2019
DOI: 10.1016/j.phycom.2018.07.015
|View full text |Cite
|
Sign up to set email alerts
|

Secure message confirmation scheme based on batch verification in vehicular cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 23 publications
0
24
0
1
Order By: Relevance
“…We have proposed an efficient and secure communication scheme for V2R communication, as discussed in [26], and this protocol work resists to various cyber-attacks, i.e., plain-text, man-in-the-middle, impersonation, modification, and replay. Further, the suggested protocol [26] is also feasible to verify a massive number of messages at a time precisely, and it performs excellently in the implementation cost, energy consumption, communication overhead, and storage cost compared to other relevant data transmission mechanisms.…”
Section: Research Methodology and Approachmentioning
confidence: 99%
“…We have proposed an efficient and secure communication scheme for V2R communication, as discussed in [26], and this protocol work resists to various cyber-attacks, i.e., plain-text, man-in-the-middle, impersonation, modification, and replay. Further, the suggested protocol [26] is also feasible to verify a massive number of messages at a time precisely, and it performs excellently in the implementation cost, energy consumption, communication overhead, and storage cost compared to other relevant data transmission mechanisms.…”
Section: Research Methodology and Approachmentioning
confidence: 99%
“…However, this method takes more time to verify the signature, so the recipient must spend more time immediately verifying the correctness of the message. In 2019, Limbasiya et al [4] proposed a secure message confirmation in vehicular cloud environment. They are pointed out that Zhong et al's protocol [16] has a security flaws using side channel attack over the OBU and TPD.…”
Section: Authentication Protocol For Vehicle Communicationmentioning
confidence: 99%
“…The TPD is safe from malicious attacks and it is impossible to tamper with it, according to the proposed schemes. However, the ideal TPD has a strong assumption that an attacker cannot obtain or tamper with values in the TPD according to [1][2][3][4]. They pointed out that attackers can obtain stored values in the realistic TPD through power analysis attacks and side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations