4.7 Article

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment

Prasanta Kumar Roy et al.

Summary: The use of Internet-of-Things (IoT)-based wireless applications is increasing exponentially, requiring efficient management of large volumes of traffic. To address the performance bottleneck of traditional single-server architecture, a lightweight Mutual Authentication and Key Agreement (MAKA) protocol based on group keys is introduced for multi-server environments, improving energy efficiency and security of the system.

JOURNAL OF SUPERCOMPUTING (2022)

Article Chemistry, Analytical

Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication

Shimaa A. Abdel Hakeem et al.

Summary: This paper proposes an efficient centralized threshold shared secret protocol for vehicular communication, based on Shamir secret sharing technique and HMAC key authentication. The protocol allows for secure key generation and distribution, supports group key reconstruction and confidentiality, and reduces communication and computation costs.

SENSORS (2022)

Article Computer Science, Hardware & Architecture

A lightweight authentication scheme with privacy preservation for vehicular networks

Gopal Singh Rawat et al.

Summary: Vehicular ad-hoc network faces security and privacy issues, requiring vehicle authentication, message integrity, and privacy preservation. Most existing solutions rely on infrastructural entities, increasing communication overhead and vulnerability to physical and cloning attacks. This paper proposes a lightweight authentication scheme based on Physically Unclonable Function, reducing the burden on infrastructural entities through vehicle-to-vehicle communication. Security and performance analysis demonstrate the effectiveness of the proposed scheme.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

FastHand: A fast handover authentication protocol for densely deployed small-cell networks

Prasanta Kumar Roy et al.

Summary: In this article, a fast handover authentication protocol named FastHand is proposed for densely deployed small-cell networks, which utilizes a (t, n)-threshold scheme to compute the handover key for enhanced security against node compromised attacks. The privacy and security properties of FastHand are verified through informal and formal proofs.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2022)

Article Computer Science, Information Systems

Provable Secure and Lightweight Vehicle Message Broadcasting Authentication Protocol with Privacy Protection for VANETs

Qi Xie et al.

Summary: This study proposes a lightweight vehicle message broadcasting authentication protocol that achieves identity authentication without a third party, ensuring secure message transmission with reduced delay and improved security and computational efficiency compared to related schemes.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Information Systems

A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles

Zhen Li et al.

Summary: The rapidly developing Internet of vehicles technology and social Internet of vehicles provide better resources and services but still face security challenges. A new protocol is proposed to overcome vulnerabilities in existing authentication protocols, showing excellent performance and efficiency.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2022)

Article Engineering, Electrical & Electronic

Hybrid and Hierarchical Aggregation-Verification Scheme for VANET

Lei Zhang et al.

Summary: The paper proposes a hybrid and hierarchical aggregation-verification scheme for efficient verification of certificates and signatures in VANET. The scheme ensures the security and privacy of the VANET system by using short-term anonymous certificates and aggregate signatures. A novel hybrid aggregation-verification technique is introduced to aggregate and verify the signatures on safety messages with short delay.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Computer Science, Information Systems

Secure Message Transmission for V2V Based on Mutual Authentication for VANETs

Jabar Mahmood et al.

Summary: The paper explores the security issues in Vehicular Ad Hoc Networks (VANETs) related to mutual authentication, proposing a scheme that aims to enhance privacy preservation and address design flaws and implementation challenges in existing schemes.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

Secure and efficient authentication protocol with user untraceability for global roaming services

Prasanta Kumar Roy et al.

Summary: User authentication is crucial in global roaming services, but it is not sufficient to ensure secure communication. The proposed protocol uses dynamic keys and pseudonyms to guarantee security and user privacy.

WIRELESS NETWORKS (2021)

Article Computer Science, Information Systems

Desynchronization resistant privacy preserving user authentication protocol for location based services

Prasanta Kumar Roy et al.

Summary: This article introduces a privacy-preserving user authentication protocol for location-based services based on elliptic curve cryptography, which includes dynamic randomized counters to synchronize the peers.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Theory & Methods

SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks

Jing Zhang et al.

Summary: The article introduces a many-to-many authentication and key agreement scheme that can achieve secure authentication between vehicles and cloud service providers in vehicular network environments. The proposed scheme prevents unauthorized access, improves service efficiency, and reduces computation and communication overhead.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network

Farooque Azam et al.

Summary: This paper presents a taxonomy of authentication schemes in VANET and compares them with security, privacy, and scalability requirements. It also discusses the use of new technologies such as 5G, 5G-SDN, and Blockchain to design authentication schemes with low cost and communication overhead. Finally, the paper outlines the open challenges in VANET authentication.

IEEE ACCESS (2021)

Article Engineering, Electrical & Electronic

A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles

Harsha Vasudev et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Authentication Protocol for VANETs

Xiong Li et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

Efficient Privacy-Preserving Scheme for Location Based Services in VANET System

Fifi Farouk et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Design of secure key management and user authentication scheme for fog computing services

Mohammad Wazid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network

Murtadha A. Alazzawi et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

Anonymous and Lightweight Authentication for Secure Vehicular Networks

Bidi Ying et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Computer Science, Hardware & Architecture

V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs

Che-Yu Chang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Engineering, Electrical & Electronic

Dedicated Short-Range Communications (DSRC) Standards in the United States

John B. Kenney

PROCEEDINGS OF THE IEEE (2011)

Article Computer Science, Hardware & Architecture

Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment

Han-Cheng Hsiang et al.

COMPUTER STANDARDS & INTERFACES (2009)