4.7 Article

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Civil

A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System

Shehzad Ashraf Chaudhry et al.

Summary: The sixth-generation (6G) mobile network has the potential to enhance the capabilities of Internet of Things (IoT) devices in maritime transportation systems (MTS) by providing communication services as well as processing, caching, sensing, and control capabilities. However, it also poses security and privacy challenges such as location tracking, GPS spoofing, unauthorized data access, and message tampering. In this article, a lightweight authentication protocol is proposed to ensure the security and privacy of the 6G-IoT enabled MTS, and it is evaluated to be more secure than existing schemes using formal security assessment methods.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments

Shehzad Ashraf Chaudhry et al.

Summary: The Internet of Things connects objects through sensors to facilitate daily life, but security and privacy are major concerns. A lightweight and unlinkable authentication scheme called PFLUA-DIoT is proposed in this article, proving its security and demonstrating better performance.

IEEE SYSTEMS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF

Muhammad Umar et al.

Summary: The article introduces a lightweight privacy-preserving authentication protocol for VANETs, which is compared to existing protocols, lighter, safer, and more practical, making it more reliable and convenient for secure data transmission in VANETs.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Editorial Material Computer Science, Information Systems

Comment on Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication

Khalid Mahmood et al.

Summary: The passage discusses the importance of vehicular communications in smart traffic management and the challenges faced by existing protocols. It highlights the vulnerabilities of the Limbasiya-Das protocol and suggests potential solutions.

IEEE SYSTEMS JOURNAL (2021)

Article Engineering, Electrical & Electronic

Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment

Shafiq Ahmed et al.

Summary: The paper introduces a robust authentication protocol for Vehicle-to-Grid (V2G) communication, utilizing lightweight and secure cryptographic primitives. The introduced framework shows resilience against known security attacks, and the performance analysis demonstrates its efficiency and reliability compared to related protocols, despite slightly higher energy and computation costs.

IEEE TRANSACTIONS ON SMART GRID (2021)

Article Computer Science, Information Systems

Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles

Shehzad Ashraf Chaudhry

Summary: An authentication protocol called SMEP-IoV is proposed for secure information exchange among Internet of Vehicles (IoV) entities, utilizing secure symmetric lightweight hash functions and encryption operations to meet IoV security and performance requirements. Performance comparisons show that SMEP-IoV is lightweight and completes authentication process in just 0.198 ms.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment

Shehzad Ashraf Chaudhry et al.

Summary: The advancements in the Internet of Things require specialized security protocols, but many current schemes have design flaws. This article analyzes a recent authentication scheme and proposes an improved solution to address the privacy and efficiency tradeoff.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things

Muhammad Naeem et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Telecommunications

An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment

S. Anandhi et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments

Khalid Mahmood et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Automation & Control Systems

Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment

Srinivas Jangirala et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Theory & Methods

A provably secure and anonymous message authentication scheme for smart grids

Xiong Li et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Mathematics, Applied

A secure user authentication protocol using elliptic curve cryptography

Adesh Kumari et al.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2019)

Article Computer Science, Theory & Methods

A secure chaotic map-based remote authentication scheme for telecare medicine information systems

Xiong Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing

Qi Jiang et al.

IEEE NETWORK (2018)

Article Computer Science, Information Systems

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

Debiao He et al.

IEEE SYSTEMS JOURNAL (2018)

Article Engineering, Electrical & Electronic

A robust ElGamal-based password-authentication protocol using smart card for client-server communication

Tanmoy Maitra et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Engineering, Civil

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Yanbing Liu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Telecommunications

A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme

Lidong Han et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

Shipra Kumari et al.

COMPUTER NETWORKS (2016)

Article Engineering, Civil

Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks

Pandi Vijayakumar et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Engineering, Electrical & Electronic

2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET

Fei Wang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Computer Science, Hardware & Architecture

A survey on cloud computing security: Issues, threats, and solutions

Saurabh Singh et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Jia-Lun Tsai et al.

IEEE SYSTEMS JOURNAL (2015)

Article Health Care Sciences & Services

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System

Chun-Ta Li et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Health Care Sciences & Services

A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System

Keerti Srivastava et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

Yi-Pin Liao et al.

AD HOC NETWORKS (2014)

Review Computer Science, Hardware & Architecture

A survey on vehicular cloud computing

Md Whaiduzzaman et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Hardware & Architecture

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

Jue-Sam Chou

JOURNAL OF SUPERCOMPUTING (2014)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography

Mohammad Sabzinejad Farash

JOURNAL OF SUPERCOMPUTING (2014)

Article Computer Science, Information Systems

A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Wenbo Shi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Review Information Science & Library Science

A literature review of RFID-enabled healthcare applications and issues

Samuel Fosso Wamba et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2013)

Article Telecommunications

Vehicular ad hoc networks (VANETS): status, results, and challenges

Sherali Zeadally et al.

TELECOMMUNICATION SYSTEMS (2012)

Article Computer Science, Hardware & Architecture

Building a trusted route in a mobile ad hoc network considering communication reliability and path length

Jian Wang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Review Computer Science, Hardware & Architecture

Energy efficient wireless unicast routing alternatives for machine-to-machine networks

Neyre Tekbiyik et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Information Systems

Security analysis of two recently proposed RFID authentication protocols

Chao Lv et al.

FRONTIERS OF COMPUTER SCIENCE IN CHINA (2011)

Article Computer Science, Interdisciplinary Applications

Taking VANET to the clouds

Stephan Olariu et al.

INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS (2011)

Article Computer Science, Information Systems

A novel key agreement protocol based on chaotic maps

Di Xiao et al.

INFORMATION SCIENCES (2007)

Article Engineering, Electrical & Electronic

Security and privacy in RFID and applications in telemedicine

Y Xiao et al.

IEEE COMMUNICATIONS MAGAZINE (2006)

Article Mathematics, Interdisciplinary Applications

Security problems with a chaos-based deniable authentication scheme

G Alvarez

CHAOS SOLITONS & FRACTALS (2005)