Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm

Y Liu, Y Wang, G Chang - IEEE Transactions on Intelligent …, 2017 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) aims to provide a new convenient, comfortable, and safe
driving way, and in turn enables intelligent transportation through wireless communications …

A blockchain-based authentication scheme and secure architecture for IoT-enabled maritime transportation systems

P Zhang, Y Wang, GS Aujla, A Jindal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Although modern Maritime Transportation Systems (MTS) have been extensively benefited
from Internet of Things (IoT) technology, but still the risks and challenges in safety and …

Provably secure escrow-less Chebyshev chaotic map-based key agreement protocol for vehicle to grid connections with privacy protection

D Abbasinezhad-Mood, A Ostad-Sharif… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Security and privacy concerns necessitate the careful management of shared keys in the
vehicle to grid (V2G) networks. To do so, in recent years, several interesting key agreement …

Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular ad-hoc networks

J Liu, Y Yu, J Jia, S Wang, P Fan… - Tsinghua Science …, 2019 - ieeexplore.ieee.org
Amidst the rapid development of the Internet of Things (IoT), Vehicular Ad-Hoc NETwork
(VANET), a typical IoT application, are bringing an ever-larger number of intelligent and …

Efficient privacy-preserving authentication in wireless mobile networks

HJ Jo, JH Paik, DH Lee - IEEE Transactions on Mobile …, 2013 - ieeexplore.ieee.org
Secure authentication in roaming services is being designed to allow legal users to get
access to wireless network services when they are away from their home location. Recently …

A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks

W Hong, L Jianhua, L Chengzhe, W Zhe - Peer-to-Peer Networking and …, 2020 - Springer
Providing integrity, non-repudiation and validity for transmitted data is always very attractive
in unmanned aerial vehicle cluster networks (UAVCN). Currently,“one by one” data …

Robust session key generation protocol for social internet of vehicles with enhanced security provision

SA Eftekhari, M Nikooghadam, M Rafighi - The Journal of Supercomputing, 2021 - Springer
Social internet of things (SIoT) is an emerging concept that enables the autonomous
interactions between social networks and internet of things (IoT). Vehicle-to-grid (V2G) …

Cross-Domain Authentication Scheme for Vehicles Based On Given Virtual Identities

Y Chen, J Zhang, X Wei, Y Wang - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The advancement of intelligent transportation systems has enhanced both vehicle ad hoc
networks (VANETs) and road safety. However, traditional cross-domain scenarios in …

Pre-distribution of certificates for pseudonymous broadcast authentication in VANET

M Feiri, R Pielage, J Petit, N Zannone… - 2015 IEEE 81st …, 2015 - ieeexplore.ieee.org
In the context of vehicular networks, certificate management is challenging because of the
dynamic topology and privacy requirements. In this paper we propose a technique that …

An anonymous communication scheme based on ring signature in VANETs

Y Jiang, Y Ji, T Liu - arXiv preprint arXiv:1410.1639, 2014 - arxiv.org
Vehicular ad hoc networks allow vehicles to connect themselves as networks so that cars
could communicate with each other. This paper introduces an anonymous communication …