A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …
transportation systems, their own security has become an important research topic …
COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing
MA Al-Shareeda, S Manickam - International journal of environmental …, 2022 - mdpi.com
The COVID-19 pandemic is currently having disastrous effects on every part of human life
everywhere in the world. There have been terrible losses for the entire human race in all …
everywhere in the world. There have been terrible losses for the entire human race in all …
FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks
The fifth-generation (5G) technology-enabled vehicular network has been widely used in
intelligent transportation in recent years. Since messages shared among vehicles are …
intelligent transportation in recent years. Since messages shared among vehicles are …
Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks
MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …
Survey on delegated and self-contained authorization techniques in CPS and IoT
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …
secure digital systems. In this, authorization is a key component for regulating the detailed …
Efficient authentication scheme for 5G-enabled vehicular networks using fog computing
Several researchers have proposed secure authentication techniques for addressing
privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …
privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …
L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system
The role that vehicular fog computing based on the Fifth Generation (5G) can play in
improving traffic management and motorist safety is growing quickly. The use of wireless …
improving traffic management and motorist safety is growing quickly. The use of wireless …
Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data
about road conditions, since the message transmission rate and the downloading service …
about road conditions, since the message transmission rate and the downloading service …
Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …
A survey on privacy-preserving authentication schemes in VANETs: Attacks, challenges and open issues
Vehicular ad hoc Networks (VANETs) are an emerging technology with robust applications
in Intelligent Transport System. It consists of smart vehicles and roadside infrastructure …
in Intelligent Transport System. It consists of smart vehicles and roadside infrastructure …