[1] |
VASUDEV H , DAS D . Work-in-progress:SAFE:secure authentication for future entities using Internet of vehicles[C]// 2019 IEEE Real-Time Systems Symposium. Piscataway:IEEE Press, 2019: 560-563.
|
[2] |
SUN Y C , WU L , WU S Z ,et al. Security and privacy in the Internet of vehicles[C]// 2015 International Conference on Identification,Information,and Knowledge in the Internet of Things. Piscataway:IEEE Press, 2015: 116-121.
|
[3] |
TULADHAR K M , LIM K . Efficient and scalable certificate revocation list distribution in hierarchical VANETs[C]// 2018 IEEE International Conference on Electro/Information Technology. Piscataway:IEEE Press, 2018: 620-625.
|
[4] |
SUN G , SUN S Y , SUN J ,et al. Security and privacy preservation in fog-based crowd sensing on the Internet of vehicles[J]. Journal of Network and Computer Applications, 2019,134: 89-99.
|
[5] |
FREUDIGER J , RAYA M , FELEGHHAZI M . Mix zones for location privacy in vehicular networks[C]// ACM Workshop on Wireless Networking for Intelligent Transportation Systems. New York:ACM Press, 2007: 1-7.
|
[6] |
LU R , LIN X , ZHU H ,et al. ECPP:efficient conditional privacy preservation protocol for secure vehicular communications[C]// IEEE INFOCOM 2008-The 27th Conference on Computer Communications. Piscataway:IEEE Press, 2008: 1229-1237.
|
[7] |
ZHANG L , WU Q H , SOLANAS A ,et al. A scalable robust authentication protocol for secure vehicular communications[J]. IEEE Transactions on Vehicular Technology, 2010,59(4): 1606-1617.
|
[8] |
JIANG Y X , SHI M H , SHEN X M ,et al. BAT:a robust signature scheme for vehicular networks using binary authentication tree[J]. IEEE Transactions on Wireless Communications, 2009,8(4): 1974-1983.
|
[9] |
YAO L , LIN C , DENG J ,et al. Biometrics-based data link layer anonymous authentication in VANETs[C]// 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Piscataway:IEEE Press, 2013: 182-187.
|
[10] |
JIANG S R , ZHU X Y , WANG L M . An efficient anonymous batch authentication scheme based on HMAC for VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2016,17(8): 2193-2204.
|
[11] |
YING B D , NAYAK A . Anonymous and lightweight authentication for secure vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2017,66(12): 10626-10636.
|
[12] |
LIU J W , LI Q Q , SUN R ,et al. An efficient anonymous authentication scheme for Internet of vehicles[C]// 2018 IEEE International Conference on Communications. Piscataway:IEEE Press, 2018: 1-6.
|
[13] |
ZHAO D W , PENG H P , LI L X ,et al. A secure and effective anonymous authentication scheme for roaming service in global mobility networks[J]. Wireless Personal Communications, 2014,78(1): 247-269.
|
[14] |
CUI J , WANG Y L , ZHANG J ,et al. Full session key agreement scheme based on chaotic map in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(8): 8914-8924.
|
[15] |
LI G S , JIANG Q , WEI F S ,et al. A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015,80(2): 581-589.
|
[16] |
ZENG Y B , GUANG H , LI G S . Attribute-based anonymous handover authentication protocol for wireless networks[J]. Security and Communication Networks, 2018,2018: 1-9.
|
[17] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. Cryptography Mailing, 2008.
|
[18] |
SHARMA V . An energy-efficient transaction model for the blockchain-enabled Internet of vehicles (IoV)[J]. IEEE Communications Letters, 2019,23(2): 246-249.
|
[19] |
BAGGA P , DAS A K , WAZID M ,et al. Authentication protocols in Internet of vehicles:taxonomy,analysis,and challenges[J]. IEEE Access, 2020,8: 54314-54344.
|
[20] |
YANG J L , WANG D H . Applying extended chebyshev polynomials to construct a trap-door one-way function in real field[C]// 2009 First International Conference on Information Science and Engineering. Piscataway:IEEE Press, 2009: 1680-1682.
|
[21] |
CASTRO M , LISKOV B . Practical Byzantine fault tolerance[C]// Proceedings of the Third Symposium on Operating Systems Design and Implementation. New York:ACM Press, 1999: 173-186.
|
[22] |
CHEN Z L , CHEN S Z , XU H ,et al. A security authentication scheme of 5G ultra-dense network based on block chain[J]. IEEE Access, 2018,6: 55372-55379.
|
[23] |
HU W , HU Y W , YAO W H ,et al. A blockchain-based Byzantine consensus algorithm for information authentication of the Internet of vehicles[J]. IEEE Access, 2019,7: 139703-139711.
|
[24] |
郑敏, 王虹, 刘洪 ,等. 区块链共识算法研究综述[J]. 信息网络安全, 2019(7): 8-24.
|
|
ZHENG M , WANG H , LIU H ,et al. Survey on consensus algorithms of blockchain[J]. Netinfo Security, 2019(7): 8-24.
|
[25] |
BRESSON E , CHEVASSUT O , POINTCHEVAL D . Security proofs for an efficient password-based key exchange[C]// Proceedings of the 10th ACM Conference on Computer and Communication Security. New York:ACM Press, 2003: 241-250.
|
[26] |
屈娟, 冯玉明, 李艳平 ,等. 可证明安全的面向无线传感器网络的三因素认证及密钥协商方案[J]. 通信学报, 2018,39(S2): 189-197.
|
|
QU J , FENG Y M , LI Y P ,et al. Provably secure three-factor authentication and key agreement scheme for wireless sensor network[J]. Journal on Communications, 2018,39(S2): 189-197.
|