2020
DOI: 10.1109/access.2020.2981397
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges

Abstract: Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial Intelligence (AI) awareness of other vehicles and their actions. IoV is connected in an adhoc networking environment which utilizes each vehicle in the network as a node, called Vehicular Ad Hoc Network (VANET), where the vehicles may be also connected to the public Internet. It is specifically important for the autonomous vehicles beca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
45
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 95 publications
(69 citation statements)
references
References 108 publications
0
45
0
Order By: Relevance
“…i to cheat the verifier, he needs to compute responses y 1 and y 2 . Suppose the attacker has computed x in (14), and b i 0 are equal to b i . Naturally y 1 is equal to r in (20).…”
Section: Security Analysis Of the Proposed Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…i to cheat the verifier, he needs to compute responses y 1 and y 2 . Suppose the attacker has computed x in (14), and b i 0 are equal to b i . Naturally y 1 is equal to r in (20).…”
Section: Security Analysis Of the Proposed Protocolmentioning
confidence: 99%
“…The broadcast data frame does not cover the source address and destination address [10]. Although [11][12][13][14][15] studied the security of in-vehicle networks to address these emerging issues, these in-vehicle security schemes focus on ensuring secure communication between ECUs with little consideration for the security issues introduced by external devices connected to the vehicle. The remote attacks on vehicles usually come from external networks or devices.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A comparative study of existing work on decision-making schemes is further summarized in Table 1. Bagga et al [24] surveyed various security requirements and threats to the IoV surroundings. The authors gave a nomenclature of several security schemes and frameworks to provide data privacy by focusing on mutual authentication protocols.…”
Section: Outlinementioning
confidence: 99%
“…1. Some of the potential applicatons of IoT involve ''Internet of Medical Things (IoMT)''/''Internet of Healthcare Things (IoHT)'', ''Internet of Energy (IoE)'', ''Internet of Drones (IoD)'', ''Internet of Vehicles (IoV)'' and ''Industrial Internet of Things (IoIT)'' [3]- [11].…”
Section: Introductionmentioning
confidence: 99%