2016
DOI: 10.1109/tvt.2016.2621354
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

Abstract: Abstract-Public Key Infrastructure (PKI) is the most widely used security mechanism for securing communications over the network. However, there are known performance issues, making it unsuitable for use in the Vehicular Networks (VNs). In this paper, we propose a Secure and Authenticated Key Management Protocol (SA-KMP) to overcome the shortcomings of the PKI. The SA-KMP scheme distributes repository containing the bindings of the entity's identity and its corresponding public key to each vehicle and Road Sid… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(23 citation statements)
references
References 25 publications
0
23
0
Order By: Relevance
“…The authentication process in LTE networks is primarily handled by EPS-AKA. Firstly, we will discuss the LTE authentication [1,3,5,16] process using EPS-AKA. The LTE being a flat IP-based architecture is more prone to SQL injection, eavesdropping, IP address spoofing, MitM and PII theft [11], hence, the authentication process takes place at UE connection, call initiation, call termination, call handover, area updating etc.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The authentication process in LTE networks is primarily handled by EPS-AKA. Firstly, we will discuss the LTE authentication [1,3,5,16] process using EPS-AKA. The LTE being a flat IP-based architecture is more prone to SQL injection, eavesdropping, IP address spoofing, MitM and PII theft [11], hence, the authentication process takes place at UE connection, call initiation, call termination, call handover, area updating etc.…”
Section: Related Workmentioning
confidence: 99%
“…A considerable volume of research is reported on the authentication [5,[35][36][37][38][39][40][41]48] and on key agreement [18,[42][43][44][45][46] process to overcome the security gap that needs improvement in the recently proposed symmetric [13], and asymmetric security solutions [17]. Machine learning based authentication [2,4,46] and aggregation [47] is proposed to overcome the security flaws in the dynamic environments.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Vehicles run in a complex environment in real time. us, complex event-processing technology is required to filter the massive data stream generated by event instance flows to obtain those that concern the user via an eventprocessing model [10,11]. Events that concern users are sent to a client events library or disposed of based on a user's predefined rules.…”
Section: Introductionmentioning
confidence: 99%