2021
DOI: 10.1109/mits.2020.2985024
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Authentication Techniques in Vehicular Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 88 publications
0
10
0
Order By: Relevance
“…Domain (s) Surveyed Year [5] Authentication schemes for VANETs 2017 [6] VANet security challenges and solutions 2017 [7] Attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV 2017 [8] Security attacks in VANETs: Communication, applications and challenges 2019 [9] Recent Advances in Vehicular Network Security, Trust, and Privacy 2019 [10] Authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs) 2020 [11] Certificate Revocation Schemes in Vehicular Networks 2020 [12] Authentication and Privacy Schemes in VANET 2021 [13] Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET 2020 [14] Authentication Techniques in VANETs 2020…”
Section: Papermentioning
confidence: 99%
See 1 more Smart Citation
“…Domain (s) Surveyed Year [5] Authentication schemes for VANETs 2017 [6] VANet security challenges and solutions 2017 [7] Attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV 2017 [8] Security attacks in VANETs: Communication, applications and challenges 2019 [9] Recent Advances in Vehicular Network Security, Trust, and Privacy 2019 [10] Authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs) 2020 [11] Certificate Revocation Schemes in Vehicular Networks 2020 [12] Authentication and Privacy Schemes in VANET 2021 [13] Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET 2020 [14] Authentication Techniques in VANETs 2020…”
Section: Papermentioning
confidence: 99%
“…Farooq et al [14] have discussed the VANET authentication schemes and its mitigation in several attacks. It discussed the advantages and disadvantages of various schemes and also provided research direction in the area of VANET authentication.…”
Section: A Related Workmentioning
confidence: 99%
“…It can also perform different tasks such as energy management, demand response and energy trading through AMI. AMI allows communication between smart meters and DSO for various Among the security requirements, authentication is an essential cornerstone in securing the communication [22]. Just compromising this requirement in AMI network is a gateway to a plethora of security attacks.…”
Section: Smart Grid and Advanced Metering Infrastructure (Ami)mentioning
confidence: 99%
“…Vehicular ad hoc networks (VANETs) are the network component structure of ITS. It is a variant of mobile self-organizing network, capable of dynamically organizing vehicles with other networks as they move [3]. VANETS can be divided into four types, such as Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Network (V2N) and Vehicle-to-Pedestrian (V2P).…”
Section: Introductionmentioning
confidence: 99%