Cargando…
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based...
Autores principales: | Hakeem, Shimaa A. Abdel, El-Gawad, Mohamed A. Abd, Kim, HyungWon |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7582867/ https://www.ncbi.nlm.nih.gov/pubmed/33050065 http://dx.doi.org/10.3390/s20195719 |
Ejemplares similares
-
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2021) -
Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2021) -
Security Requirements and Challenges of 6G Technologies and Applications
por: Abdel Hakeem, Shimaa A., et al.
Publicado: (2022) -
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
por: Abdel Hakeem, Shimaa A., et al.
Publicado: (2022) -
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge
por: Pardeshi, Mayuresh Sunil, et al.
Publicado: (2022)