A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges

P Bagga, AK Das, M Wazid, JJPC Rodrigues… - Ieee …, 2020 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V)
communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial …

[HTML][HTML] Chebyshev polynomial-based scheme for resisting side-channel attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Applied Sciences, 2022 - mdpi.com
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks
are often required to cope with schemes based on either bilinear pair cryptography (BPC) or …

Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …

[HTML][HTML] L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system

AA Almazroi, MA Alqarni, MA Al-Shareeda… - Plos one, 2023 - journals.plos.org
The role that vehicular fog computing based on the Fifth Generation (5G) can play in
improving traffic management and motorist safety is growing quickly. The use of wireless …

[HTML][HTML] Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)

MA Al-Shareeda, S Manickam, BA Mohammed… - Sustainability, 2022 - mdpi.com
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data
about road conditions, since the message transmission rate and the downloading service …

[HTML][HTML] Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2022 - mdpi.com
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …

An efficient blockchain-based privacy preserving scheme for vehicular social networks

Y Pu, T Xiang, C Hu, A Alrawais, H Yan - Information Sciences, 2020 - Elsevier
In vehicular social networks (VSNs), edge stations or cloud service provider can support the
traffic services or location services to vehicles. Moreover, the information sharing among …

Decentralized trust evaluation in vehicular Internet of Things

S Guleng, C Wu, X Chen, X Wang, T Yoshinaga… - IEEE …, 2019 - ieeexplore.ieee.org
Trust management in a decentralized vehicular network, such as vehicular ad hoc network,
is particularly challenging due to the lack of centralized communication infrastructure and a …

[HTML][HTML] Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Applied Sciences, 2022 - mdpi.com
The new fifth-generation (5G) cellular networks dramatically improve the speed of message
transmissions. Most existing authentication schemes that secure 5G communication rely …