2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2018
DOI: 10.1109/spawc.2018.8445990
|View full text |Cite
|
Sign up to set email alerts
|

Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…Thus, cross-layer authentication protocol which integrates PLA in RANs and cryptography-based authentication in core networks is considered. However, conventional cross-layer authentication protocols [11][12][13][14] cannot provide both a reliable authentication performance and small signaling overhead for 5G networks. For example, as mentioned earlier, the authentication protocol in [11] which supplements computational security of cryptography-based authentication by using PLA (i.e., information theoretical security) has excessive signaling overhead and would be limited for applications.…”
Section: Motivation and Local Securitymentioning
confidence: 99%
See 3 more Smart Citations
“…Thus, cross-layer authentication protocol which integrates PLA in RANs and cryptography-based authentication in core networks is considered. However, conventional cross-layer authentication protocols [11][12][13][14] cannot provide both a reliable authentication performance and small signaling overhead for 5G networks. For example, as mentioned earlier, the authentication protocol in [11] which supplements computational security of cryptography-based authentication by using PLA (i.e., information theoretical security) has excessive signaling overhead and would be limited for applications.…”
Section: Motivation and Local Securitymentioning
confidence: 99%
“…For example, as mentioned earlier, the authentication protocol in [11] which supplements computational security of cryptography-based authentication by using PLA (i.e., information theoretical security) has excessive signaling overhead and would be limited for applications. In contrary, the cross-layer authentication protocols in [12][13][14] have limitations in terms of authentication performance due to uncontrollable physical features in PLA. In addition, there is no theoretical analysis for the conventional cross-layer authentication protocols in terms of authentication performance and signaling overhead.…”
Section: Motivation and Local Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…The continuity of the vehicle's moving states can also assist in authentication. Abdelaziz and Koksal [32] use the angle information of the vehicle and the GPS position information to authenticate the vehicle. Lim and Tuladhar [33] use radar information for authentication.…”
Section: Related Workmentioning
confidence: 99%