2022
DOI: 10.3390/sym14071393
|View full text |Cite
|
Sign up to set email alerts
|

SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing

Abstract: With the maturity and popularization of the Internet of Things, we saw the emergence of the Internet of Vehicles. This collects and processes real-time traffic information, alleviates traffic congestion, and realizes intelligent transportation. However, sensitive information, such as real-time driving data of vehicles, are transmitted on public channels, which are easily to steal and manipulate for attackers. In addition, vehicle communications are vulnerable to malicious attacks. Therefore, it is essential to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…The authors in [59] have proposed an authentication protocol based on a symmetric encryption algorithm and fog computing in the Internet of Vehicles. The use of SGX, a security software that only includes hardware thus avoiding software vulnerabilities and malicious threats in the system, largely ensures system security enhances confidentiality, hence, privacy of vehicle data.…”
Section: Research Findingsmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors in [59] have proposed an authentication protocol based on a symmetric encryption algorithm and fog computing in the Internet of Vehicles. The use of SGX, a security software that only includes hardware thus avoiding software vulnerabilities and malicious threats in the system, largely ensures system security enhances confidentiality, hence, privacy of vehicle data.…”
Section: Research Findingsmentioning
confidence: 99%
“…Tsu-Yang et al [59] Provided an authentication protocol based on a symmetric encryption algorithm and fog computing in the Internet of Vehicles.…”
Section: Author Solution Offeredmentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [10] proposed a multifactor authentication mechanism in the cloud computing scenario. On this basis, Reference [11] designed a four-layer architecture based on a symmetric encryption algorithm and fog computing for the IoV authentication protocol. Given the dynamic nature and unreliable channels in the IoV, Reference [12] proposed a lightweight communication protocol for entities in the IoV.…”
Section: Iov Security Architecture Based On Cloud Computing Scenariosmentioning
confidence: 99%
“…In 2022, Li et al 33 proposed a mutual authentication protocol for the fog‐enabled social Internet of vehicles. In 2022, Wu et al 34 proposed a protocol based on a symmetric encryption algorithm and fog computing in the Internet of vehicles. In this scheme, the authors design a four‐layer architecture that significantly decreases the computational burden of cloud servers.…”
Section: Introductionmentioning
confidence: 99%