Authentication Protocols and Authentication on the Base of PKI and ID-based

被引:0
|
作者
Min Thant [1 ]
Zaw, Than Myo [1 ]
机构
[1] ITMO Univ, St Petersburg, Russia
关键词
Internet of Vehicle (IoV); Authentication protocols; Public key infrastructure and ID-base;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a comprehensive survey of authentication protocols for Internet of Vehicles (IoV) is presented. Specifically Secure cryptographic hash function, Proxy Mobile IP (PMIP), Symmetric polynomials, Search algorithms, Group signature, Merkle hash tree (MHT), Timed Efficient Stream Loss-tolerant Authentication (TESLA), Elliptic Curve Digital Signature Algorithm, Multiplicative secret sharing technique, Identity-based public key cryptosystem, Identity-based aggregate signature, Digital signatures, Anonymous attribute-based group setup scheme and Keyed-hashing for message authentication (HMAC) authentication protocols about explained. In addition, authentication on the base of public key infrastructure and ID-based systems explained with example.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Malicious Node Detection using ID-Based Authentication Technique
    Gupta, Anurag
    Mohit, Prerna
    Karati, Arijit
    Amin, Ruhul
    Biswas, G. P.
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 398 - 403
  • [32] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [33] Arithmetic Correlation used in Mobile Cloud ID-based multiple authentication
    Wang Hui-Juan
    Jiang Yong
    Zhan Gao-Feng
    Shi Rui-Sheng
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 105 - 108
  • [34] ID-based deniable ring authentication with constant-size signature
    Wang L.
    Zhang G.
    Ma C.
    Frontiers of Computer Science in China, 2008, 2 (01): : 106 - 112
  • [35] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [36] Security flaws and improvement of an ID-based wireless authentication scheme with anonymity
    Jiang, Qi
    Li, Guang-Song
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 209 - 216
  • [37] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
    Kumar, Vimal
    Kumar, Rakesh
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
  • [38] Security enhancement for a dynamic ID-based remote user authentication scheme
    Liao, IE
    Lee, CC
    Hwang, MS
    International Conference on Next Generation Web Services Practices, 2005, : 437 - 440
  • [39] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [40] An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature
    Gao, Tianhan
    Qi, Jiayu
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 490 - 497