2022
DOI: 10.1109/access.2021.3137877
|View full text |Cite
|
Sign up to set email alerts
|

Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions

Abstract: It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services. Additionally, the communication channels between vehicles and the infrastructure lack various security features due to the inferior wireless characteristics of their environment. However, most of the existing authentication schemes which are used to fix the security drawbacks lead to heavy computations and large s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…Apart from authentication, techniques such as protected credential storage, secure secret key sharing, secure data storage and data sharing have been identified in [30], [31], [32], [33], [34], [35], [36]. As pointed out in [37], [38] and [39], the client data must be encrypted before transmission to and from the cloud servers. To achieve this, both symmetric and asymmetric cryptosystems can be employed.…”
Section: Figure 1 Iot-cloud Environmentmentioning
confidence: 99%
“…Apart from authentication, techniques such as protected credential storage, secure secret key sharing, secure data storage and data sharing have been identified in [30], [31], [32], [33], [34], [35], [36]. As pointed out in [37], [38] and [39], the client data must be encrypted before transmission to and from the cloud servers. To achieve this, both symmetric and asymmetric cryptosystems can be employed.…”
Section: Figure 1 Iot-cloud Environmentmentioning
confidence: 99%
“…Bilinear pairing adds complex processing to memory-constrained devices such as VANETS [4]. The storage overhead for a vehicle mentioned in [11] is 4 K bytes for every device in a vehicular ad hoc networks. Reference Cheng et al [12] proposed an RSU-based authentication scheme using a combination of a Symmetric Key and Chebyshev chaotic map.…”
Section: Introductionmentioning
confidence: 99%
“…In general, the schemes can be classi ed into ve groups in terms of the underlying intractability problem: based on discrete-logarithm problem [5][6][7][8], based on pairing [9,10], based on chaotic map [11][12][13], based on integer-factorization problem [14], and based on hash function [15][16][17][18]. Among them, schemes based on elliptic curve bilinear pairings, such as a robust provable-secure privacy-preserving authentication protocol (PpAP) for Industrial Internet of ings [10], usually require large computation cost.…”
Section: Introductionmentioning
confidence: 99%