements and proposes robust, scalable solutions compatible with future transportation advancements.
These contributions lay the foundation for broader VANET adoption, supporting the transition to smarter, more efficient, and more secure urban transportation systems.

Related Results

Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for ...
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, t...

Back to Top