2023
DOI: 10.3390/s23052682
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems

Abstract: Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy. To achieve secure data transmission, several authentication schemes are proposed by various researchers. The most predominant schemes are based on identity-based and public-key cryptography techniques. Due to limitations such as key escrow in identity-based cryptography and certificate management in pub… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 102 publications
0
0
0
Order By: Relevance
“…However, some surveys are included in Table 4 if they partially included papers relevant for the intersection of C-ITSs and CLC, and in that case, the proportion of schemes implemented are only counted from the set of CLC-based schemes mentioned in the survey. Surveys [32,78,79] In the analyzed time frame of 2022-2023 there was no proof-of-concept implementations on-site, i.e., corresponding to level 5 in CLC TRL. The majority of implementations, and, thereby, performance analysis of CLC schemes, were made on laptops and/or PC clients with varying specifications in both Ubuntu and Windows.…”
Section: Current State Of Research In Clc For C-itsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, some surveys are included in Table 4 if they partially included papers relevant for the intersection of C-ITSs and CLC, and in that case, the proportion of schemes implemented are only counted from the set of CLC-based schemes mentioned in the survey. Surveys [32,78,79] In the analyzed time frame of 2022-2023 there was no proof-of-concept implementations on-site, i.e., corresponding to level 5 in CLC TRL. The majority of implementations, and, thereby, performance analysis of CLC schemes, were made on laptops and/or PC clients with varying specifications in both Ubuntu and Windows.…”
Section: Current State Of Research In Clc For C-itsmentioning
confidence: 99%
“…Moreover, the literature analysis suggests that the nomenclature, notation, and grouping of schemes is not fully harmonized; thus, potentially leading to even slower adoption due to a lower level of comprehension. As pointed out by Sripathi Venkata Naga et al [78] from the literature analysis, future work in investigating notation standards as in what type of CLC solutions there are with regards to type of application scenario, is suggested. Indeed, lacking a common language among information security practitioners have been noted as a major factor that slows down progression within the field [82].…”
Section: Gap 3: Stakeholders and Standardizationmentioning
confidence: 99%