Skip to content

Paper reviews


1. AHL,2019

Title: Authentication and privacy schemes for vehicular ad hoc networks(VANETs): A survey

Section 2

The authentication process comprises two major phases (i.e. signing and verifying).

...

Therefore in VANETs, source and message authenticaion is believed to be the most vital security requirement.

...

The TA can trace and reveal the real identity of the malicious entity (vehicle or RSU) and has the ability to extract the real identity from the entity's pseudoidentity when there is

...

The other security requirements i.e. non-repudiation, traceability, etc. depend on successful authentication and privacy which are very necessary for the practicality of VANETs.

1-1. Existing Surveys

Literature Key words
K091 location privacy
WTM092 classification based on communication requirements
KAE113 main ITS projects and programs
RAF114 asymmetric key, symmetric key, infrastructure requirement
SDBZ145 overview on wireless access technologies, simlulation tools
MBH146 privacy and security issues
VSSS147 a broad appraisal of security and authentication schemes
KB178 an overview on VANETs
QWWC179 general secure process, authentication methods
PSFK1510 abstract pseudonym life-cycle
LDTM1611 vital viewpoint of VANETs applications, attack types
BSM1812 pseudonm changing strategies

1-2. Classification

Section 4

These schemes employ modern cryptography mechanisms, such as PKC, ID_PKC and certificateless public key cryptography (CL-PKC).

...

We classify these schemes according to the mechanisms used such as pseudonymous based authentication and privacy schemes (PAPS), group signature based authentication and privacy schemes (GAPS), ID-PKC based authentication and privacy shemes (IAPS), and hybrid anonymous based authentication and privacy scheme (HAPS).

1-3. PAPs


  1. J. Krumm, “A survey of computational location privacy,” Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391–399, 2009. 

  2. T. L. Willke, P. Tientrakool, and N. F. Maxemchuk, “A survey of inter-vehicle communication protocols and their applications,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 3–20, 2009. 

  3. G. Karagiannis et al., “Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions,” IEEE communications surveys & tutorials, vol. 13, no. 4, pp. 584–616, 2011. 

  4. M. Riley, K. Akkaya, and K. Fong, “A survey of authentication schemes for vehicular ad hoc networks,” Security and Communication Networks, vol. 4, no. 10, pp. 1137–1152, 2011. 

  5. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” Journal of network and computer applications, vol. 37, pp. 380–392, 2014. 

  6. M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Vehicular Communications, vol. 1, no. 2, pp. 53–66, 2014. 

  7. V. Vijayalakshmi, M. Sathya, S. Saranya, and C. Selvaroopini, “Survey on various mechanisms for secure and efficient VANET communication,” in International Conference on Information Communication and Embedded Systems (ICICES2014), 2014, pp. 1–5. 

  8. A. Kumar and M. Bansal, “A review on VANET security attacks and their countermeasure,” in 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), 2017, pp. 580–585. 

  9. F. Qu, Z. Wu, F.-Y. Wang, and W. Cho, “A security and privacy review of VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 6, pp. 2985–2996, 2015. 

  10. J. Petit, F. Schaub, M. Feiri, and F. Kargl, “Pseudonym schemes in vehicular networks: A survey,” IEEE communications surveys & tutorials, vol. 17, no. 1, pp. 228–255, 2015. 

  11. A. Luckshetty, S. Dontal, S. Tangade, and S. S. Manvi, “A survey: comparative study of applications, attacks, security and privacy in VANETs,” in 2016 International Conference on Communication and Signal Processing (ICCSP), 2016, pp. 1594–1598. 

  12. A. Boualouache, S.-M. Senouci, and S. Moussaoui, “A survey on pseudonym changing strategies for vehicular ad-hoc networks,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 770–790, 2018.