[Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks

N Ahmed, Z Deng, I Memon, F Hassan… - Wireless …, 2022 - Wiley Online Library
Vehicular ad hoc networks (VANETs) connect two or more vehicles wirelessly to enable data
exchange in an Internet of Things (IoT) environment. In VANETs, location privacy is the most …

Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

Chebyshev polynomial-based scheme for resisting side-channel attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Applied Sciences, 2022 - mdpi.com
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks
are often required to cope with schemes based on either bilinear pair cryptography (BPC) or …

Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …

Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)

MA Al-Shareeda, S Manickam, BA Mohammed… - Sustainability, 2022 - mdpi.com
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data
about road conditions, since the message transmission rate and the downloading service …

Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2022 - mdpi.com
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …

Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Applied Sciences, 2022 - mdpi.com
The new fifth-generation (5G) cellular networks dramatically improve the speed of message
transmissions. Most existing authentication schemes that secure 5G communication rely …

Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks

J Noh, Y Kwon, J Son, S Cho - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
One significant security challenge in vehicular networks is defending against malicious
members' attacks, including insiders and compromised authorities. Insiders are legitimate …

Hide and seek: Privacy-preserving and FAA-Compliant drones location tracing

A Brighente, M Conti, S Sciancalepore - Proceedings of the 17th …, 2022 - dl.acm.org
Due to the frequent unauthorized invasions by commercial drones to Critical Infrastructures
(CIs), the US-based Federal Avionics Administration (FAA) recently published a new …

IoV‐SDCM: An IoV Secure Data Communication Model Based on Network Encoding and Relay Collaboration

Y Sun, L Yin, Y Ma, C Wang - Security and Communication …, 2022 - Wiley Online Library
Internet of Vehicles (IoV) is a significant 5G application scenario. As it developed rapidly,
more and more vehicles are connected to Internet of Vehicles. The data security and privacy …