2022
DOI: 10.1109/tits.2022.3207593
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…To address integration challenges between various end node devices in an IoT system, Bojjagani et al 17 suggested using a web-based service strategy for IoT service design. They also analyzed the state of the art in terms of the ideas, infrastructure, and solutions that can be used to build IoT-based smart cities.…”
Section: Related Workmentioning
confidence: 99%
“…To address integration challenges between various end node devices in an IoT system, Bojjagani et al 17 suggested using a web-based service strategy for IoT service design. They also analyzed the state of the art in terms of the ideas, infrastructure, and solutions that can be used to build IoT-based smart cities.…”
Section: Related Workmentioning
confidence: 99%
“…By strategically deploying IRS along roadways and within urban environments, we aim to harness their reflective properties to enhance signal propagation, mitigate interference, and bolster the reliability of wireless communication between vehicles and RSUs. The integration of IRS not only holds the promise of extending network coverage to previously inaccessible areas but also opens avenues for optimizing spectrum utilization and reducing energy consumption in IoV deployments [38].…”
Section: Intelligent Reflecting Surface (Irs) Integrationmentioning
confidence: 99%
“…The Scyther is one of the most modern testing tools developed as symbols (Cremers) at the Technology Eindhoven University [42] , and it has a graphical interface in which the analysis of security protocols is performed by one click of a button, where these lines include commands that write commands in the Python language [43], in this tool the protocol description and parameters are taken The other is as an entry, and as for an exit, it provides a summary report and displays a diagram for each attack [44]. The figure(2) [45] shows the mechanism of action of this tool.…”
Section: Formal Security Verification Using Scyther Toolmentioning
confidence: 99%