2021
DOI: 10.1016/j.jfranklin.2019.02.023
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…In [58], a proposed cloud-based authentication scheme using a modular exponential technique firstly encrypts a tag's information regarding communications between IoV and radar. Then, the anonymity of the tag is developed as an efficient way of ensuring data privacy by protecting itse information from malicious actions.…”
Section: B Authentication-based Privacy Preservationmentioning
confidence: 99%
“…In [58], a proposed cloud-based authentication scheme using a modular exponential technique firstly encrypts a tag's information regarding communications between IoV and radar. Then, the anonymity of the tag is developed as an efficient way of ensuring data privacy by protecting itse information from malicious actions.…”
Section: B Authentication-based Privacy Preservationmentioning
confidence: 99%
“…Existing security technologies can be used in IoV to provide authentication. For instance, Fan et al in [53] have proposed a cloud-based mutual authentication protocol, using Radio Frequency Identification (RFID) technology. Likewise, the authors of [24] have proposed an authentication and secure data transfer algorithm based on the blockchain technology.…”
Section: Security In Iovmentioning
confidence: 99%
“…IoT allows object collection and data exchange, etc. [2], which can perform medical data management, medical information monitoring, and user information analysis. At present, problems such as violating the privacy of medical data and publishing false medical advertisements often appear in the network, and malicious users become more and more complicated and hidden, which brings great security threats to networks.…”
Section: Introductionmentioning
confidence: 99%