2019
DOI: 10.1002/dac.4103
|View full text |Cite
|
Sign up to set email alerts
|

SEBAP:  A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing

Abstract: Summary Vehicular cloud computing (VCC) is an emerging research area of cloud and vehicular networking. It equips vehicles with networking and sensing capacities for vehicle‐to‐vehicle or vehicle‐to‐infrastructure communication with available roadside infrastructure. It is significantly utilized in traffic management and road safety using cloud applications. To obtain impressive networking in vehicular communication, there is a need of hybrid technological approach in the form of VCC utilizing vehicular resour… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(28 citation statements)
references
References 47 publications
0
28
0
Order By: Relevance
“…We give up the cost and execution time of the symmetric encryption/decryption algorithm. We assume that the cost and execution time of inversion and multiplication operations are equal. To have a fair comparison, we assume the ElGamal cryptosystem for auditing protocols presented by a generic encryption/decryption and signature algorithms. According to 34 , the executing times and cost of multiplication, point adding, and point doubling have been assumed almost equal. …”
Section: Evaluation and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…We give up the cost and execution time of the symmetric encryption/decryption algorithm. We assume that the cost and execution time of inversion and multiplication operations are equal. To have a fair comparison, we assume the ElGamal cryptosystem for auditing protocols presented by a generic encryption/decryption and signature algorithms. According to 34 , the executing times and cost of multiplication, point adding, and point doubling have been assumed almost equal. …”
Section: Evaluation and Comparisonmentioning
confidence: 99%
“…To compare the execution time of the DA‐DS protocol with other auditing protocols we have presented Table 3 due to calculated execution times in Ref. 34‐36 ( U is assumed as smartphone has the Hisilicon Kirin 925, 2.45‐GHz processor, and 3‐GB memory, a i s are assumed as laptops using the Intel I7‐4460S, 3.1 GHz processor, and 16 GB memory, and CA is assumed as a PC using the Intel I7‐6700k, 4.0‐GHz processor, and 32‐GB memory 34 ).…”
Section: Evaluation and Comparisonmentioning
confidence: 99%
“…The two‐terminal entities are required to have a shared secret code to identify themselves to the A u . Biometrics which are being effectively used for authentication 54 are utilized to identify U . A shared secret code is being utilized to identify S of the SP .…”
Section: Security Analysismentioning
confidence: 99%
“…Kumar et al 8 proposed a secure and efficient biometric‐based authentication protocol framework for vehicle cloud computing (VCC) with the help of the elliptic curve cryptography (ECC). It provided secure communication in vehicular applications with various security features and attributes, including password authentication, vehicular data protection, and vehicle driver's identity authentication satisfied by the proposed protocol (SEBAP).…”
Section: Related Workmentioning
confidence: 99%