期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology
1
作者 Muhammad Imran Ghafoor Awad Bin Naeem +5 位作者 Biswaranjan Senapati Md.Sakiul Islam Sudman Satyabrata Pradhan Debabrata Das Friban Almeida Hesham A.Sakr 《Intelligent Automation & Soft Computing》 2024年第5期783-803,共21页
The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful... The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful applications,enabling connected and autonomous vehicles to interact with infrastructure,sensors,computing nodes,humans,and fellow vehicles.Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards.This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication,utilizing encryption and the Moore curve.The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units(RSUs)before embarking on a journey.Crucially,the Certification Authority remains unaware of the specific route design,ensuring privacy.The method involves transforming all Roadside Units(RSUs)in a region into a vector,allowing for instant authentication of a vehicle’s route using RSU information.Real-world performance evaluations affirm the effectiveness of the proposed model. 展开更多
关键词 Vehicle-to-vehicle vehicle-to-infrastructure internet of things block chain technology
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部