4.6 Article

PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications

Clayson Celes et al.

Summary: This article provides an overview of publicly available vehicular mobility traces, discusses preprocessing issues, introduces methods for characterizing and modeling mobility data, and reviews existing proposals for applying hidden knowledge extracted from mobility traces in vehicular networks. It also discusses open research problems and provides directions for further work.

ACM COMPUTING SURVEYS (2022)

Article Engineering, Multidisciplinary

Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET

Seunghwan Son et al.

Summary: Connected vehicle refers to providing various services through vehicles connected to the network. Vehicular ad-hoc networks (VANETs) can support vehicle-to-vehicle and vehicle-to-infrastructure communications to realize connected vehicles. Secure communication is crucial in VANETs to prevent accidents and injuries. Recent studies have focused on V2I authentication to ensure the security of V2I communications. However, existing protocols do not consider the handover situation, leading to unnecessary computations and resource overload. A blockchain-based VANET protocol is proposed to address these issues and improve efficiency. The protocol only requires lightweight computations during handover situations, and formal analysis and simulations demonstrate its practicality. Comparisons with existing protocols show that the proposed protocol is more secure and efficient.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure

Vinod Kumar et al.

Summary: This article presents a secure and lightweight authentication scheme (RAPCHI) for Internet of medical Things (IoMT) in cloud-healthcare infrastructure (CHI) during a pandemic. The proposed framework provides resistance against various security threats and is compared to existing frameworks, demonstrating its superiority in terms of security, computation, and communication. The formal security analysis and simulation tests validate RAPCHI's security against man-in-the-middle and replay attacks.

JOURNAL OF SUPERCOMPUTING (2022)

Article Computer Science, Information Systems

An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach

Akber Ali Khan et al.

Summary: Smart grid adjusts power generation by supervising consumer behavior and promoting cultural heritage. Ensuring environmental security and privacy are key concerns in smart systems, with authentication protocols enabling secure communication.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Computer Science, Hardware & Architecture

PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

Jing Zhang et al.

Summary: The proposed conditional privacy-preserving authentication scheme based on Chinese remainder theorem aims to address the challenge of fast authentication in Vehicular Ad-hoc Networks. By using realistic TPDs, the scheme enhances the security of the entire system.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Telecommunications

A secure and efficient key agreement framework for critical energy infrastructure using mobile device

Akber Ali Khan et al.

Summary: This article introduces the two-way communication of the Internet of Energy to address the security, efficiency, and reliability in energy reform. A mutual authenticated key agreement framework is proposed in the vehicle-grid system using elliptic curve cryptography and hash function to maintain secure communication with reliable computation and communication costs. The proposed protocol is shown to be secure through formal and informal methods, and is more efficient in terms of computation and communication costs compared to related protocols in the same environment.

TELECOMMUNICATION SYSTEMS (2021)

Article Computer Science, Information Systems

ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids

Muhammad Tanveer et al.

Summary: The Internet of Things-enabled smart grid technology offers advantages to traditional power grids, with the smart meter as a critical component for collecting power usage information. To preserve communication integrity and enable secure exchanges, an anonymous and reliable authentication protocol for smart grids is presented. This protocol uses cryptographic techniques to ensure secure communication and authorization for future exchanges. Through security analysis, it is confirmed that the protocol is effective in thwarting security attacks and providing improved security properties compared to other authentication protocols.

IEEE ACCESS (2021)

Article Engineering, Electrical & Electronic

Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks

Jing Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Multidisciplinary

A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet-Based Vehicle-to-Grid Technology Framework

Azeem Irshad et al.

IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS (2020)

Article Computer Science, Information Systems

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment

Muhammad Tanveer et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing

Jiaqing Mo et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Engineering, Electrical & Electronic

A provable and secure mobile user authentication scheme for mobile cloud computing services

Azeem Irshad et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Information Systems

RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks

Jie Cui et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication

Prosanta Gope et al.

IEEE TRANSACTIONS ON SMART GRID (2019)

Article Information Science & Library Science

A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS

Vinod Kumar et al.

TELEMATICS AND INFORMATICS (2019)

Article Computer Science, Hardware & Architecture

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing

Qi Jiang et al.

IEEE NETWORK (2018)

Article Computer Science, Information Systems

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

Debiao He et al.

IEEE SYSTEMS JOURNAL (2018)

Article Engineering, Electrical & Electronic

A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks

Maryam Rajabzadeh Asaar et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Health Care Sciences & Services

An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing

Vinod Kumar et al.

JOURNAL OF MEDICAL SYSTEMS (2018)

Article Computer Science, Information Systems

A new and secure authentication scheme for wireless sensor networks with formal proof

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Telecommunications

Secure and distributed certification system architecture for safety message authentication in VANET

Tiziri Oulhaci et al.

TELECOMMUNICATION SYSTEMS (2017)

Article Computer Science, Theory & Methods

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services

Vanga Odelu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Engineering, Electrical & Electronic

Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing

Jianbing Ni et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

Security and Privacy in Smart City Applications: Challenges and Solutions

Kuan Zhang et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Theory & Methods

OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks

Lei Zhang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Civil

Distributed Aggregate Privacy-Preserving Authentication in VANETs

Lei Zhang et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

Soft-Defined Heterogeneous Vehicular Network: Architecture and Challenges

Kan Zheng et al.

IEEE NETWORK (2016)

Article Engineering, Civil

An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings

Nai-Wei Lo et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Computer Science, Information Systems

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He et al.

IEEE SYSTEMS JOURNAL (2015)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Electrical & Electronic

Toward Vehicle-Assisted Cloud Computing for Smartphones

Hongli Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Review Computer Science, Hardware & Architecture

A survey on vehicular cloud computing

Md Whaiduzzaman et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Review Computer Science, Information Systems

Connected Vehicles: Solutions and Challenges

Ning Lu et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Computer Science, Hardware & Architecture

Toward Cloud-Based Vehicular Networks with Efficient Resource Management

Rong Yu et al.

IEEE NETWORK (2013)

Article Engineering, Civil

Security Challenges in Vehicular Cloud Computing

Gongjun Yan et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2013)

Article Engineering, Electrical & Electronic

Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree

Kyung-Ah Shim

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2013)

Article Telecommunications

A lightweight identity authentication protocol for vehicular networks

Jung-Shian Li et al.

TELECOMMUNICATION SYSTEMS (2013)

Article Computer Science, Information Systems

Toward a secure batch verification with group testing for VANET

Cheng-Chi Lee et al.

WIRELESS NETWORKS (2013)

Article Health Care Sciences & Services

An Efficient Authentication Scheme for Telecare Medicine Information Systems

Zhian Zhu

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Engineering, Electrical & Electronic

BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree

Yixin Jiang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)