2014
DOI: 10.1016/j.comnet.2013.08.020
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure three-party authenticated key agreement protocol using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
45
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(45 citation statements)
references
References 23 publications
0
45
0
Order By: Relevance
“…Also, due to the introduction of Internet of Things (IoT), where the inter-network traffic flow is allowed, security of the V2G network will become a critical issue [19], [20]. In order to keep the system protected against such attacks, various security and privacy requirements, such as authentication, secure key management, confidentiality, message integrity, anonymity, and untraceability need to be maintained [21], [22], [23].…”
Section: Related Workmentioning
confidence: 99%
“…Also, due to the introduction of Internet of Things (IoT), where the inter-network traffic flow is allowed, security of the V2G network will become a critical issue [19], [20]. In order to keep the system protected against such attacks, various security and privacy requirements, such as authentication, secure key management, confidentiality, message integrity, anonymity, and untraceability need to be maintained [21], [22], [23].…”
Section: Related Workmentioning
confidence: 99%
“…In [32], a resource allocation mechanism was proposed in selforganizing LTE, which might be useful when LTE is adopted for inter-vehicle communications. Many researchers have attempted to enhance security of vehicular networks [31,37,38,41,43,44,46]. In [31], the authors focused on security problems in Internet of Things (IoT), in which vehicles are one of main elements.…”
Section: Mechanisms For Improving Vehicular Networkmentioning
confidence: 99%
“…The authors in [38] introduced a threshold credit-based incentive mechanism to make devices robust to compromise attacks in cloud-assisted vehicular delay tolerant network (DTNs). In [37,41,43,44,46], the authors have proposed key security algorithms that can be applied to vehicular networks. Moreover, some researchers have broaden the spectrum of possible applications of vehicular communications: multimedia services [35] and cloud computing [36,42,45].…”
Section: Mechanisms For Improving Vehicular Networkmentioning
confidence: 99%
“…However, current literature still lacks a comprehensive study on trust management in IoT [9]. Authenticated key agreement protocol is a useful cryptographic primitive, which can be used to protect the confidentiality, integrity, and authenticity for transmitted data over insecure networks [6].…”
Section: Related Workmentioning
confidence: 99%
“…Such an improved security network brings a bright foreground for large data communications, i.e., the demand for the large data applications like IPTV, VoIP, and video conference has grown tremendously [5][6][7][8]. Meanwhile, research topic on secured communications has also received much attention in the past decade, and many works have been proposed to design robust and efficient schemes for delivering secured content delivery over error-prone networks [1,5,6,[9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%