2021
DOI: 10.1109/tvt.2021.3050614
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 98 publications
(31 citation statements)
references
References 41 publications
0
31
0
Order By: Relevance
“…The best solution to save the data from the attacker is to encrypt the data before exchanging it. Another measure to have seamless secure network is to apply an authentication protocol always before allowing any device to enter the network [ 86 ]. IoT network is an expanding network as everyday new IoT devices are connected in the network.…”
Section: Security Challenges Attacks Countermeasures and Requirements...mentioning
confidence: 99%
See 1 more Smart Citation
“…The best solution to save the data from the attacker is to encrypt the data before exchanging it. Another measure to have seamless secure network is to apply an authentication protocol always before allowing any device to enter the network [ 86 ]. IoT network is an expanding network as everyday new IoT devices are connected in the network.…”
Section: Security Challenges Attacks Countermeasures and Requirements...mentioning
confidence: 99%
“…Another measure to have seamless secure network is to apply an authentication protocol always before allowing any device to enter the network [ 86 ].…”
Section: Security Challenges Attacks Countermeasures and Requirements...mentioning
confidence: 99%
“…In equation ( 15), Q is the user requesting authentication, j is the dimension, and j ∈ [1,160] and f i are the face feature vectors of registered users.…”
Section: Q[j]mentioning
confidence: 99%
“…e network communication load and storage space of the traditional cloud computing intelligent system are impacted. With the improvement of the real-time requirements of the network, the edge computing arises at the historic moment [1]. Relevant research shows that as of October 30, 2020, 50% of multimedia data have been preprocessed, forwarded, stored, and other operations through the Internet edge [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…It mainly includes inside and outside vehicle communication [5,6]. The latter includes the communication between the vehicle and its surrounding environment, such as vehicle-to-vehicle (V2V), vehicle-toinfrastructure (V2I), infrastructure-to-vehicle (I2V), vehicleto-cloud, vehicle-to-pedestrians, and vehicles-to-grid [7,8]. IEEE 802.11p standard defines dedicated short-range communication (DSRC) which is one of the most promising wireless standards to support ITS [9,10].…”
Section: Introductionmentioning
confidence: 99%