2015
DOI: 10.1007/s11277-015-3106-7
|View full text |Cite
|
Sign up to set email alerts
|

ID-Based Communication Framework in Future Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…The privacy protection of the identities of the vehicle can be done effectively with the help of various authentication approaches [18][19]. These authentication approaches are broadly classified into three types such as cryptography-based authentication technique [18][19][20][21][22][23][24], reputation evaluation-based technique [25][26][27][28][29][30], and hardware-based trust enhancement technique [31][32][33][34]. Cryptography-based authentication technique deals only with the correct evidence holds by the vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…The privacy protection of the identities of the vehicle can be done effectively with the help of various authentication approaches [18][19]. These authentication approaches are broadly classified into three types such as cryptography-based authentication technique [18][19][20][21][22][23][24], reputation evaluation-based technique [25][26][27][28][29][30], and hardware-based trust enhancement technique [31][32][33][34]. Cryptography-based authentication technique deals only with the correct evidence holds by the vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…A growing body of evidence clearly demonstrates that there is a problem to identify mobile users on the Internet. There are many works that deal with this topic, such as [2], which proposes an ID-based communication framework, where IP addresses play a significant role, not only in locating hosts and in routing the traffic, but also in the identification of hosts and services. In this paper, we adopt a MSISDN-based (Mobile Station International Subscriber Directory Number) user's identity.…”
Section: Related Workmentioning
confidence: 99%
“…The authentication scheme can be broadly classified into the following three categories: cryptography-based [ 28 , 29 ], trust-based [ 30 , 31 ], and hardware-based [ 32 , 33 ]. In the semi-trust model, organizations involved in protecting privacy are not well suited to deliver high-throughput security applications and smart entertainment applications.…”
Section: Introductionmentioning
confidence: 99%