2022
DOI: 10.1109/jsen.2022.3153338
|View full text |Cite
|
Sign up to set email alerts
|

Federated Learning-Based Collaborative Authentication Protocol for Shared Data in Social IoV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…Compared to benchmark approaches, the scheme exhibits higher authentication accuracy and better adaptability to high-speed IoV environments. An FL-assisted collaborative authentication protocol is introduced in [358] to guarantee integrity of messages exchanged among vehicles and resistance against various attack types, such as replay, Sybil and MitM. A communication-computation tradeoff analysis also reveals that the communication efficiency of the proposed solution can be drastically improved at the expense of a slightly increased computational cost.…”
Section: ) Authentication and Access Controlmentioning
confidence: 99%
“…Compared to benchmark approaches, the scheme exhibits higher authentication accuracy and better adaptability to high-speed IoV environments. An FL-assisted collaborative authentication protocol is introduced in [358] to guarantee integrity of messages exchanged among vehicles and resistance against various attack types, such as replay, Sybil and MitM. A communication-computation tradeoff analysis also reveals that the communication efficiency of the proposed solution can be drastically improved at the expense of a slightly increased computational cost.…”
Section: ) Authentication and Access Controlmentioning
confidence: 99%
“…New schemes are proposed in the literature [16][17][18][19][20][21][22][23][24] for the authentication part of the data sharing process. Xuan et al 16 proposed an optimized scheme for cross-domain authentication between heterogeneous IoT applications using certificate-less public key cryptography and smart contract technology.…”
Section: Related Workmentioning
confidence: 99%
“…In the scheme, users share the same private public key pair and use the Canetti–Krawczyk (CK) secure mutual authentication protocol. To prevent data leakage and data propagation delay, Zhao et al 18 design a FL collaborative authentication protocol for shared data with low authentication delay. Efficient anonymous mutual authentication and key negotiation are implemented.…”
Section: Related Workmentioning
confidence: 99%
“…Zhao et al 51 proposed a delay‐aware data leakage‐prevent model for the IoV. They designed a federated learning collaborative protocol for secure authentication of the shared data.…”
Section: Analysis Of Data‐centric Approaches In Iovmentioning
confidence: 99%