The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely …
Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …
J Huang, Y Qian, RQ Hu - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
Vehicular networks provide various applications for vehicles to improve road safety and traffic efficiency as well as infotainment. Security and privacy are of great importance for the …
J Zhang, H Zhong, J Cui, M Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Based on the functional characteristics of inter-vehicle communication networks under the current framework, a privacy-preserving authentication framework that combines fifth …
Q Tao, H Ding, T Jiang, X Cui - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The big data of Internet of Vehicles contributes to the development of intelligent transportation. Privacy protection in vehicular ad hoc networks (VANETs) is the core factor to …
X Lin, X Li - IEEE Transactions on Vehicular Technology, 2013 - ieeexplore.ieee.org
Recently, vehicular ad hoc networks (VANETs) have emerged as a promising approach to increasing road safety and efficiency, as well as improving the driving experience. This can …
The vehicular ad-hoc network relies on wireless communication, thus exposing security and privacy-related issues. The primary security requirements in a vehicular network are vehicle …
J Liu, C Peng, R Sun, L Liu, N Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
As a representative application scenario of the Internet of Things (IoT), the Internet of Vehicles (IoV) plays an important function in the area of intelligent transportation. However …
P Vijayakumar, M Azees, SA Kozlov… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next …