2023
DOI: 10.1109/tits.2023.3253710
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…A physical unclonable function (PUF) [20] is a hardware security primitive that leverages the unique physical characteristics of a chip to generate an unpredictable response. It possesses reproducibility, uniqueness, and unpredictability properties.…”
Section: Physical Unclonable Functionmentioning
confidence: 99%
“…A physical unclonable function (PUF) [20] is a hardware security primitive that leverages the unique physical characteristics of a chip to generate an unpredictable response. It possesses reproducibility, uniqueness, and unpredictability properties.…”
Section: Physical Unclonable Functionmentioning
confidence: 99%
“…In 2021, Othman et al [18] presented a physically secure CPPA scheme based on PUF and secret sharing. In 2023, Xie et al [19] designed a V2I and V2V authentication CPPA scheme based on Elliptic Curve Cryptography (ECC) and PUF. Unfortunately, Xie et al's [19] scheme cannot achieve three-factor secrecy.…”
Section: Related Workmentioning
confidence: 99%
“…In 2023, Xie et al [19] designed a V2I and V2V authentication CPPA scheme based on Elliptic Curve Cryptography (ECC) and PUF. Unfortunately, Xie et al's [19] scheme cannot achieve three-factor secrecy. Xu et al [20] also presented a three-factor CPPA scheme in VANETs.…”
Section: Related Workmentioning
confidence: 99%
“…In prior investigations, researchers delved into the Security Credential Management System SCMS, and, according to references [4,5], SCMS proves to be a promising solution for ensuring secure information exchange in V2V scenarios. Despite its objective to provide secure authentication, authorization, and data integrity for V2V communication, the challenges outlined in [6,7] persist and demand attention.…”
Section: Security Credential Management System For V2v Communicationsmentioning
confidence: 99%