4.5 Article

A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs

Lu Wei et al.

Summary: This article introduces an authentication key agreement (AKA) scheme for fog-based vehicular ad-hoc networks (VANETs). The proposed lightweight and conditional privacy-preserving AKA scheme reduces computational and communication overhead and addresses the single-point-of-failure issue by considering a multi-trusted-authority model.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Theory & Methods

A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing

Shivangi Shukla et al.

Summary: The widespread adoption of cloud computing enables convenient sharing, unlimited storage, and on-demand access to big data. To ensure the legitimacy of users for cloud services, a secure mutual authentication protocol is necessary. We propose a novel elliptic curve cryptography (ECC) based multi-factor authentication protocol for the cloud environment, which provides user anonymity, unlinkability, and high security.

COMPUTING (2022)

Article Computer Science, Hardware & Architecture

A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles

Zisang Xu et al.

Summary: In the Internet of Vehicles (IoV), a reliable and secure authentication and key agreement scheme is required to prevent data from being forged or modified. This paper proposes a secure and computationally efficient scheme where RSU can authenticate with the vehicle, improving authentication efficiency and reducing energy consumption compared to existing schemes.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks

Tsu-Yang Wu et al.

Summary: This study proposes a new authentication key exchange scheme for fog-based VANETs to address security challenges in deployment, combining fog computing and VANET. The scheme is formally verified using ProVerif and BAN logic, with simulation and analysis demonstrating its success in resisting attacks and computational efficiency compared to existing protocols.

JOURNAL OF SUPERCOMPUTING (2021)

Article Computer Science, Information Systems

Secure and efficient authentication protocol with user untraceability for global roaming services

Prasanta Kumar Roy et al.

Summary: User authentication is crucial in global roaming services, but it is not sufficient to ensure secure communication. The proposed protocol uses dynamic keys and pseudonyms to guarantee security and user privacy.

WIRELESS NETWORKS (2021)

Article Computer Science, Information Systems

Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment

Shivangi Shukla et al.

Summary: Fingerprint authentication technology has made significant progress in security, privacy protection, and efficiency. Researchers have proposed a fingerprint-based fuzzy commitment method that effectively secures the integrity of biometric templates and has shown promising experimental results.

IET INFORMATION SECURITY (2021)

Article Computer Science, Information Systems

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks

Tsu-Yang Wu et al.

Summary: With the maturation of cloud computing and IoT technologies, mobile intelligent transportation systems are increasingly popular, especially with the use of VANETs for real-time traffic data collection and analysis. Research has shown that integrating session key negotiation with traffic information transmission can effectively protect vehicle data security.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Desynchronization resistant privacy preserving user authentication protocol for location based services

Prasanta Kumar Roy et al.

Summary: This article introduces a privacy-preserving user authentication protocol for location-based services based on elliptic curve cryptography, which includes dynamic randomized counters to synchronize the peers.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Information Systems

A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network

Farooque Azam et al.

Summary: This paper presents a taxonomy of authentication schemes in VANET and compares them with security, privacy, and scalability requirements. It also discusses the use of new technologies such as 5G, 5G-SDN, and Blockchain to design authentication schemes with low cost and communication overhead. Finally, the paper outlines the open challenges in VANET authentication.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

Inam ul Haq et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Design of secure authentication protocol for dynamic user addition in distributed Internet-of-Things

Hiral S. Trivedi et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Authentication Protocol for VANETs

Xiong Li et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments

R. Shashidhara et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2020)

Article Computer Science, Theory & Methods

Design of secure key management and user authentication scheme for fog computing services

Mohammad Wazid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Review Telecommunications

Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey

Ikram Ali et al.

VEHICULAR COMMUNICATIONS (2019)

Article Computer Science, Information Systems

A Secure Authentication Protocol for Internet of Vehicles

Chien-Ming Chen et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs

S. K. Hafizul Islam et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks

Hong Zhong et al.

IEEE ACCESS (2018)

Article Engineering, Civil

EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks

Maria Azees et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Engineering, Electrical & Electronic

Anonymous and Lightweight Authentication for Secure Vehicular Networks

Bidi Ying et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Civil

An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs

Shunrong Jiang et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Computer Science, Information Systems

Efficient Conditional Privacy-Preserving and Authentication Scheme for Secure Service Provision in VANET

Hong Zhong et al.

TSINGHUA SCIENCE AND TECHNOLOGY (2016)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Civil

A Security and Privacy Review of VANETs

Fengzhong Qu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2015)

Article Computer Science, Information Systems

TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks

Ming-Chin Chuang et al.

IEEE SYSTEMS JOURNAL (2014)

Article Computer Science, Hardware & Architecture

A comprehensive survey on vehicular Ad Hoc network

Saif Al-Sultan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Telecommunications

Security in wireless communication

MG Rahman et al.

WIRELESS PERSONAL COMMUNICATIONS (2002)