About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Workshop on Vehicle Communications and Applications

Research Article

You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2006.344746,
        author={Kewei  Sha and Yong  Xi and Weisong Shi and Loren  Schwiebert and Tao Zhang},
        title={You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks},
        proceedings={1st International ICST Workshop on Vehicle Communications and Applications},
        publisher={IEEE},
        proceedings_a={VEHICLECOMM},
        year={2007},
        month={4},
        keywords={},
        doi={10.1109/CHINACOM.2006.344746}
    }
    
  • Kewei Sha
    Yong Xi
    Weisong Shi
    Loren Schwiebert
    Tao Zhang
    Year: 2007
    You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks
    VEHICLECOMM
    IEEE
    DOI: 10.1109/CHINACOM.2006.344746
Kewei Sha1, Yong Xi1, Weisong Shi1, Loren Schwiebert1, Tao Zhang2
  • 1: Department of Computer Science, Wayne State University
  • 2: Telcordia Technologies, Inc.

Abstract

Vehicular networks have attracted extensive attentions in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols. Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the degrees of privacy they wish to have. To address this requirement, we propose an adaptive privacy-preserving authentication mechanism that can trade off the privacy degree with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive privacy-preserving authentication. We present analytical and preliminary simulation results to show that the proposed protocol is not only adaptive but also scalable.

Published
2007-04-10
Publisher
IEEE
http://dx.doi.org/10.1109/CHINACOM.2006.344746
Copyright © 2006–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL