Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based VANET

Y Yang, L Zhang, Y Zhao, KKR Choo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As cities become smarter, the importance of vehicular ad hoc networks (VANETs) will be
increasingly pronounced. To support latency-and time-sensitive applications, there have …

Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …

eCLAS: An efficient pairing-free certificateless aggregate signature for secure VANET communication

Y Han, W Song, Z Zhou, H Wang… - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have become an important part of the intelligent
transportation system that aims to promote communication among vehicles to ensure …

[HTML][HTML] Authentication and resource allocation strategies during handoff for 5G IoVs using deep learning

SR Akhila, Y Alotaibi, OI Khalaf, S Alghamdi - Energies, 2022 - mdpi.com
One of the most sought-after applications of cellular technology is transforming a vehicle into
a device that can connect with the outside world, similar to smartphones. This connectivity is …

A provably secure authentication and key exchange protocol in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, CM Chen - Security and Communication …, 2021 - Wiley Online Library
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …

[HTML][HTML] A searchable encryption scheme with biometric authentication and authorization for cloud environments

MI Mihailescu, SL Nita - Cryptography, 2022 - mdpi.com
Cloud computing offers the possibility of providing suitable access within a network for a set
of resources. Many users use different services for outsourcing their data within the cloud …

CBACS: A privacy-preserving and efficient cache-based access control scheme for software defined vehicular networks

X Zhang, H Zhong, C Fan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In vehicular networks, caching content in fog nodes is a widely accepted and favorable way
to quickly respond to massive vehicle requests, reduce content retrieval delay and improve …

Blockchain-assisted authentication and key agreement scheme for fog-based smart grid

A Tomar, S Tripathi - Cluster Computing, 2022 - Springer
In recent times, the research works on the integration of fog computing with blockchain to
address the issues such as higher latency, single point of failure, and centralization have …

CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for IoT environments

Y Guo, Y Guo - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Anonymity, robust synchronization, and perfect forward secrecy are the most important
security properties of authenticated key agreement (AKA) protocols. Designing AKA …

BSRA: Blockchain-based secure remote authentication scheme for the fog-enabled Internet of Things

Y Guo, Z Zhang, Y Guo, P Xiong - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The insufficient trustworthiness of fog nodes in fog computing leads to new security and
privacy problems in communication between entities. Existing authentication schemes rely …