Journal
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
Volume 18, Issue 6, Pages -Publisher
SAGE PUBLICATIONS INC
DOI: 10.1177/15501329221104332
Keywords
Fog node; authentication; social Internet of vehicles
Ask authors/readers for more resources
The rapidly developing Internet of vehicles technology and social Internet of vehicles provide better resources and services but still face security challenges. A new protocol is proposed to overcome vulnerabilities in existing authentication protocols, showing excellent performance and efficiency.
The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet of vehicles and provides better experience for users. However, there are still many security problems in social vehicle networking environments. Once the vehicle is networked, the biggest problem is data security according to the three levels of data collection, intelligent analysis, and decision control of the Internet of vehicles. Recently, Wu et al. proposed a lightweight vehicle social network security authentication protocol based on fog nodes. They claimed that their security authentication protocol could resist various attacks. However, we found that their authentication protocols are vulnerable to internal attacks, smart card theft attacks, and lack perfect forward security. In this study, we propose a new protocol to overcome these limitations. Finally, security and performance analyses show that our protocol perfectly overcomes these limitations and exhibits excellent performance and efficiency.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available