SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:uu-487995"
 

Search: onr:"swepub:oai:DiVA.org:uu-487995" > An energy-efficient...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing

Akram, Waseem (author)
Lahore Garrison Univ, Dept Comp Sci, Main Campus, Lahore, Pakistan.
Mahmood, Khalid (author)
Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Yunlin 64002, Taiwan.;Univ Padua, Dept Math, I-35131 Padua, Italy.
Li, Xiong (author)
Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China.
show more...
Sadiq, Mazhar (author)
COMSATS Univ, Dept Comp Sci, Sahiwal Campus, Islamabad, Pakistan.
Lv, Zhihan, Dr. 1984- (author)
Uppsala universitet,Institutionen för speldesign
Chaudhry, Shehzad Ashraf (author)
Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates.;Nisantasi Univ, Fac Engn & Architecture, Dept Comp Engn, Istanbul, Turkey.
show less...
Lahore Garrison Univ, Dept Comp Sci, Main Campus, Lahore, Pakistan Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Yunlin 64002, Taiwan.;Univ Padua, Dept Math, I-35131 Padua, Italy. (creator_code:org_t)
Elsevier, 2022
2022
English.
In: Computer Networks. - : Elsevier. - 1389-1286 .- 1872-7069. ; 217
  • Journal article (peer-reviewed)
Abstract Subject headings
Close  
  • Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers vehicle-to-device, vehicle-to-infrastructure, and vehicle-to-vehicle communication in which the vehicles can communicate using sensing abilities. VCC is exploiting the IoT environment, cloud architecture, and vehicle resources. However, the energy-efficient privacy of communicators and security of communication are assertive problems in VCC. To accomplish this goal, we present an identity-based authentication scheme for VCC which also uses radio frequency identification (RFID). The security and robustness of the devised scheme are evaluated using informal and formal analysis. The informal analysis shows that our scheme is vigorous to resist various attacks. The formal analysis is done through Random Oracle Model (ROM) which shows that the scheme is secure and efficient. The performance of our scheme is also determined and compared with various related schemes which clearly illustrate the efficiency of the proposed scheme. Thus, our scheme is very efficient for employment in the VCC environment.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Kommunikationssystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Communication Systems (hsv//eng)

Keyword

Authentication
Mutual authentication
Identity based authentication
Vehicular cloud computing

Publication and Content Type

ref (subject category)
art (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view