2022
DOI: 10.1177/15501329221104332
|View full text |Cite
|
Sign up to set email alerts
|

A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles

Abstract: The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet of vehicles and provides better experience for users. However, there are still many security problems in social vehicle networking environments. Once the vehicle is networked, the biggest problem is data security according to the three levels of data collection, intelligent analysis, and decisi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…A malicious fog server might pose as a trustworthy fog server and appear to be a fog user in order to connect to the fog 7–9 . Once linked, it may control both incoming and outgoing requests to the cloud, gather user data and so forth.…”
Section: Introductionmentioning
confidence: 99%
“…A malicious fog server might pose as a trustworthy fog server and appear to be a fog user in order to connect to the fog 7–9 . Once linked, it may control both incoming and outgoing requests to the cloud, gather user data and so forth.…”
Section: Introductionmentioning
confidence: 99%
“…Authors verify their protocol in both a formal and informal way. In 2022, Li et al 33 proposed a mutual authentication protocol for the fog‐enabled social Internet of vehicles. In 2022, Wu et al 34 proposed a protocol based on a symmetric encryption algorithm and fog computing in the Internet of vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…To address the aforementioned challenges, we propose a method for the recognition of vehicles entering ESAs (VeESAs) and the estimation of dwell times using ETC data. First, with the rapid development of Internet of Vehicles (IoV) technology in recent years [ 25 , 26 ], China built the world’s largest IoV system—the ETC system—at the end of 2019, with a penetration rate of more than 80% of its users. Therefore, this study will utilize ETC data as experimental data to solve the problem of insufficient data.…”
Section: Introductionmentioning
confidence: 99%