How secure are our roads? An in-depth review of authentication in vehicular communications.
Mahmoud A. ShawkySyed Tariq ShahMohammed AbdrabouMuhammad UsmanQammer H. AbbasiDavid FlynnMuhammad Ali ImranShuja AnsariAhmad TahaPublished in: Veh. Commun. (2024)
Keyphrases
- user authentication
- authentication mechanism
- authentication scheme
- identity management
- data encryption
- password authentication
- security mechanisms
- authentication protocol
- security analysis
- integrity verification
- security requirements
- group communication
- key distribution
- factor authentication
- secure manner
- smart card
- security services
- traffic density
- secure communication
- public key encryption
- rights management
- depth map
- access control
- aerial images
- traffic flow
- biometric authentication
- security issues
- urban areas
- encryption decryption
- private key
- resource constrained
- heterogeneous networks
- road network
- diffie hellman
- communication networks
- cloud computing
- key agreement
- satellite images
- security policies
- key exchange protocol
- digital signature
- signature scheme
- cryptographic protocols
- standard model
- traffic congestion