Authentication Protocols and Authentication on the Base of PKI and ID-based

被引:0
|
作者
Min Thant [1 ]
Zaw, Than Myo [1 ]
机构
[1] ITMO Univ, St Petersburg, Russia
关键词
Internet of Vehicle (IoV); Authentication protocols; Public key infrastructure and ID-base;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a comprehensive survey of authentication protocols for Internet of Vehicles (IoV) is presented. Specifically Secure cryptographic hash function, Proxy Mobile IP (PMIP), Symmetric polynomials, Search algorithms, Group signature, Merkle hash tree (MHT), Timed Efficient Stream Loss-tolerant Authentication (TESLA), Elliptic Curve Digital Signature Algorithm, Multiplicative secret sharing technique, Identity-based public key cryptosystem, Identity-based aggregate signature, Digital signatures, Anonymous attribute-based group setup scheme and Keyed-hashing for message authentication (HMAC) authentication protocols about explained. In addition, authentication on the base of public key infrastructure and ID-based systems explained with example.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] An improved dynamic ID-based remote user authentication with key agreement scheme
    Wen, Fengtong
    Li, Xuelei
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 381 - 387
  • [42] ID-based Sensor Node Authentication for Multi-Layer Sensor Networks
    Sung, Soonhwa
    Ryou, Jaecheol
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (04) : 363 - 370
  • [43] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [44] Improved security enhancement for a dynamic ID-based remote user authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (565-567+621):
  • [45] An efficient ID-based user identification scheme for mutual authentication in mobile environments
    Chang, Chin-Chen
    Yang, Jen-Ho
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2006, 9 (03): : 537 - 548
  • [46] A more efficient and secure dynamic ID-based remote user authentication scheme
    Wang, Yan-yan
    Liu, Jia-yong
    Xiao, Feng-xia
    Dan, Jing
    COMPUTER COMMUNICATIONS, 2009, 32 (04) : 583 - 585
  • [47] An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards
    Gao, Zhengxian
    Tu, Yaqing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 4562 - 4567
  • [48] Two-Factor Dynamic ID-Based Remote User Authentication Scheme
    Huang, Renjun
    Su, Fengfu
    Chen, Yangyi
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 373 - 377
  • [49] Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
    Tianjie Cao
    Jingxuan Zhai
    Journal of Medical Systems, 2013, 37
  • [50] Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
    Cao, Tianjie
    Zhai, Jingxuan
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)