Hybrid PLS-ML Authentication Scheme for V2I Communication Networks.
Hala AminJawaher KaldariNora MohamedWaqas AmanSaif Al-KuwariPublished in: CoRR (2023)
Keyphrases
- communication networks
- authentication scheme
- smart card
- wireless communication
- secret key
- user authentication
- maximum likelihood
- distributed databases
- network structure
- public key
- security analysis
- computer networks
- security requirements
- authentication protocol
- security flaws
- key management
- security mechanisms
- distributed systems
- information security
- intrusion detection system