Search: onr:"swepub:oai:DiVA.org:uu-487995" >
An energy-efficient...
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
-
- Akram, Waseem (author)
- Lahore Garrison Univ, Dept Comp Sci, Main Campus, Lahore, Pakistan.
-
- Mahmood, Khalid (author)
- Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Yunlin 64002, Taiwan.;Univ Padua, Dept Math, I-35131 Padua, Italy.
-
- Li, Xiong (author)
- Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China.
-
show more...
-
- Sadiq, Mazhar (author)
- COMSATS Univ, Dept Comp Sci, Sahiwal Campus, Islamabad, Pakistan.
-
- Lv, Zhihan, Dr. 1984- (author)
- Uppsala universitet,Institutionen för speldesign
-
- Chaudhry, Shehzad Ashraf (author)
- Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates.;Nisantasi Univ, Fac Engn & Architecture, Dept Comp Engn, Istanbul, Turkey.
-
show less...
-
Lahore Garrison Univ, Dept Comp Sci, Main Campus, Lahore, Pakistan Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Yunlin 64002, Taiwan.;Univ Padua, Dept Math, I-35131 Padua, Italy. (creator_code:org_t)
- Elsevier, 2022
- 2022
- English.
-
In: Computer Networks. - : Elsevier. - 1389-1286 .- 1872-7069. ; 217
- Related links:
-
https://urn.kb.se/re...
-
show more...
-
https://doi.org/10.1...
-
show less...
Abstract
Subject headings
Close
- Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers vehicle-to-device, vehicle-to-infrastructure, and vehicle-to-vehicle communication in which the vehicles can communicate using sensing abilities. VCC is exploiting the IoT environment, cloud architecture, and vehicle resources. However, the energy-efficient privacy of communicators and security of communication are assertive problems in VCC. To accomplish this goal, we present an identity-based authentication scheme for VCC which also uses radio frequency identification (RFID). The security and robustness of the devised scheme are evaluated using informal and formal analysis. The informal analysis shows that our scheme is vigorous to resist various attacks. The formal analysis is done through Random Oracle Model (ROM) which shows that the scheme is secure and efficient. The performance of our scheme is also determined and compared with various related schemes which clearly illustrate the efficiency of the proposed scheme. Thus, our scheme is very efficient for employment in the VCC environment.
Subject headings
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik -- Kommunikationssystem (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering -- Communication Systems (hsv//eng)
Keyword
- Authentication
- Mutual authentication
- Identity based authentication
- Vehicular cloud computing
Publication and Content Type
- ref (subject category)
- art (subject category)
Find in a library
To the university's database