2021
DOI: 10.1109/jiot.2021.3068268
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(21 citation statements)
references
References 38 publications
0
20
0
Order By: Relevance
“…In this scheme, only hash function and XOR operations are used to realize vehicle identity authentication and anonymity. Wang et al [37] proposed a lightweight authentication protocol that could avoid emergency vehicles in VANET. After the first authentication with the nearest roadside unit, the scheme could complete the mutual authentication with the subsequent roadside unit without repeating the cumbersome calculation.…”
Section: Related Workmentioning
confidence: 99%
“…In this scheme, only hash function and XOR operations are used to realize vehicle identity authentication and anonymity. Wang et al [37] proposed a lightweight authentication protocol that could avoid emergency vehicles in VANET. After the first authentication with the nearest roadside unit, the scheme could complete the mutual authentication with the subsequent roadside unit without repeating the cumbersome calculation.…”
Section: Related Workmentioning
confidence: 99%
“…e 10 pairs of (x i , y i ) are distributed to each stakeholders. Table 1 shows the 10 pairs of (x i , y i ) selected based on equation (7). Here, in order to facilitate readers' understanding, x is set from 2 to 11.…”
Section: Key Management Scheme Based On Shamir's Secretmentioning
confidence: 99%
“…Nowadays, Internet of ings (IoT) [1,2] have experienced unprecedented development due to the widespread of big data and cloud computing [3]. Modern intelligent transportation systems (ITS) [4][5][6][7] have extensively benefited from IoT technology. At the same time, the development of blockchain [8,9] has also brought new features and convenience to ITS.…”
Section: Introductionmentioning
confidence: 99%
“…Using vehicular cloud computing and body area networks, driver sickness and sleepiness behind the wheel were detected [ 15 ]. Authentication of emergency vehicle protocols was efficient against attacks such as impersonation, device theft, and reputation attacks [ 16 ]. Batch authentication and key exchange schemes were proposed for the 6G VANET to provide high-level security by avoiding communication with malicious vehicle users.…”
Section: Related Workmentioning
confidence: 99%