N Aboudagga, MT Refaei, M Eltoweissy… - Proceedings of the 1st …, 2005 - dl.acm.org
… each class of authenticationprotocols; and to … authenticationprotocols in adhoc networks. We identify three major criteria for classification, based on a node’s role in the authentication …
A Wasef, X Shen - IEEE transactions on Mobile Computing, 2011 - ieeexplore.ieee.org
… The probabilistic approach is a promising technique for the key management in adhoc networks [17], [18]. Zhu et al. introduce the GKMPAN protocol [19], which adopts a probabilistic …
… authenticationprotocol (ELSAP) for V2V Communication in VANETs. Moreover, the scheme withheld with self-authentication … Moreover, our proposed authenticationprotocol used the …
C Lin, D He, X Huang, N Kumar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… protocol without these existing issues. Specifically, we present a PKI-based solution (using a typical digital signature protocol… requirements that our BCPPA protocol can satisfy. We then …
… while the authentication, … -authenticated IoVs are nothing but opening the path to accepting all types of security attacks. Thus, in this paper, a blockchain based authenticationprotocol is …
JY Lee, GH Kim, AK Das… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Authenticationprotocols have been continuously proposed by considering the above … authenticationprotocol for vehicle communication. The network model of the proposed protocol is …
AA Rasheed, RN Mahapatra… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… PRELIMINARIES The proposed authenticationprotocol in this paper is based on the ZKP … [31] into the authenticationprotocol framework. Our authentication scheme is tailored with a …
… authenticationprotocol for V2I communication in VANETs by employing quantum key distribution protocol and classical identity (CID)-based authentication. After … key exchange protocol, …
Q Li, D He, Z Yang, Q Xie… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… authenticationprotocol for VANETs, designed to simultaneously achieve mutual authentication and privacy protection. We also show that our protocol … utility of our protocol by evaluating …