SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks

J Zhang, H Zhong, J Cui, Y Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the rising popularity of the Internet and communication technology, vehicles can
analyze and judge the real-time data collected by various cloud service providers (CSPs) in …

Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment

J Cui, X Zhang, H Zhong, J Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With an increasing number of cloud service providers (CSPs), research works on multi-cloud
environments to provide solutions to avoid vendor lock-in and deal with the single-point …

A decentralized lightweight authentication and privacy protocol for vehicular networks

SAA Hakeem, MA Abd El-Gawad, HW Kim - IEEE Access, 2019 - ieeexplore.ieee.org
Recently many security protocols have been proposed for road safety applications in
Vehicle-to-everything (V2X) communications. Most of them, however, do not fully satisfy the …

A lightweight authentication scheme with privacy preservation for vehicular networks

GS Rawat, K Singh, NI Arshad, K Hadidi… - Computers and Electrical …, 2022 - Elsevier
The vehicular ad-hoc network relies on wireless communication, thus exposing security and
privacy-related issues. The primary security requirements in a vehicular network are vehicle …

Integrated authentication and key agreement framework for vehicular cloud computing

Q Jiang, J Ni, J Ma, L Yang, X Shen - IEEE Network, 2018 - ieeexplore.ieee.org
VCC leverages the underutilized storage and computing resources of vehicles to
collaboratively provide traffic management, road safety, and infotainment services to end …

A secure and computationally efficient authentication and key agreement scheme for internet of vehicles

Z Xu, X Li, J Xu, W Liang, KKR Choo - Computers and Electrical …, 2021 - Elsevier
Abstract In the Internet of Vehicles (IoV), the communication between vehicles and
RoadSide Units (RSUs) usually through wireless channels. Therefore, the IoV requires a …

A provably secure authentication and key exchange protocol in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, CM Chen - Security and Communication …, 2021 - Wiley Online Library
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …

Authentication strategies in vehicular communications: a taxonomy and framework

MA Rezazadeh Baee, L Simpson, X Boyen… - EURASIP Journal on …, 2021 - Springer
In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry
computing and communication platforms to enable new versatile systems known as …

Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks

M Wazid, AK Das, N Kumar, V Odelu, AG Reddy… - IEEE …, 2017 - ieeexplore.ieee.org
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks
(VANETs) have been used in a wide range of applications starting from intelligent …

An efficient vehicle-assisted aggregate authentication scheme for infrastructure-less vehicular networks

H Tan, W Zheng, P Vijayakumar… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In recent years, growing research interest from both industry and academia has been
aroused to the vehicular networks, which is regarded as the fundamental component of the …