2018
DOI: 10.1155/2018/6251219
|View full text |Cite
|
Sign up to set email alerts
|

An Anonymous Handover Authentication Scheme Based on LTE‐A for Vehicular Networks

Abstract: .Vehicular networks play an important role in the intelligent transportation systems which have gained technical supports from car industry. Due to the mobility and the broadcast nature of wireless communication, security of the vehicular networks is a critical issue for the academia and industry. Many solutions have been proposed to target the security provisioning. However, most of them have various shortcomings. Based on the elliptic curve public key cryptography algorithm, in this paper, we propose a new a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…Xu et al [84] proposed a scheme with all security requirements satisfied except conditional privacy. Nevertheless, the computation cost of this scheme is high, which reaches 2T h + 3T m + 2T s + T p .…”
Section: B Security Schemes For Horizontal Handovermentioning
confidence: 99%
“…Xu et al [84] proposed a scheme with all security requirements satisfied except conditional privacy. Nevertheless, the computation cost of this scheme is high, which reaches 2T h + 3T m + 2T s + T p .…”
Section: B Security Schemes For Horizontal Handovermentioning
confidence: 99%
“…We began our research on the technology, platform, and transfer of information concerning driving brain cognition for intelligent vehicles in 2014 [36][37][38]. Since 2016, we have been studying how V2X vehicles and subsystems should authenticate with each other [2,39,[40][41][42][43][44]. e spatiotemporal event interaction model architecture is shown in Figure 1, which includes both individual intelligent vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…Parne et al [13] proposed the performance and security enhanced (PSE-AKA) protocol for LTE/LTE-A network, which generated the authentication vectors with small overhead. 5G AKA protocol enhances the AKA protocol of 4G LTE [14] [15] by providing the next party and channel with proof of successful authentication of the UE from the visited network [16]. Idrissi et al [17] proposed enhancement of AKA protocol in order to meet the requirements of authentication and authorization in 5G networks by using a new key framework, which not only improved performance, but also enabled fast re-authentication during handover.…”
Section: B Related Workmentioning
confidence: 99%
“…We then can compute the mean number n ba21 of authentication request loss due to the SEAF entity failure as in Eq. (15).…”
Section: A: Number Of Authentication Request Loss Per Failurementioning
confidence: 99%