4.4 Article

A fog-driven three-factor authentication protocol for secure data sharing in Internet of Vehicles cyber-physical systems

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

A Secure and Efficient Wireless Charging Scheme for Electric Vehicles in Vehicular Energy Networks

Yuntao Wang et al.

Summary: To address security and efficiency concerns in vehicular energy networks (VENs), this paper proposes a secure and efficient wireless charging scheme based on blockchain technology and game theory. By leveraging blockchain, users can fully control and audit the usage of personal rating data to protect privacy. Using game theory, the algorithm optimizes the strategies of three energy entities, leading to improved utility and security of energy transmission.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Computer Science, Information Systems

A lightweight device-level Public Key Infrastructure with DRAM based Physical Unclonable Function (PUF) for secure cyber physical systems

Susovan Chanda et al.

Summary: This paper proposes a lightweight Public Key Infrastructure (PKI) scheme for CPS devices, using PUF to simplify the key generation process and introducing the session key concept to address other limitations. The method also meets crucial security needs and incorporates DRAM-based PUF in the implementation. Experimental results demonstrate higher efficiency and lower energy consumption compared to existing methods.

COMPUTER COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Blockchain-Based Privacy-Preserving Networking Strategy for Dynamic Wireless Charging of EVs

Mahmoud Abouyoussef et al.

Summary: This paper proposes a networking strategy based on a private blockchain to support privacy protection in dynamic wireless charging by enabling user anonymity and data unlinkability.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Engineering, Multidisciplinary

EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions

Ponnuru Raveendra Babu et al.

Summary: Dynamic charging is a potential technology for charging electric vehicles while they are in motion. However, the communication between the vehicles and charging system raises security and privacy concerns. To address these concerns, this paper proposes a lightweight authentication protocol suite that enables mutual authentication and session key agreement, protecting against various attacks.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Engineering, Electrical & Electronic

Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles

Ponnuru Raveendra Babu et al.

Summary: This article discusses the importance of authentication mechanisms for charging electric vehicles and proposes a new protocol suitable for charging electric vehicles while driving in the future. The proposed protocol utilizes secure and lightweight algorithms, ensuring the security and reliability of communication.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF

Muhammad Umar et al.

Summary: The article introduces a lightweight privacy-preserving authentication protocol for VANETs, which is compared to existing protocols, lighter, safer, and more practical, making it more reliable and convenient for secure data transmission in VANETs.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Information Systems

Three-factor authentication protocol using physical unclonable function for IoV

Qi Jiang et al.

Summary: Internet of Vehicles (IoV) plays a crucial role in transportation sector, but security and privacy issues are pressing. The integration of physical unclonable function (PUF) technology ensures system security, and the combination of password, biometrics, and PUF prevents unauthorized access to user devices.

COMPUTER COMMUNICATIONS (2021)

Article Engineering, Multidisciplinary

Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks

JoonYoung Lee et al.

Summary: VANET and IoV technologies are crucial for smart city systems, with V2V communication ensuring traffic system management and road safety. A lightweight protocol is proposed for regional segmentation management and overhead resolution, utilizing mutual authentication and honey_list technology for security.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Information Systems

Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment

Luis P. A. Roman et al.

AD HOC NETWORKS (2020)

Article Automation & Control Systems

Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security

Jiliang Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2020)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Authentication Protocol for VANETs

Xiong Li et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain

Uzair Javaid et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

Should the Urgency of Visual-Tactile Takeover Requests Match the Criticality of Takeover Situations?

Fabienne Roche et al.

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES (2020)

Article Computer Science, Information Systems

Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures

Ismail Butun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Hardware & Architecture

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

Urbi Chatterjee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security

Dooho Choi et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Blockchain-Based Decentralized Trust Management in Vehicular Networks

Zhe Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks

Mimi Ma et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network

Xiaohong Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS

Wei Feng et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System

Barnana Baruah et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs

S. K. Hafizul Islam et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Methods for Estimating the Convergence of Inter-Chip Min-Entropy of SRAM PUFs

Hailong Liu et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2018)

Article Engineering, Electrical & Electronic

Secure and Privacy-Preserving Physical-Layer-Assisted Scheme for EV Dynamic Charging System

Marbin Pazos-Revilla et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids

Prosanta Gope et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A Privacy-Preserving Trust Model Based on Blockchain for VANETs

Zhaojun Lu et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Information Systems

BARS: a Blockchain-based Anonymous Reputation System for Trust Management in VANETs

Zhaojun Lu et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Proceedings Paper Computer Science, Information Systems

Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks

Nisha Malik et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Article Engineering, Civil

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Yanbing Liu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Engineering, Electrical & Electronic

Anonymous and Lightweight Authentication for Secure Vehicular Networks

Bidi Ying et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Portunes plus : Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging

Hongyang Li et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Computer Science, Information Systems

Mutual Authentication in IoT Systems Using Physical Unclonable Functions

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

Ao Lei et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Telecommunications

Design of authentication protocol for wireless sensor network-based smart vehicular system

Prerna Mohit et al.

VEHICULAR COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

A PUF-Based Secure Communication Protocol for IoT

Urbi Chatterjee et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2017)

Article Engineering, Electrical & Electronic

A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks

Nadia Haddadou et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Proceedings Paper Automation & Control Systems

A Highly Flexible Ring Oscillator PUF

Mingze Gao et al.

2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2014)

Article Computer Science, Theory & Methods

Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive

Abhranil Maiti et al.

JOURNAL OF CRYPTOLOGY (2011)

Article Computer Science, Hardware & Architecture

Extracting secret keys from integrated circuits

D Lim et al.

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2005)