A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks.
Shi DongHuadong SuYuanjun XiaFei ZhuXinrong HuBangchao WangPublished in: IEEE Trans. Intell. Transp. Syst. (2023)
Keyphrases
- wireless sensor networks
- vehicular ad hoc networks
- data dissemination
- routing protocol
- authentication mechanism
- authentication protocol
- sensor networks
- energy consumption
- secret key
- data encryption
- trust relationships
- authentication scheme
- security analysis
- user authentication
- database
- smart card
- network layer
- distributed systems
- data streams