2022
DOI: 10.1109/tii.2021.3101651
|View full text |Cite
|
Sign up to set email alerts
|

A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
44
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(44 citation statements)
references
References 20 publications
0
44
0
Order By: Relevance
“…The rapid development of the Internet of things (IoT) [1,2] technology has intricately connected all things possible, bringing in efficiency and vitality to all walks of life [3,4]. Now, IoT has been used in various environments [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The rapid development of the Internet of things (IoT) [1,2] technology has intricately connected all things possible, bringing in efficiency and vitality to all walks of life [3,4]. Now, IoT has been used in various environments [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…F/O: futures/options. Information about futures contracts and options contracts for stocks 4. OFD: other financial data.…”
mentioning
confidence: 99%
“…In addition, as an emerging mobile communication, 5G/6G networks will involve many fields, such as mobile phones, smart homes, automatic driving, and telemedicine. In applications involving IoT [5][6][7][8][9], security has always been a weak link in the network. The management of stored and transmitted information is important.…”
Section: Introductionmentioning
confidence: 99%
“…Benefitting from the flourishing telecommunication and automotive industries, vehicles have the ability to share information with various remote transportation participants via different networks, including V2V communication networks, vehicleto-infrastructure communication (V2I) networks, and vehicleto-everything (V2X) communication networks [20]. Along with the advantage of information exchanges, there is an ever-increasing concern about data leakage due to the open nature of communication networks [21], [22], [23], [24], [25]. As such, data privacy is regarded as a critical issue that should be taken into consideration in vehicle platooning control.…”
mentioning
confidence: 99%
“…Fortunately, the problem of data privacy preservation has stimulated scientific interest in the past few years. To date, several cryptographic techniques, such as block chain [21], [22], group signatures [23], trustworthiness evaluation [24], and voting theory [25], have been applied to vehicular platoon privacy preservation. At the same time, various proactive defense mechanisms of moving targets have been developed to improve the system security, see the survey [29].…”
mentioning
confidence: 99%