Blockchain-Based One-Time Authentication for Secure V2X Communication Against Insiders and Authority Compromise Attacks.
Jaewon NohYongseok KwonJunggab SonSunghyun ChoPublished in: IEEE Internet Things J. (2023)
Keyphrases
- security mechanisms
- resource constrained
- secure communication
- security protocols
- security issues
- security services
- user authentication
- security requirements
- security analysis
- authentication protocol
- access control
- authentication scheme
- authentication mechanism
- identity management
- data encryption
- information sharing
- secure manner
- digital signature
- stream cipher
- smart card
- key management
- cryptographic protocols
- secure routing
- chosen plaintext
- public key infrastructure
- password authentication
- wireless sensor networks
- security measures
- integrity verification
- insider threat
- factor authentication
- security architecture
- multi party
- secret key
- digital watermarking
- block cipher
- key distribution
- trusted third party
- detect malicious
- group communication
- encryption decryption
- encryption scheme
- single point of failure
- public key cryptography
- diffie hellman
- lightweight