2020
DOI: 10.3390/app10186268
|View full text |Cite
|
Sign up to set email alerts
|

Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing

Abstract: With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as large as the number of vehicles and it is enormous when compared to vehicle calculation and storage performance. To resolve this problem, VANET uses a combined cloud computing technology, called vehicular cloud computing (VCC), which controls vehicle-related data, and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…BAN logic is a well-known formal proof to verify the mutual authentication of a protocol. Therefore, many researchers have used BAN logic to prove the mutual authentication of their schemes [ 30 , 31 , 32 , 33 ]. In this section, we prove the mutual authentication of the proposed scheme using BAN logic [ 9 ].…”
Section: Security Analysismentioning
confidence: 99%
“…BAN logic is a well-known formal proof to verify the mutual authentication of a protocol. Therefore, many researchers have used BAN logic to prove the mutual authentication of their schemes [ 30 , 31 , 32 , 33 ]. In this section, we prove the mutual authentication of the proposed scheme using BAN logic [ 9 ].…”
Section: Security Analysismentioning
confidence: 99%
“…erefore, the vehicle is easy to be tracked. Lee et al [11] proposed a lightweight authentication and key agreement protocol for cloud computing of Internet of vehicles. However, the HID i [11] of the vehicle remains unchanged during the authentication process, and the vehicle can be easily tracked.…”
Section: Introductionmentioning
confidence: 99%
“…Lee et al [11] proposed a lightweight authentication and key agreement protocol for cloud computing of Internet of vehicles. However, the HID i [11] of the vehicle remains unchanged during the authentication process, and the vehicle can be easily tracked. In [12], a lightweight VANET authentication and key agreement scheme was proposed.…”
Section: Introductionmentioning
confidence: 99%