2021
DOI: 10.7717/peerj-cs.714
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT

Abstract: In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 45 publications
0
1
0
Order By: Relevance
“…The AVISPA simulation tool stands for the Automated Validation of Internet Security Protocols and Applications. This tool is usually used to simulate the security of the authentication protocols and verify them [ 30 , 31 , 32 ]. High-Level Protocol Specification Language (HLPSL) is a powerful language used by the AVISPA tool, thus allowing us to verify the protocol security features [ 33 ].…”
Section: The Implementation and Evaluation Of The Proposed Lightweigh...mentioning
confidence: 99%
“…The AVISPA simulation tool stands for the Automated Validation of Internet Security Protocols and Applications. This tool is usually used to simulate the security of the authentication protocols and verify them [ 30 , 31 , 32 ]. High-Level Protocol Specification Language (HLPSL) is a powerful language used by the AVISPA tool, thus allowing us to verify the protocol security features [ 33 ].…”
Section: The Implementation and Evaluation Of The Proposed Lightweigh...mentioning
confidence: 99%
“…There is a possibility that an attacker will disguise himself as a validated vehicle and bypass the authentication scheme to get into the network; in such a scenario, intruders must be unable to read, insert, or modify the data (Di and Wu, 2022;Xu et al, 2019;Al-Shareeda and Manickam, 2022;Mei et al, 2022). To do so, all vehicles must encrypt the information before transmitting it so that only vehicles with the decryption key can access it, leaving the intruder roaming the network empty-handed (Ahmed et al, 2022;Khalid et al, 2021). An intruder in the network can pose a threat at any time; therefore, there should be a mechanism in place to detect the intruder and prevent him or her from roaming freely in the network (Azam et al, 2021;Jalali et al, 2017).…”
Section: Introductionmentioning
confidence: 99%