2019
DOI: 10.1109/access.2019.2937182
|View full text |Cite
|
Sign up to set email alerts
|

A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks

Abstract: Recently many security protocols have been proposed for road safety applications in Vehicleto-everything (V2X) communications. Most of them, however, do not fully satisfy the requirements of light-weight and fast processing, which are special properties for V2X. Most of the previous authentication protocols assume that a Certificate Authority (CA) is present within the communication range from all the vehicles, which is not practical for moving vehicles. We propose a light-weight security protocol for authenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(26 citation statements)
references
References 36 publications
0
26
0
Order By: Relevance
“…For example, Large-Scale DT use cases require high-precision sensing for positioning digital representations of real-world objects and collecting meaningful data from them (e.g., speed, altitude, etc.). Sensing technology is also crucial for implementing IWD [30], WBANs [157], SLAM algorithms [158], CAVs [24], among others. Ability to sense the physical world ubiquitously, providing remote control, discovery, data aggregation, and management of large-scale networks of sensors and actuators [159].…”
Section: ) Enablers Presentationmentioning
confidence: 99%
“…For example, Large-Scale DT use cases require high-precision sensing for positioning digital representations of real-world objects and collecting meaningful data from them (e.g., speed, altitude, etc.). Sensing technology is also crucial for implementing IWD [30], WBANs [157], SLAM algorithms [158], CAVs [24], among others. Ability to sense the physical world ubiquitously, providing remote control, discovery, data aggregation, and management of large-scale networks of sensors and actuators [159].…”
Section: ) Enablers Presentationmentioning
confidence: 99%
“…Cui et al [21] published an authentication scheme based on elliptic curve cryptography, but the scheme has 8 phases to verification, and also, there is no key agreement and less secure for network attack. Hakeem et al [22] create a new biometric authentication along with the TPD to support privacy-preserving for the identities, but the hashing is difficult to create the unique values when the user enters the biometric password multiple times. So the scheme has a high false rejection rate.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research introduces many security protocols to improve vehicular group communication security by improving network authentication, availability, integrity, and nonrepudiation. The group key management protocols must provide secure key generation, key distribution, and key updating with a minimum communication overhead [ 1 , 2 , 3 ]. Many group key generation protocols are proposed in the literature; some are based on the symmetric key generation, and some use the asymmetric key generation [ 4 , 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%