[HTML][HTML] A secure and decentralized authentication mechanism based on web 3.0 and ethereum blockchain technology

A Petcu, B Pahontu, M Frunzete, DA Stoichescu - Applied Sciences, 2023 - mdpi.com
Over the past decade, there has been significant evolution in the security field, specifically in
the authentication and authorization part. The standard authentication protocol nowadays is …

ELCPAS: A new efficient lightweight certificateless conditional privacy preserving authentication scheme for IoV

Y Genc, N Aytas, A Akkoc, E Afacan… - Vehicular Communications, 2023 - Elsevier
This paper proposes a new efficient certificateless conditional privacy preserving
authentication (CL-CPPA) scheme named ELCPAS, which is pairing-free, energy-efficient …

[HTML][HTML] A V2V electricity transaction scheme with privacy protection based on the Internet of vehicles and consortium blockchain

S Zhang, K Zheng, B Wang - International Journal of Electrical Power & …, 2024 - Elsevier
With the development of Electric Vehicles (EVs), Vehicle-to-Vehicle (V2V) electricity
transactions have gained popularity. Among them, EV users can easily obtain information …

Schnorr-based conditional privacy-preserving authentication scheme with multisignature and batch verification in vanet

A Imghoure, F Omary, A El-Yahyaoui - Internet of Things, 2023 - Elsevier
Abstract During both Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I)
communications, authentication process is necessary to protect Vehicular Ad Hoc Network …

An LTE authentication and key agreement protocol based on the ECC self-certified public key

X Lu, F Yang, L Zou, P Lio, P Hui - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
After analyzing the long-term evolution (LTE) authentication and key agreement process
(EPS-AKA), its existing security vulnerabilities are pointed out. Based on elliptic curve …

Research Trends, Topics, and Insights on Network Security and the Internet of Things in Smart Cities

V Prakoso, H Lawelai, A Nurmandi… - Jurnal Studi Ilmu …, 2023 - jurnal-umbuton.ac.id
This research investigates network security and the Internet of Things in smart cities,
focusing on their vulnerability to cyber threats due to advanced technologies and …

Hybrid Cryptography-based Scheme with Conditional Privacy-Preserving Authentication and Memory-based DOS Resilience in V2X

A Imghoure, F Omary, A El-Yahyaoui - Vehicular Communications, 2024 - Elsevier
To secure Vehicle-to-everything (V2X) communications, many Conditional Privacy-
Preserving Authentication schemes (CPPA) use symmetric and asymmetric encryption …

[HTML][HTML] A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems

H Salin, M Lundgren - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Cooperative Intelligent Transport Systems (C-ITSs) are an important development for
society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable …

A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks

Y Rajkumar, SVNS Kumar - Peer-to-Peer Networking and Applications, 2024 - Springer
Traffic data generated by the vehicles are often transported in a wide open wireless
communication channel which poses several security and privacy vulnerabilities. In case of …

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

B Li, M Zheng, M Ma - IET Information Security, 2024 - Wiley Online Library
Named Data Networking (NDN) is a promising network architecture that differs from the
traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is …