Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges
暂无分享,去创建一个
Joel J. P. C. Rodrigues | Ashok Kumar Das | Palak Bagga | Youngho Park | Mohammad Wazid | M. Wazid | J. Rodrigues | A. Das | Youngho Park | Palak Bagga
[1] Tony Q. S. Quek,et al. Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions , 2018, IEEE Transactions on Information Forensics and Security.
[2] Athanasios V. Vasilakos,et al. Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing , 2018, IEEE Journal of Biomedical and Health Informatics.
[3] Zhili Sun,et al. A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters , 2017, ICT Express.
[4] Zhou Zhou,et al. A practical intrusion detection system for Internet of vehicles , 2016, China Communications.
[5] Tao Zhang,et al. Security and Privacy in the Internet of Vehicles , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).
[6] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[7] Baowen Xu,et al. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.
[8] Shangguang Wang,et al. An overview of Internet of Vehicles , 2014, China Communications.
[9] Yanbing Liu,et al. Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm , 2017, IEEE Transactions on Intelligent Transportation Systems.
[10] Anil Kumar Sagar,et al. Secure and Reliable Routing Protocols for VANETs , 2018, 2018 4th International Conference on Computing Communication and Automation (ICCCA).
[11] Ryma Abassi,et al. VANET security and forensics: Challenges and opportunities , 2019, WIREs Forensic Science.
[12] K. Jayanthi,et al. Secured Routing in VANETs Using Lightweight Authentication and Key Agreement Protocol , 2018, 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[13] Arunita Jaekel,et al. Review of potential security attacks in VANET , 2018, 2018 Majan International Conference (MIC).
[14] Debasis Das,et al. A Lightweight Authentication Protocol for V2V Communication in VANETs , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[15] Chin-Teng Lin,et al. Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects , 2016, IEEE Access.
[16] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[17] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[18] P. Vasudeva Reddy,et al. Efficient Pairing-Free Certificateless Authentication Scheme With Batch Verification for Vehicular Ad-Hoc Networks , 2018, IEEE Access.
[19] Susana Sargento,et al. Vehicular testbed management , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[20] Albert Y. Zomaya,et al. Blockchain for smart communities: Applications, challenges and opportunities , 2019, J. Netw. Comput. Appl..
[21] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[22] Yining Liu,et al. A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.
[23] Mario Gerla,et al. Internet of Vehicles: Enabling safe, secure, and private vehicular crowdsourcing , 2018, Internet Technol. Lett..
[24] R. Sasikumar,et al. An ID-Based Privacy Preservation for VANET , 2015, 2015 International Conference on Computing and Communications Technologies (ICCCT).
[25] Min Xiao,et al. An Efficient V2I Authentication Scheme for VANETs , 2018, Mob. Inf. Syst..
[26] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[27] Mohammad Reza Aref,et al. A secure authentication scheme for VANETs with batch verification , 2014, Wireless Networks.
[28] Lilian Bossuet,et al. Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[29] Mohammad S. Obaidat,et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..
[30] Kim-Kwang Raymond Choo,et al. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.
[31] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[32] Hong Zhong,et al. Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network , 2018, IEEE Internet of Things Journal.
[33] Chin-Ling Chen,et al. A Secure Official Vehicle Communication Protocol for VANET , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
[34] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[35] Kim-Kwang Raymond Choo,et al. A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.
[36] Ashok Kumar Das. ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks , 2008, Int. J. Netw. Secur..
[37] Athanasios V. Vasilakos,et al. Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems , 2018, IEEE Transactions on Smart Grid.
[38] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[39] Manu Bansal,et al. A review on VANET security attacks and their countermeasure , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).
[40] Kim-Kwang Raymond Choo,et al. Parking Management: A Blockchain-Based Privacy-Preserving System , 2019, IEEE Consumer Electronics Magazine.
[41] N. Edna Elizabeth,et al. Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication , 2018, 2018 International Conference on Communication and Signal Processing (ICCSP).
[42] Joel J. P. C. Rodrigues,et al. SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.
[43] K. Logeshwari,et al. Authenticated anonymous secure on demand routing protocol in VANET (Vehicular adhoc network) , 2017, 2017 International Conference on Information Communication and Embedded Systems (ICICES).
[44] Mohammed Erritali,et al. A review and classification of various VANET Intrusion Detection Systems , 2013, 2013 National Security Days (JNS3).
[45] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[46] Fei-Yue Wang,et al. A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.
[47] Qassim Nasir,et al. Systematic literature review on Internet-of-Vehicles communication security , 2018, Int. J. Distributed Sens. Networks.
[48] Xiaoyan Zhu,et al. An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.
[49] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[50] Giovanni Pau,et al. Creative testbeds for VANET research: A new methodology , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[51] Alejandro Quintero,et al. A flexible testbed architecture for VANET , 2017, Veh. Commun..
[52] Sherali Zeadally,et al. Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.
[53] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[54] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[55] Xiwei Wang,et al. A scalable and secure key distribution scheme for group signature based authentication in VANET , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[56] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[57] Debatosh Debnath,et al. Classification Approach for Intrusion Detection in Vehicle Systems , 2018 .
[58] Willy Susilo,et al. Secure Message Communication Protocol Among Vehicles in Smart City , 2018, IEEE Transactions on Vehicular Technology.
[59] Sherali Zeadally,et al. Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..
[60] Heekuck Oh,et al. A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET , 2016, IEEE Access.
[61] Ashok Kumar Das,et al. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment , 2020, IEEE Transactions on Industrial Informatics.
[62] Luminita Scripcariu,et al. Security Issues in the Internet of Vehicles , 2018, 2018 International Conference on Communications (COMM).
[63] Pabitra Mohan Khilar,et al. A secure routing protocol for Vehicular Ad Hoc Network to provide ITS services , 2013, 2013 International Conference on Communication and Signal Processing.
[64] Athanasios V. Vasilakos,et al. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..
[65] Cheng-Chi Lee,et al. Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..
[66] Zibin Zheng,et al. Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.
[67] S. M. Muyeen,et al. Blockchain Applications in Smart Grid–Review and Frameworks , 2019, IEEE Access.
[68] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[69] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[70] Narottam Chand,et al. Security challenges in Internet of Vehicles (IoV) environment , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
[71] Carsten Maple,et al. Intrusion Detection Systems for Intra-Vehicle Networks: A Review , 2019, IEEE Access.
[72] Xiumei Fan,et al. Study of a Routing Algorithm of Internet of Vehicles Based on Selfishness , 2018, 2018 IEEE International Conference on Smart Internet of Things (SmartIoT).
[73] Aziz Mohaisen,et al. Grid-Based Key Pre-Distribution in Wireless Sensor Networks , 2009, KSII Trans. Internet Inf. Syst..
[74] Xi Zhang,et al. An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds , 2018, Sensors.
[75] M. Lalli,et al. Prediction based dual authentication model for VANET , 2017, 2017 International Conference on Computing Methodologies and Communication (ICCMC).
[76] Donggang Liu,et al. Using Auxiliary Sensors for Pairwise Key Establishment in WSN , 2012, TECS.
[77] Vanga Odelu,et al. Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks , 2017, IEEE Access.
[78] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[79] Kim-Kwang Raymond Choo,et al. BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system , 2019, Comput. Secur..
[80] Joel J. P. C. Rodrigues,et al. AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment , 2019, IEEE Internet of Things Journal.
[81] Mario Gerla,et al. Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[82] Rajendra Gupta,et al. Routing protocols in VANET — A survey , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).
[83] Yaser Jararweh,et al. Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions , 2019, IEEE Access.
[84] Kim-Kwang Raymond Choo,et al. Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..
[85] Abdelfettah Belghith,et al. TCSR: an AIMD Trust-based Protocol for Secure Routing in VANET , 2018, 2018 International Conference on Smart Communications and Networking (SmartNets).
[86] Yang Ping,et al. A message authentication scheme for VANETs based on trapdoor hash function , 2018, 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA).
[87] G. Usha Devi,et al. A survey on internet of vehicles: applications, technologies, challenges and opportunities , 2019, International Journal of Advanced Intelligence Paradigms.
[88] Mohamed Azab,et al. Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .
[89] Ingrid Moerman,et al. Suitability of the wireless testbed w-iLab.t for VANET research , 2011, 2011 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT).
[90] Victor I. Chang,et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.
[91] Donghyun Kim,et al. Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds , 2018, IEEE Internet of Things Journal.
[92] Suresh Kumar,et al. The design of a secure key management system in vehicular ad hoc networks , 2017, 2017 Conference on Information and Communication Technology (CICT).
[93] Mohsen Guizani,et al. PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.
[94] Yen-Fu Liu,et al. Secure Communication Scheme of VANET with Privacy Preserving , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[95] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[96] Basit Shafiq,et al. A Random Decision Tree Framework for Privacy-Preserving Data Mining , 2014, IEEE Transactions on Dependable and Secure Computing.
[97] Chin-Chen Chang,et al. Blockchain based searchable encryption for electronic health record sharing , 2019, Future Gener. Comput. Syst..
[98] Qing Yang,et al. On the Security of Information Dissemination in the Internet-of-Vehicles , 2017 .
[99] Jingbang Wu,et al. A Hard Real-Time Testbed for Distributed TDMA-Based MAC Protocols in VANETs , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[100] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[101] Donghyun Kim,et al. PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability , 2015, Wirel. Commun. Mob. Comput..
[102] Yuemin Ding,et al. Blockchain-based decentralized and secure keyless signature scheme for smart grid , 2019, Energy.
[103] Hugo Krawczyk,et al. Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.
[104] Giovanni Pau,et al. Vehicular testbeds — Validating models and protocols before large scale deployment , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[105] Saraswati Nagtilak,et al. Internet of Vehicles:Motivation, Layered Architecture and Research Challenges , 2018, 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN).
[106] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[107] Dharma P. Agrawal,et al. Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[108] Ashok Kumar Das. A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks , 2012, International Journal of Information Security.