The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1007/s12652-020-02721-5
|View full text |Cite
|
Sign up to set email alerts
|

SV2VCS: a secure vehicle-to-vehicle communication scheme based on lightweight authentication and concurrent data collection trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 27 publications
1
3
0
Order By: Relevance
“…(1) In the tested speed range, owing to the Doppler effect, the maximum value of network delay increases with the vehicle driving speed, reaching a maximum of 30 ms, which is in line with the international standard for vehicle-vehicle communication delay (less than 100 ms) [26] and can satisfy the demand for real-time network performance in a car-following environment. (2) As the speed of the test vehicle increased, the standard deviation of the data transmission delay increased slightly, indicating that the stability of the network was related to the speed of the vehicle (the faster the speed, the more unstable the network), but within reasonable limits.…”
Section: Discussionsupporting
confidence: 70%
“…(1) In the tested speed range, owing to the Doppler effect, the maximum value of network delay increases with the vehicle driving speed, reaching a maximum of 30 ms, which is in line with the international standard for vehicle-vehicle communication delay (less than 100 ms) [26] and can satisfy the demand for real-time network performance in a car-following environment. (2) As the speed of the test vehicle increased, the standard deviation of the data transmission delay increased slightly, indicating that the stability of the network was related to the speed of the vehicle (the faster the speed, the more unstable the network), but within reasonable limits.…”
Section: Discussionsupporting
confidence: 70%
“…After adapting the requirements of different state-of-the-art communication protocols, the proposed methodological approach can be widely used in the automotive security evaluation domain. An important advantage of the proposed method that it is in accordance with the most relevant security evaluation models (TARA, C-SIL, EVITA, Heaven [12,13,15,23,25]). On the other hand, the newly introduced approach considers the Secureby-design concept principles (e.g., network segmentation, making compromise and disruption difficult).…”
Section: Discussionmentioning
confidence: 96%
“…In addition, communications regarding vehicular energy trading are performed on wireless channels, which can be exposed to various threats by attackers, such as impersonation attacks, replay attacks, and man-in-the-middle attacks. If the personal information is leaked to a malicious attacker, the attacker can conjecture the home, workplace, and hobbies of the driver [16][17][18]. Therefore, a secure authentication protocol is necessary.…”
Section: Introductionmentioning
confidence: 99%