A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks

S Dong, H Su, Y **a, F Zhu, X Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …

COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing

MA Al-Shareeda, S Manickam - International journal of environmental …, 2022 - mdpi.com
The COVID-19 pandemic is currently having disastrous effects on every part of human life
everywhere in the world. There have been terrible losses for the entire human race in all …

FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks

BA Mohammed, MA Al-Shareeda, S Manickam… - IEEE …, 2023 - ieeexplore.ieee.org
The fifth-generation (5G) technology-enabled vehicular network has been widely used in
intelligent transportation in recent years. Since messages shared among vehicles are …

Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …

Survey on delegated and self-contained authorization techniques in CPS and IoT

SV Sudarsan, O Schelén, U Bodin - IEEE Access, 2021 - ieeexplore.ieee.org
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …

Efficient authentication scheme for 5G-enabled vehicular networks using fog computing

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Sensors, 2023 - mdpi.com
Several researchers have proposed secure authentication techniques for addressing
privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …

L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system

AA Almazroi, MA Alqarni, MA Al-Shareeda… - Plos one, 2023 - journals.plos.org
The role that vehicular fog computing based on the Fifth Generation (5G) can play in
improving traffic management and motorist safety is growing quickly. The use of wireless …

Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)

MA Al-Shareeda, S Manickam, BA Mohammed… - Sustainability, 2022 - mdpi.com
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data
about road conditions, since the message transmission rate and the downloading service …

Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2022 - mdpi.com
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …

A survey on privacy-preserving authentication schemes in VANETs: Attacks, challenges and open issues

SA Jan, NU Amin, M Othman, M Ali, AI Umar… - IEEE …, 2021 - ieeexplore.ieee.org
Vehicular ad hoc Networks (VANETs) are an emerging technology with robust applications
in Intelligent Transport System. It consists of smart vehicles and roadside infrastructure …