2019
DOI: 10.1109/jiot.2019.2902840
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
234
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 178 publications
(264 citation statements)
references
References 37 publications
1
234
0
Order By: Relevance
“…According to Table 7, the computation time for the IoT node/sensor node in the proposed protocol is 0.003 ms, which is 95.42%, 97.68%, 98.82%, 97.03%, 91.84%, 85.64%, 88.92, 91.95%, and 97.66% lower than the computation times in the protocols of Challa et al [19], He et al [27], Challa et al [26], Renuka et al [35], Ma et al [33], Lyu et al [32], Martínez-Peláez et al [34], Wazid et al [29], and Ryu et al [28], respectively. Therefore, our proposed protocol is more efficient and more suitable for constrained sensor devices in the IoT environment.…”
Section: B Computational Overhead Comparisonsmentioning
confidence: 83%
See 3 more Smart Citations
“…According to Table 7, the computation time for the IoT node/sensor node in the proposed protocol is 0.003 ms, which is 95.42%, 97.68%, 98.82%, 97.03%, 91.84%, 85.64%, 88.92, 91.95%, and 97.66% lower than the computation times in the protocols of Challa et al [19], He et al [27], Challa et al [26], Renuka et al [35], Ma et al [33], Lyu et al [32], Martínez-Peláez et al [34], Wazid et al [29], and Ryu et al [28], respectively. Therefore, our proposed protocol is more efficient and more suitable for constrained sensor devices in the IoT environment.…”
Section: B Computational Overhead Comparisonsmentioning
confidence: 83%
“…Research and studies on the context of the IoT and WSNs continue to this day. In 2019, several articles and investigations emerged (Lyu et al [32], Ma et al [33], Martínez-Peláez et al [34], Renuka et al [35]). However, these contributions still have weaknesses, especially in terms of the computation and communication overheads, which are large compared to our proposed protocol.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Security is a big challenge in VANETS, fog computing integration is smart transportation brings solution to this challenge. Ma et al [111] have designed a new authenticated key agreement (AKA) protocol for fog-based VANETs.…”
Section: Open Research Iiot Application Domains Fog Computing As mentioning
confidence: 99%