2020 IEEE Wireless Communications and Networking Conference (WCNC) 2020
DOI: 10.1109/wcnc45663.2020.9120719
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…However, several schemes such as [25]- [28] ignore the values of t x and t r due to their negligible execution time. Furthermore, the Chebyshev chaotic map is widely utilized in the VANET domain as it is proved to be appropriate for computationally limited devices [13], [20], [27]- [29].…”
Section: G Fast Response In Emergency Conditionsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, several schemes such as [25]- [28] ignore the values of t x and t r due to their negligible execution time. Furthermore, the Chebyshev chaotic map is widely utilized in the VANET domain as it is proved to be appropriate for computationally limited devices [13], [20], [27]- [29].…”
Section: G Fast Response In Emergency Conditionsmentioning
confidence: 99%
“…The main aim of this tool is to evaluate the security properties of the proposed protocol to show any detected attacks on the analyzed scheme. To perform this evaluation, the Scyther is chosen according to its free usage and high performance [13]. The Scyther can be considered as a widely accepted security verification tool in the academic field as it provides a reliable simulation environment to reveal various vulnerabilities of the protocol that can be misused by the attacker [30], [31].…”
Section: Formal Security Evaluation Using Scythermentioning
confidence: 99%
See 1 more Smart Citation
“…When n ∈ Γ(K 0 ), it is not difficult to show that the corresponding equation leads to m 0,n given by (7), whereas in the case where n ∈ Γ(K 0 ), we have to solve…”
Section: A Glrt For Uncorrelated Measurementsmentioning
confidence: 99%
“…The incoming fifth generation mobile communication network (5G) will be capable of guaranteeing new reliable services, high data rates, low latency, and support for largely heterogeneous devices [1]. Localization services, which in the past were mainly provided by non-cellular technologies (e.g., Global Navigation Satelline Systems and/or Global Positioning Systems) integrated within the cellular devices, are now conceived as first class citizens of the 5G architecture starting from Release 16 [2]-[4], and will play a crucial role in several scenarios envisioned for 5G, including self-driving cars, unmanned aerial vehicles, smart logistics, emergency services, and many more [5]- [7]. At the same time, the ability to exploit location signals emitted by 5G base stations comes with a bleak side: many literature works [8]- [20] show how Fig.…”
Section: Introductionmentioning
confidence: 99%