2022
DOI: 10.1016/j.scs.2021.103384
|View full text |Cite
|
Sign up to set email alerts
|

An efficient authentication scheme for secured service provisioning in edge-enabled vehicular cloud networks towards sustainable smart cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 24 publications
0
5
0
1
Order By: Relevance
“…Masquerade attack is not that different. The meaning of this attack is to obtain an authentication mean [ 31 ], which lets the attacker’s vehicle be identified as an authenticated node in the system. Before being found out, many privacy attacks could be executed such as the extraction of some sensitive geo-location data and other attacks that would not be feasible without an authentication (or stealing an identity and its credentials).…”
Section: System Model and Potential Attacksmentioning
confidence: 99%
“…Masquerade attack is not that different. The meaning of this attack is to obtain an authentication mean [ 31 ], which lets the attacker’s vehicle be identified as an authenticated node in the system. Before being found out, many privacy attacks could be executed such as the extraction of some sensitive geo-location data and other attacks that would not be feasible without an authentication (or stealing an identity and its credentials).…”
Section: System Model and Potential Attacksmentioning
confidence: 99%
“…The importance of digital infrastructure is highlighted. The paper [6] developed a process to authenticate vehicles to facilitate security in an ITS cloud network.…”
Section: Related Workmentioning
confidence: 99%
“…2 presents the research articles regarding access control in IoT by various sectors to determine the gaps to better understand access control issues in the IoT ecosystem. The findings was divided into the several sectors which include smart cities, smart vehicles, smart grid, smart homes, healthcare, banking, property, industry (manufacturing and construction) and general IoT [7], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [35], [38], [39], [40], [41], [42], [43]. To answer RQ1 formulated in this study, the analysis was done to understand current access control gaps focusing on the IoT ecosystem that is determined based on the SLR outcomes.…”
Section: A Gaps Of Existing Access Control Systems In the Iotmentioning
confidence: 99%
“…Conventional access control (in centralized architecture) causing single point of failure IoT characteristic related issues (heterogeneity, scalability, mobility, limited power resources, memory size, computational capacity [7], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [44], [46], [48], [51], [53], [55], [23], [24], [25], [26], [27] IoT actuators and sensors unable to store large transactions [23],…”
Section: Current Gaps Literature Articlesmentioning
confidence: 99%