2021
DOI: 10.1109/jsyst.2021.3051435
|View full text |Cite
|
Sign up to set email alerts
|

SEMA: Secure and Efficient Message Authentication Protocol for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(32 citation statements)
references
References 25 publications
0
32
0
Order By: Relevance
“…They have provided a categorized blockchain model for training procedure in a vertical federation learning method to evaluate information of vehicles. The hierarchical federation learning algorithm is designed to respond to the distribution pattern and the need for Internet of Vehicle (IoV) privacy [ 31 ]. The proposed hierarchy algorithm can improve data sharing between vehicles and training quality.…”
Section: Research Methodology and Finding Appropriate Contentmentioning
confidence: 99%
“…They have provided a categorized blockchain model for training procedure in a vertical federation learning method to evaluate information of vehicles. The hierarchical federation learning algorithm is designed to respond to the distribution pattern and the need for Internet of Vehicle (IoV) privacy [ 31 ]. The proposed hierarchy algorithm can improve data sharing between vehicles and training quality.…”
Section: Research Methodology and Finding Appropriate Contentmentioning
confidence: 99%
“…To illustrate some of the important specifications of the proposed approach, the obtained results are compared with a few other methods as well. e idea of resource allocation based on common weights has been investigated by Beasley [5], Hosseinzadeh et al [15], Si et al [40], and Li et al [10]. All these methods take an approach to resource allocation in which a CSW is determined aiming to achieve maximum efficiency.…”
Section: Numerical Examplementioning
confidence: 99%
“…However, then, these programs require a pre-established trust relationship between the regional management center and vehicles, which will not exist once a vehicle moves to another region. Wang et al [ 19 ] adopted group-based message authentication algorithm to address the security issues in V2V communication. When a vehicle enters the coverage area of a new RSU, it must be re-authenticated to the new RSU, which undoubtedly increases the delay.…”
Section: Related Workmentioning
confidence: 99%