2022
DOI: 10.1155/2022/4280617
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks

Abstract: Many cryptographic techniques have been proposed to conceive a secure and privacy-oriented vehicular ad hoc network (VANET) for its practical deployment. The security of these techniques requires a common secret key to be shared between the communicating entities or depend upon the premise that some mathematical problems are computationally hard. However, because of the open nature of the wireless medium, the communication cannot be kept confidential and is prone to eavesdropping. Furthermore, with the arrival… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 67 publications
(80 reference statements)
0
4
0
Order By: Relevance
“…The proposed lightweight PRNG is best suitable for such IoT assisted applications with resource limitations. Application areas include establishing key agreement for drones, 86 securing vehicle to infrastructure communications, 87 provable authentication in Industry 4.0, 88 and preserving privacy in connected health applications. 89 In coming years, the growth of technologies like IoT, machine learning (ML) and artificial intelligence (AI) will require stronger security measures.…”
Section: Future Work and Research Opportunitiesmentioning
confidence: 99%
“…The proposed lightweight PRNG is best suitable for such IoT assisted applications with resource limitations. Application areas include establishing key agreement for drones, 86 securing vehicle to infrastructure communications, 87 provable authentication in Industry 4.0, 88 and preserving privacy in connected health applications. 89 In coming years, the growth of technologies like IoT, machine learning (ML) and artificial intelligence (AI) will require stronger security measures.…”
Section: Future Work and Research Opportunitiesmentioning
confidence: 99%
“…However, due to the lack of an efficient storage mechanism, both of these schemes suffer from scalability issue. In order to handle the Certificate Revocation List (CRL) efficiently, the authors in [22], [23] recommend the usage of certificate revocation methods in VENs. Using the CRL, it is checked if a specific user's certificates have been revoked or not.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, consider the superposition of two equal-amplitude, incoherent, orthogonal ꝓ-states as a possible representation of unpolarized light. A linear polarizer is a device that separates these two elements, discarding one and keeping the other [4]. In fact, the BB84 protocol, the very first quantum key distribution approach, was put forth using the polarization of photons.…”
Section: Introductionmentioning
confidence: 99%