2021
DOI: 10.1049/itr2.12113
|View full text |Cite
|
Sign up to set email alerts
|

An HSS‐based robust and lightweight multiple group authentication for ITS towards 5G

Abstract: The next generation of network communications (5G) has the particularity of being heterogeneous, which has different abilities with storage, computing and communication. Group communications is more and more popular for Intelligent Transportation Systems (ITS) in 5G since various smart devices have been constantly connected to ITS over the past decades. One of the main challenges faced by the group communications for ITS towards 5G is how to make the communications secure among these heterogeneous devices. Mem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Through this topology design, different access modes are set for various roles in the system.Whether tourists or registered users, authenticate users [12], [13], use mobile terminals to register and log in to the sys-tem through wireless settings, and complete corresponding queries and other operations. There are three types of file business publishers: correspondent, organization publisher, and individual publisher.…”
Section: B System Topologymentioning
confidence: 99%
“…Through this topology design, different access modes are set for various roles in the system.Whether tourists or registered users, authenticate users [12], [13], use mobile terminals to register and log in to the sys-tem through wireless settings, and complete corresponding queries and other operations. There are three types of file business publishers: correspondent, organization publisher, and individual publisher.…”
Section: B System Topologymentioning
confidence: 99%
“…In 2013, harn [13] proposed an idea of group authentication whose complexity (O(n)) is very much less than general approach of authentication (O(n 2 )) [14]. Recently, [27], [28] and [29] have used group-based authentication in fog computing, drones network and Intelligent transportation system (ITS) respectively. In [16], Chien et al demonstrates the flaws in Harn's asynchronous methods and propose a new scheme to overcome the issues such as spoofing attack and make it more efficient.…”
Section: Related Workmentioning
confidence: 99%
“…A secure channel is needed for the exchange of tokens among the nodes as in [27], [28] and [29]which makes these schemes uneconomical with latency. In our work, we have proposed a novel group-based authentication scheme that eliminates secure channels' dependency.…”
Section: Proposed Schemementioning
confidence: 99%
“…Secure group communication and membership authentication is needed for hours. Recently, [26]- [28] have used group-based authentication in fog computing, drones network and Intelligent transportation system (ITS), respectively. Studies on group authentication are mostly based on secret sharing schemes.…”
Section: Related Workmentioning
confidence: 99%
“…A secure channel is needed to exchange tokens among the nodes [26]- [28], which makes these schemes uneconomical with latency. In this work, a novel group-based authentication scheme that eliminates secure channel's dependency is proposed Also, members authenticate each other, and then a session key is established for future communication.…”
Section: Proposed Schemementioning
confidence: 99%