2019
DOI: 10.1109/access.2019.2891105
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Authentication Protocol for Internet of Vehicles

Abstract: An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads. However, as the data are transmitted in an insecure network, it is essential to use an authentication mechanism to protect the privacy of vehicle users. Recently, Ying et al. proposed an authentication protocol for IoV and claimed that the protocol could resist various attacks. Unfortunately, we discovered that their protocol suffered from an offline identity guessing attack, location spoo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
164
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 259 publications
(165 citation statements)
references
References 25 publications
0
164
0
1
Order By: Relevance
“…It is necessary to repeatedly calculate and experiment with a large amount of sample data to ensure the accuracy of the model and the output results are in line with the actual driving situation. If the sample is not representative or the sample size is small, the output will seriously deviate from the actual driving situation [15][16][17][18].…”
Section: Honda Algorithmmentioning
confidence: 99%
“…It is necessary to repeatedly calculate and experiment with a large amount of sample data to ensure the accuracy of the model and the output results are in line with the actual driving situation. If the sample is not representative or the sample size is small, the output will seriously deviate from the actual driving situation [15][16][17][18].…”
Section: Honda Algorithmmentioning
confidence: 99%
“…At present, with the rapid development of computer technology [2][3][4][5][6], intelligent computing is one of the important methods of intelligent science, and it is also a cutting-edge subject of information technology. The intelligent computing technologies and new methods developed in recent years have been widely used in many disciplines, and have achieved fruitful results in military, financial engineering, nonlinear system optimization, knowledge engineering, and computer-aided medical diagnosis.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, key management or key establishment cryptographic protocols are used to provide a secure communication channel . There have been a large number of key establishment protocols proposed in the literature, and examples include those presented in the previous studies …”
Section: Introductionmentioning
confidence: 99%