[3] |
KHAN F , REHMAN A U , ZHANG Y L ,et al. A secured and reliable continuous transmission scheme in cognitive HARQ-aided Internet of things[J]. IEEE Internet of Things Journal, 2021,8(19): 14835-14844.
|
[4] |
ZOU Y L , ZHU J , WANG X B ,et al. A survey on wireless security:technical challenges,recent advances,and future trends[J]. Proceedings of the IEEE, 2016,104(9): 1727-1765.
|
[5] |
JIANG S R , ZHU X Y , WANG L M . An efficient anonymous batch authentication scheme based on HMAC for VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2016,17(8): 2193-2204.
|
[6] |
SUTRALA A K , BAGGA P , DAS A K ,et al. On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment[J]. IEEE Transactions on Vehicular Technology, 2020,69(5): 5535-5548.
|
[1] |
SHARMA S , KAUSHIK B . A survey on Internet of vehicles:applications,security issues & solutions[J]. Vehicular Communications, 2019,20:100182.
|
[2] |
JAN M A , KHAN F , MASTORAKIS S ,et al. LightIoT:lightweight and secure communication for energy-efficient IoT in health informatics[J]. IEEE Transactions on Green Communications and Networking, 2021,5(3): 1202-1211.
|
[7] |
TZENG S F , HORNG S J , LI T R ,et al. Enhancing security and privacy for identity-based batch verification scheme in VANETs[J]. IEEE Transactions on Vehicular Technology, 2017,66(4): 3235-3248.
|
[8] |
VIJAYAKUMAR P , AZEES M , KOZLOV S A ,et al. An anonymous batch authentication and key exchange protocols for 6G enabled VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2022,23(2): 1630-1638.
|
[9] |
GAYATHRI N B , THUMBUR G , REDDY P V ,et al. Efficient pairing-free certificateless authentication scheme with batch verification for vehicular ad-hoc networks[J]. IEEE Access, 2018,6: 31808-31819.
|
[10] |
HUANG J L , YEH L Y , CHIEN H Y . ABAKA:an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2011,60(1): 248-262.
|
[11] |
ZHANG J , ZHONG H , CUI J ,et al. SMAKA:secure many-to-many authentication and key agreement scheme for vehicular networks[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 1810-1824.
|
[12] |
LIU Y B , WANG Y H , CHANG G H . Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(10): 2740-2749.
|
[13] |
XU G Q , LI X T , JIAO L T ,et al. BAGKD:a batch authentication and group key distribution protocol for VANETs[J]. IEEE Communications Magazine, 2020,58(7): 35-41.
|
[14] |
KIM Y , PERRIG A , TSUDIK G . Tree-based group key agreement[J]. ACM Transactions on Information and System Security, 2004,7(1): 60-96.
|
[15] |
WEI L , CUI J , ZHONG H ,et al. Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs[J]. IEEE Transactions on Mobile Computing, 2022,21(9): 3280-3297.
|
[16] |
BURROWS M , ABADI M , NEEDHAM R . A logic of authentication[J]. ACM Transactions on Computer Systems, 1990,8(1): 18-36.
|
[17] |
BAGGA P , DAS A K , WAZID M ,et al. Authentication protocols in Internet of vehicles:taxonomy,analysis,and challenges[J]. IEEE Access, 2020,8: 54314-54344.
|
[18] |
杨小东, 陈春霖, 杨平 ,等. 可证安全的部分盲代理重签名方案[J]. 通信学报, 2018,39(2): 65-72.
|
|
YANG X D , CHEN C L , YANG P ,et al. Partially blind proxy re-signature scheme with proven security[J. Journal on Communications, 2018,39(2): 65-72.
|
[19] |
LAI C Z , ZHANG M , CAO J ,et al. SPIR:a secure and privacy-preserving incentive scheme for reliable real-time map updates[J]. IEEE Internet of Things Journal, 2020,7(1): 416-428.
|
[20] |
JIA X Y , HE D B , KUMAR N ,et al. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing[J]. IEEE Systems Journal, 2020,14(1): 560-571.
|