SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks

J Zhang, H Zhong, J Cui, Y Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… In this section, we describe the proposed SMAKA scheme for vehicular networks. Table I
lists the main notations and corresponding definitions used in the five phases of this study. The …

Mutual authentication for vehicular network in complex and uncertain driving

C Xu, H Liu, Y Zhang, P Wang - Neural Computing and Applications, 2020 - Springer
… architecture and can be used for cooperative communication in vehicular network. … and
the key agreement scheme (LEANDER) under multi-server architecture. In this scheme, elliptic …

Key agreement algorithms for vehicular communication networks based on reciprocity and diversity theorems

B Zan, M Gruteser, F Hu - IEEE Transactions on Vehicular …, 2013 - ieeexplore.ieee.org
… To be more specific, TTP requires a trusted central server, while in vehicular networks there
… characteristics of vehicular networks, we develop a novel set of key agreement schemes for …

A distributed authentication scheme based on smart contract for roaming service in mobile vehicular networks

K Xue, X Luo, Y Ma, J Li, J Liu… - … on Vehicular Technology, 2022 - ieeexplore.ieee.org
… to infrastructure (V2I), and vehicle to pedestrian (V2P), and so on. Thus, the roaming and …
networks, including, for example, vehicular networks, wireless networks, and cellular networks. …

GAKAV: Group authentication and key agreement for LTE/LTE-A vehicular networks

C Xu, X Huang, M Ma, H Bao - 2017 IEEE 19th International …, 2017 - ieeexplore.ieee.org
vehicular networks, a new secure and efficient group authentication and key agreement
scheme for the vehicular networks … Compared with the existing schemes, the proposed scheme

Pseudonym schemes in vehicular networks: A survey

J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2014 - ieeexplore.ieee.org
… majority of pseudonym approaches for vehicular networks and facilitates comparison and …
pseudonymous authentication schemes for vehicular networks. The presented schemes are …

A secure and authenticated key management protocol (SA-KMP) for vehicular networks

H Tan, M Ma, H Labiod, A Boudguiga… - … on Vehicular …, 2016 - ieeexplore.ieee.org
… Nevertheless, the results suggest that the transmission overhead of our scheme is still
lower than the classical PKI scheme. Suppose the typical data rate of a vehicular network is …

ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks

JL Huang, LY Yeh, HY Chien - IEEE Transactions on vehicular …, 2010 - ieeexplore.ieee.org
… We introduce a two-layer vehicular network model for value-added applications, as shown
in Figure II.1. The lower layer is composed of vehicles and RSUs. The communications, either …

[HTML][HTML] Secure protocols for data propagation and group communication in vehicular networks

MY Hsieh, HY Lin, CF Lai, KC Li - … Communications and Networking, 2011 - Springer
schemes for lightweight ciphers are essential. Many security schemes for vehicular networks
… Group communication is desirable in vehicular networks, while groups of friends drive the …

Full session key agreement scheme based on chaotic map in vehicular ad hoc networks

J Cui, Y Wang, J Zhang, Y Xu… - … on Vehicular Technology, 2020 - ieeexplore.ieee.org
agreement scheme based on chaos mapping. In this paper, the first phase describes the key
agreement … group key agreement for vehicle nodes in the group where the vehicle can only …