4.4 Article

A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare

Mehedi Masud et al.

Summary: The Internet of Things (IoT) generates a large amount of heterogeneous data from various applications, such as digital health and smart hospitals. However, security vulnerabilities pose threats to the security and privacy of IoT networks. This research proposes a lightweight user authentication protocol to address these issues, with password protection to ensure that only authorized users can access the IoT sensor nodes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion

Fan Wu et al.

Summary: The study introduces a new three-factor authentication scheme for providing session keys to wireless sensor networks. Formal and informal verification demonstrate that the scheme has good security and practicality. Simulation results show that the scheme can operate normally in IoT environments with promising practical applications.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Theory & Methods

A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles

Zisang Xu et al.

Summary: The paper introduces a blockchain-based authentication and key agreement protocol for the Internet of Vehicles in a multi-TA network model, which improves authentication efficiency and enhances security.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2021)

Review Computer Science, Information Systems

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks

Chien-Ming Chen et al.

Summary: 5G, as a new generation of mobile communication technology, addresses the needs of IoT applications, but also poses security and privacy threats.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network

Farooque Azam et al.

Summary: This paper presents a taxonomy of authentication schemes in VANET and compares them with security, privacy, and scalability requirements. It also discusses the use of new technologies such as 5G, 5G-SDN, and Blockchain to design authentication schemes with low cost and communication overhead. Finally, the paper outlines the open challenges in VANET authentication.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles

Shafiq Ahmed et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Authenticated key agreement scheme for fog-driven IoT healthcare system

Xiaoying Jia et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Information Systems

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks

Mimi Ma et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things

Kisung Park et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Internet of Vehicles: Architecture, Protocols, and Security

Juan Contreras-Castillo et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things

Jian Shen et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

Social Internet of Vehicles: Architecture and enabling technologies

Talal Ashraf Butt et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Theory & Methods

Zipf's Law in Passwords

Ding Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Review Computer Science, Information Systems

Authentication Protocols for Internet of Things: A Comprehensive Survey

Mohamed Amine Ferrag et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Review Telecommunications

Social Internet of Vehicles for Smart Cities

Leandros A. Maglaras et al.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2016)

Article Computer Science, Information Systems

Toward Social Internet of Vehicles: Concept, Architecture, and Applications

Kazi Masudul Alam et al.

IEEE ACCESS (2015)

Article Computer Science, Information Systems

Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies

Michele Nitti et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Article Telecommunications

An Overview of Internet of Vehicles

Yang Fangchun et al.

CHINA COMMUNICATIONS (2014)

Article Telecommunications

SIoT: Giving a Social Structure to the Internet of Things

Luigi Atzori et al.

IEEE COMMUNICATIONS LETTERS (2011)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)