… and light-weight authenticationprotocol for adhoc networks. LHAP is … these protocols will further enhance the security of an adhoc … routing protocols that have been proposed for adhoc …
A Wasef, X Shen - IEEE transactions on Mobile Computing, 2011 - ieeexplore.ieee.org
… The probabilistic approach is a promising technique for the key management in adhoc networks [17], [18]. Zhu et al. introduce the GKMPAN protocol [19], which adopts a probabilistic …
… authenticationprotocol (ELSAP) for V2V Communication in VANETs. Moreover, the scheme withheld with self-authentication … Moreover, our proposed authenticationprotocol used the …
JY Lee, GH Kim, AK Das… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Authenticationprotocols have been continuously proposed by considering the above … authenticationprotocol for vehicle communication. The network model of the proposed protocol is …
… while the authentication, … -authenticated IoVs are nothing but opening the path to accepting all types of security attacks. Thus, in this paper, a blockchain based authenticationprotocol is …
… This paper provides an authenticated zero knowledge protocol which is very helpful in … in ad-hoc networks by satisfying cryptographic goals such as authentication, data integrity etc [13]. …
C Lin, D He, X Huang, N Kumar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
While Vehicular Ad-hoc Networks (VANETs) can potentially improve driver safety and traffic mangement efficiency (eg through timely sharing of traffic status among vehicles), security …
H Xiong, Z Guan, J Hu, Z Chen - Applied Cryptography and …, 2012 - books.google.com
… or advocate any specific anonymous authentication mechanisms. Even though some sections might point out vulnerabilities in certain classes of authenticationprotocols, our purpose is …
AA Rasheed, RN Mahapatra… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… PRELIMINARIES The proposed authenticationprotocol in this paper is based on the ZKP … [31] into the authenticationprotocol framework. Our authentication scheme is tailored with a …