2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2021
DOI: 10.1109/ecai52376.2021.9515071
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Protocol for Intelligent Cars using Fog Computing and Software-Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…It is divided into three stages: the initialization stage, the registration stage, and the authentication stage. It is extremely computationally efficient, and upon the completion of the authentication process, a session key is established that will be utilized for subsequent communication 8 . However, this system does not protect user identity.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It is divided into three stages: the initialization stage, the registration stage, and the authentication stage. It is extremely computationally efficient, and upon the completion of the authentication process, a session key is established that will be utilized for subsequent communication 8 . However, this system does not protect user identity.…”
Section: Related Workmentioning
confidence: 99%
“…A malicious fog server might pose as a trustworthy fog server and appear to be a fog user in order to connect to the fog 7–9 . Once linked, it may control both incoming and outgoing requests to the cloud, gather user data and so forth.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This comprehensive scenario for the implementation of the Internet of Things (IoT) in the Intelligent Transportation System (ITS) is provided by the Internet of Things (IoT) in the Intelligent Transportation System (ITS). Certain communication protocol standards, such as the IEEE 80211p WAVE standard or cellular data protocols [35], are adhered to throughout the process of exchanging information. Interfaces to WiFi or cellular networks (GSM, HSDPA, LTE, or 5G are projected to be built on a significant scale) and other shortrange communication technologies are often included in typical car connection systems [36].…”
Section: Vehicle Connection Technologiesmentioning
confidence: 99%
“…When the vehicle is connected to the network, it has access to numerous cloud information services, such as instant emergency calls, real-time navigation, and media amusement, as exhibited in Figure 7. As the communication gateway, the global vehicular ID (GID) terminal is undoubtedly the technological key of the CV [86]. With integrated information sensors, the network communication module, and global online identification (an "online vehicle plate"), it allows the vehicle to have worldwide network connectivity and global positioning and tracking capabilities [87].…”
Section: Technologiesmentioning
confidence: 99%