4.7 Article

Physically Secure and Conditional-Privacy Authenticated Key Agreement for VANETs

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments

Shehzad Ashraf Chaudhry et al.

Summary: The communication between smart meters (SMs) and neighborhood area network (NAN) gateways is essential for managing energy consumption. Existing schemes lack security and/or efficiency, calling for a more efficient and secure authentication scheme for smart grid infrastructure. This article proposes a privacy-preserving and lightweight authentication scheme (LAS-SG) for smart grids using elliptic curve cryptography, which has been proven to be secure under the standard model. Real-time experiments demonstrate the efficiency of LAS-SG, completing authentication in 20.331 ms with only two messages and 192 B exchanged. Due to its efficiency and security, LAS-SG is more suitable for smart grid environments.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

PPRP: Preserving-Privacy Route Planning Scheme in VANETs

Yangfan Liang et al.

Summary: This article presents a privacy-preserving route planning scheme in VANETs, where vehicles can authenticate and communicate with RSUs and other vehicles without exposing sensitive information, by utilizing an oblivious transfer method.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters

Boyapally Harishma et al.

Summary: In the energy sector, IoT plays a role in improving the stability, efficiency, and utilization of power grids. This is achieved through advanced communication networks between smart meters and utility servers, allowing for secure and efficient power distribution. The proposed protocol ensures secure communication by delegating complex cryptographic operations to servers and managing the workload on smart meter nodes using lightweight primitives, such as Physically Unclonable Functions. The security of the protocol is proven using well-established cryptographic assumptions. Additionally, a countermeasure is proposed to protect against a physics-based attack called load modification attack.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Engineering, Civil

An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs

Pandi Vijayakumar et al.

Summary: The 6G technology enhances VANETs with high availability, high reliability, and occasionally high throughput, along with proposing efficient batch authentication and key exchange schemes to improve security and preserve message integrity. The proposed scheme is computationally more efficient than existing schemes, as shown in the performance analysis.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Engineering, Electrical & Electronic

A PUF-based lightweight authentication and key agreement protocol for smart UAV networks

Li Zhang et al.

Summary: This paper proposes a lightweight identity authentication and key agreement protocol for UAVs, which enhances the security of UAV network communication by introducing physical unclonable function and significantly improves authentication efficiency. The security of the protocol is proven using various logics and models, showing that it meets the security requirements of UAV networks. A comparison with other existing protocols demonstrates the effectiveness and practicality of the proposed protocol.

IET COMMUNICATIONS (2022)

Article Engineering, Civil

Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems

Anil Kumar Sutrala et al.

Summary: With the rapid growth of ICT, CPS offers a wide range of applications in various areas. In ICPS, 5G technology and SDN introduce security threats, for which we propose the UAKA-5GSICPS scheme to address this issue.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation

Prosanta Gope et al.

Summary: Device authentication in the IoT is crucial, where PUFs are a promising technology for lightweight authentication protocols. This article discusses the progress and challenges in designing PUF-based authentication protocols for IoT devices.

COMPUTER (2021)

Article Engineering, Electrical & Electronic

Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City

Wajdy Othman et al.

Summary: A physically secure privacy-preserving message authentication protocol using Physical Unclonable Function (PUF) and Secret Sharing is proposed to address security and privacy issues in vehicular communications, providing a higher level of security and thwarting vehicles traceability attacks.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF

Muhammad Umar et al.

Summary: The article introduces a lightweight privacy-preserving authentication protocol for VANETs, which is compared to existing protocols, lighter, safer, and more practical, making it more reliable and convenient for secure data transmission in VANETs.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT

Sensen Li et al.

Summary: The research proposes an end-to-end mutual authentication and key exchange protocol for IoT devices, combining PUF with CL-PKC, requiring only three handshakes without the real-time participation of the server. The protocol can secure devices from various attacks and provide perfect forward secrecy, outperforming existing related protocols in terms of security features, protocol rounds, and communication cost.

IEEE SENSORS JOURNAL (2021)

Article Engineering, Electrical & Electronic

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System

Palak Bagga et al.

Summary: Internet of Vehicles (IoV) is a distributed network consisting of connected vehicles and Vehicular Ad Hoc Networks (VANETs) with real-time communication, anonymity, security features. In an Intelligent Transportation System, a new authentication and key agreement protocol is proposed, which has been shown to be secure against various attacks through security analysis and verification, offering lower communication and computational overheads, better security and functionality attributes than other competing schemes.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Civil

HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs

Peng Wang et al.

Summary: The 5G technology will greatly promote the development of Vehicular Ad Hoc Networks (VANETs) and a new hybrid D2D message authentication (HDMA) scheme is proposed for 5G-enabled VANETs, which has efficient authentication overhead and is able to resist various security attacks.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Engineering, Electrical & Electronic

Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications

Ikram Ali et al.

Summary: Vehicular ad-hoc networks (VANETs) are important for ensuring safety and efficiency in traffic management, but the heterogeneity in communication among vehicles from different manufacturers can lead to security and performance issues. This paper proposes a CP-CPPHSC scheme based on CLC and PKI, which enables secure message transmission and supports batch decryption for vehicles.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Proceedings Paper Computer Science, Artificial Intelligence

An Efficient Physically Unclonable Function based Authentication Scheme for V2G Network

Giriraj Sharma et al.

Summary: In this paper, a secure, lightweight, and hardware-based key agreement scheme using Physical Unclonable Function (PUF) is proposed for mutual authentication among EV, CS, and the GS. Formal security analysis has been conducted using the AVISA tool, showing lower overhead costs in communication and computation compared to existing schemes.

2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System

Jinyue Song et al.

Summary: The authors proposed an innovative contact tracing system based on blockchain technology, which shares consistent and non-tampered contact tracing information from multiple dimensions to protect user data privacy and ensure transparent data usage. Smart contracts are used to provide user risk notifications while protecting user identity privacy.

2021 IEEE 18TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2021) (2021)

Article Computer Science, Hardware & Architecture

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Engineering, Electrical & Electronic

Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function

Gaurang Bansal et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

Qi Jiang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

Urbi Chatterjee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices

Prosanta Gope et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Provably Secure Authenticated Key Agreement Scheme for Smart Grid

Vanga Odelu et al.

IEEE TRANSACTIONS ON SMART GRID (2018)

Article Computer Science, Information Systems

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks

Lanjun Dang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2018)

Article Engineering, Civil

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Yanbing Liu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Information Systems

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

Pandi Vijayakumar et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

A PUF-Based Secure Communication Protocol for IoT

Urbi Chatterjee et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2017)