“…[35] developed a network layer security protocol based on IP address self-authentication, which is suitable for secure authentication communication in the local area network. [36] takes the same idea as [35], the authors apply the non-interactive key agreement to vehicular communications and build a communication system that does not require a trusted party.…”
Section: B Identity-based Non-interactive Key Exchangementioning
“…[35] developed a network layer security protocol based on IP address self-authentication, which is suitable for secure authentication communication in the local area network. [36] takes the same idea as [35], the authors apply the non-interactive key agreement to vehicular communications and build a communication system that does not require a trusted party.…”
Section: B Identity-based Non-interactive Key Exchangementioning
“…Reference [28] studied the self-authentication mechanism of IP addresses in a LAN. A similar scheme was also used by [29]; noninteractive key agreement was used by the authors for vehicular communications.…”
Section: Key Exchange Protocol For Multihomed Mobile Devicesmentioning
confidence: 99%
“…This work considered the authentication research in the mobile multihomed scenario, which is consistent with our research direction. For the noninteractive mechanism based on bilinear pairs, we selected the relevant latest research [29] as a comparison. However, it does not involve the research on handover and multihomed support.…”
mentioning
confidence: 99%
“…According to its idea, we integrated it into our simulation environment to compare the authentication delay. The interactive scheme was expressed as INTERAC and the noninteractive scheme was named as SFVEC in [29].…”
The rapid development of intelligent vehicle networking technology has posed new requirements for in-vehicle gateway authentication security in the heterogeneous Internet of Vehicles (IoV). The current research on network layer authentication mechanisms usually relies on PKI infrastructure and interactive key agreement protocols, which have poor support for mobile and multihomed devices. Due to bandwidth and interaction delay overheads, they are not suitable for heterogeneous IoV scenarios with network state fluctuations. In this study, we propose a data-driven noninteractive authentication scheme, a lightweight, stateless scheme supporting mobility and multihoming to meet the lightweight data security requirements of the IoV. Our scheme implements device authentication and noninteractive key agreement through context parameters during data communication. Due to saving the signaling interactive delay and certificate overhead, in the IoV scenario, the proposed scheme reduced the delay by 20.1% and 11.8%, respectively, in the authentication and handover processes and brought higher bandwidth aggregation efficiency.
“…VANETs are composed by two basic elements, such as smart vehicles and roadside units aimed at facilitating network access and providing services, such as road safety, traffic efficiency, or added-value applications, such as infotainment or interactive tasks [126]. Some relevant challenges in high mobility, timesensitive, and computation-intensive scenarios are related to security and privacy in both vehicle-to-vehicle (V2V) and vehicle-to-roadside units (V2R) [127]. Challenges are also related to the cost-efficient task of offloading as resources are likely to be transferred among edge and cloud domains due to the traffic conditions at a given place and time [128].…”
Edge computing applications leverage advances in edge computing along with the latest trends of convolutional neural networks in order to achieve ultra-low latency, high-speed processing, low-power consumptions scenarios, which are necessary for deploying real-time Internet of Things deployments efficiently. As the importance of such scenarios is growing by the day, we propose to undertake two different kind of models, such as an algebraic models, with a process algebra called ACP and a coding model with a modeling language called Promela. Both approaches have been used to build models considering an edge infrastructure with a cloud backup, which has been further extended with the addition of extra fog nodes, and after having applied the proper verification techniques, they have all been duly verified. Specifically, a generic edge computing design has been specified in an algebraic manner with ACP, being followed by its corresponding algebraic verification, whereas it has also been specified by means of Promela code, which has been verified by means of the model checker Spin.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.