2022
DOI: 10.1007/s11227-022-04562-9
|View full text |Cite
|
Sign up to set email alerts
|

A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…Through the analysis of existing IoV authentication protocols, we identified certain deficiencies in several of the existing authentication protocols, such as high computational costs, a lack of multi-factor secrecy and no known session key secrecy, and also found that they may suffer from ID/password guessing attacks, RSU captured attacks and so on. Recently, Kumar et al [5] proposed a conditional privacy protection and desynchronizationresistant authentication scheme for IoV. However, we found that Kumar et al's [5] scheme suffers from several attacks.…”
Section: Motivation and Contributionsmentioning
confidence: 77%
See 2 more Smart Citations
“…Through the analysis of existing IoV authentication protocols, we identified certain deficiencies in several of the existing authentication protocols, such as high computational costs, a lack of multi-factor secrecy and no known session key secrecy, and also found that they may suffer from ID/password guessing attacks, RSU captured attacks and so on. Recently, Kumar et al [5] proposed a conditional privacy protection and desynchronizationresistant authentication scheme for IoV. However, we found that Kumar et al's [5] scheme suffers from several attacks.…”
Section: Motivation and Contributionsmentioning
confidence: 77%
“…Recently, Kumar et al [5] proposed a conditional privacy protection and desynchronizationresistant authentication scheme for IoV. However, we found that Kumar et al's [5] scheme suffers from several attacks. To solve these problems, we proposed a secure and efficient V2I authentication scheme for IoV.…”
Section: Motivation and Contributionsmentioning
confidence: 77%
See 1 more Smart Citation
“…This section provides an overview of the AVISPA tool and demonstrates the simulation results to check the security of Su et al protocol using a widely used security verification model AVISPA. 24,25 4.3.1 Description of AVISPA tool AVISPA is a tool for verifying the security of authentication protocols through simulation. High-Level Protocol Specification Language (HLPSL) is used to implement the simulation code.…”
Section: Formal Verification Su Et Al's Protocol Sing Avispa Toolmentioning
confidence: 99%
“…This section provides an overview of the AVISPA tool and demonstrates the simulation results to check the security of Su et al protocol using a widely used security verification model AVISPA 24,25 …”
Section: Crypt‐analysis Of Su Et Al's Protocolmentioning
confidence: 99%