A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks

S Dong, H Su, Y Xia, F Zhu, X Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …

A comprehensive survey on vehicular ad hoc networks (vanets)

MA Al-shareeda, MA Alazzawi, M Anbar… - 2021 International …, 2021 - ieeexplore.ieee.org
Vehicle Ad-hoc Networks (VANETs) have recently become an active research area. This is
because of its important applications in the transportation field in which vehicles have …

COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing

MA Al-Shareeda, S Manickam - International journal of environmental …, 2022 - mdpi.com
The COVID-19 pandemic is currently having disastrous effects on every part of human life
everywhere in the world. There have been terrible losses for the entire human race in all …

FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks

BA Mohammed, MA Al-Shareeda, S Manickam… - IEEE …, 2023 - ieeexplore.ieee.org
The fifth-generation (5G) technology-enabled vehicular network has been widely used in
intelligent transportation in recent years. Since messages shared among vehicles are …

Chebyshev polynomial-based scheme for resisting side-channel attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Applied Sciences, 2022 - mdpi.com
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks
are often required to cope with schemes based on either bilinear pair cryptography (BPC) or …

Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation

MA Al-Shareeda, S Manickam - Symmetry, 2022 - mdpi.com
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields,
including the environment, energy efficiency, smart transportation, intelligent agriculture, and …

A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Sensors, 2022 - mdpi.com
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on
roadside units to offer conditional privacy-preservation authentication and are vulnerable to …

Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Electronics, 2023 - mdpi.com
The privacy and security of the information exchanged between automobiles in 5G-enabled
vehicular networks is at risk. Several academics have offered a solution to these problems in …

Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)

MA Al-Shareeda, S Manickam, BA Mohammed… - Sustainability, 2022 - mdpi.com
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data
about road conditions, since the message transmission rate and the downloading service …

Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2022 - mdpi.com
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …