2021
DOI: 10.1109/tits.2020.3013928
|View full text |Cite
|
Sign up to set email alerts
|

HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 88 publications
(36 citation statements)
references
References 41 publications
0
36
0
Order By: Relevance
“…Similarly, the latest advances in cellular communication, especially 5G provided the specific characteristics that significantly enhanced its potential for CAV testing, also enabling the cellular communication-based implementation of SciL testing (depending on the use-cases, 4G LTE may also fulfil the requirements of CAV testing). 5G wireless devices in the covered region not only can communicate with each other but can connect to the infrastructure by radio waves through the local station allowing a significantly larger bandwidth and guaranteed low-latency, in a secure way [88]- [90].…”
Section: ) Ultra-reliable Low-latency Communicationmentioning
confidence: 99%
“…Similarly, the latest advances in cellular communication, especially 5G provided the specific characteristics that significantly enhanced its potential for CAV testing, also enabling the cellular communication-based implementation of SciL testing (depending on the use-cases, 4G LTE may also fulfil the requirements of CAV testing). 5G wireless devices in the covered region not only can communicate with each other but can connect to the infrastructure by radio waves through the local station allowing a significantly larger bandwidth and guaranteed low-latency, in a secure way [88]- [90].…”
Section: ) Ultra-reliable Low-latency Communicationmentioning
confidence: 99%
“…Some studies have begun to design the AKE protocol for the advantages of low latency and high reliability in the 5G environment [42]; and, for some special occasions, blockchain technology [43] is also used to complete the authentication key exchange. Research similar to VANET currently has similar flying ad hoc networks (FANETs).…”
Section: Related Workmentioning
confidence: 99%
“…However, owing to the mobility of deployed fog nodes and terminal devices, it is not practical to share session keys between them in advance. e authenticated key agreement (AKA) [26][27][28][29] is a sufficient scheme for user or node authentication and generating public session keys; however, it is rarely used for fog computing.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, numerous AKA protocols [28][29][30][31][32][33][34][35][36][37][38][39][40][41] have been proposed in WSN, fog computing, and IoT environments. Turkanovic et al [31] proposed an effective AKA scheme for heterogeneous WSNs, in which the user authenticates through the sensor node without communicating with the gateway node.…”
Section: Introductionmentioning
confidence: 99%