Authentication Protocols and Authentication on the Base of PKI and ID-based

被引:0
|
作者
Min Thant [1 ]
Zaw, Than Myo [1 ]
机构
[1] ITMO Univ, St Petersburg, Russia
关键词
Internet of Vehicle (IoV); Authentication protocols; Public key infrastructure and ID-base;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a comprehensive survey of authentication protocols for Internet of Vehicles (IoV) is presented. Specifically Secure cryptographic hash function, Proxy Mobile IP (PMIP), Symmetric polynomials, Search algorithms, Group signature, Merkle hash tree (MHT), Timed Efficient Stream Loss-tolerant Authentication (TESLA), Elliptic Curve Digital Signature Algorithm, Multiplicative secret sharing technique, Identity-based public key cryptosystem, Identity-based aggregate signature, Digital signatures, Anonymous attribute-based group setup scheme and Keyed-hashing for message authentication (HMAC) authentication protocols about explained. In addition, authentication on the base of public key infrastructure and ID-based systems explained with example.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Weaknesses of a dynamic ID-based remote user authentication scheme
    He, Debiao
    Chen, Jianhua
    Zhang, Rui
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (04) : 355 - 362
  • [22] A Novel Dynamic ID-Based Remote User Authentication Scheme
    Misbahuddin, Md.
    Ahmed, Md. Aijaz
    Rao, A. Ananda
    Bindu, C. Shoba
    Khan, M. A. Muqsit
    2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 364 - +
  • [23] An efficient ID-based deniable authentication protocol from pairings
    Cao, TJ
    Lin, DD
    Xue, R
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 388 - 391
  • [24] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Moon, Jong Sik
    Park, Jong Hyuk
    Lee, Deok Gyu
    Lee, Im-Yeong
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 91 - 103
  • [25] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Jong Sik Moon
    Jong Hyuk Park
    Deok Gyu Lee
    Im-Yeong Lee
    Wireless Personal Communications, 2010, 55 : 91 - 103
  • [26] A NOVEL DYNAMIC ID-BASED REMOTE MUTUAL AUTHENTICATION SCHEME
    Hsiang, Han-Cheng
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2407 - 2415
  • [27] Improvement on the dynamic ID-based remote user authentication scheme
    Lee, Yung-Cheng
    Chang, Geeng-Kwei
    Kuo, Wen-Chung
    Chu, Jung-Lu
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3283 - +
  • [28] Improving the dynamic ID-based remote mutual authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 499 - +
  • [29] An ID-based authentication scheme to achieve the security of smart card
    Xu N.
    Huang H.
    Li Z.
    Wang Y.
    Sha C.
    International Journal of Security and Networks, 2018, 13 (01) : 42 - 50
  • [30] Privacy Preservation and Drone Authentication Using ID-Based Signcryption
    Benzarti, Sana
    Triki, Bayrem
    Korbaa, Ouajdi
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18), 2018, 303 : 226 - 239