Centralized threshold key generation protocol based on Shamir secret sharing and HMAC authentication

SA Abdel Hakeem, HW Kim - Sensors, 2022 - mdpi.com
Many group key management protocols have been proposed to manage key generation and
distribution of vehicular communication. However, most of them suffer from high …

A comprehensive overview of vehicle to everything (V2X) technology for sustainable EV adoption

MA Rehman, M Numan, H Tahir, U Rahman… - Journal of Energy …, 2023 - Elsevier
The adoption of electric vehicles as a potential solution to the increasing energy crisis and
environmental concerns has been on the rise. The development of smart grid concepts has …

Comparative experiments of V2X security protocol based on hash chain cryptography

SAA Hakeem, MAA El-Gawad, HW Kim - Sensors, 2020 - mdpi.com
Vehicle-to-everything (V2X) is the communication technology designed to support road
safety for drivers and autonomous driving. The light-weight security solution is crucial to …

Critical review of vehicle-to-everything (V2X) topologies: Communication, power flow characteristics, challenges, and opportunities

G Kumar, S Mikkili - CPSS Transactions on Power Electronics …, 2023 - ieeexplore.ieee.org
The rise in demand for energy storage solutions and the widespread adoption of electric
vehicles (EVs) have given rise to the creation of vehicle-to-everything (V2X) topologies. V2X …

Assessing the cost of quantum security for automotive over-the-air updates

M La Manna, P Perazzo, L Treccozzi… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Over-The-Air (OTA) update is an innovative paradigm that is rapidly spreading through the
automotive industry. Software updates can be capillary distributed thanks to the many …

A comparative review of security threats datasets for vehicular networks

D Swessi, H Idoudi - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
With the rapid growth of vehicular technology, Vehicle-to-everything (V2X) communication
systems are becoming increasingly challenging, especially regarding security aspects …

[PDF][PDF] Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment.

M Lee, J Jang-Jaccard, J Kwak - Computers, Materials & …, 2022 - cdn.techscience.cn
New technologies that take advantage of the emergence of massive Internet of Things (IoT)
and a hyper-connected network environment have rapidly increased in recent years. These …

Security and privacy in V2X communications: How can collaborative learning improve cybersecurity?

PK Sharma, D Vohra, S Rathore - IEEE Network, 2022 - ieeexplore.ieee.org
Advances in cellular technology are a key driver of the growing automotive vehicle-to-
everything (V2X) market. In V2X communications, information from sensors and other …

Physical layer authentication based on nonlinear kalman filter for v2x communication

J Wang, Y Shao, Y Wang, Y Ge, R Yu - IEEE Access, 2020 - ieeexplore.ieee.org
Authentication is an important guarantee for vehicle to everything (V2X) commercial
deployment. Currently, V2X security often use identity authentication schemes based on …

Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction

M Umar, J Wang, F Li, S Wang, M Zheng, Z Zhang… - Ad Hoc Networks, 2024 - Elsevier
The high security and low complexity of physical layer authentication (PLA) make it a
promising complement for complex cryptographic authentication approaches, especially for …