Game theory-based authentication framework to secure internet of vehicles with blockchain
The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse
access methods, IoV enables vehicles to connect with their surroundings. However, without …
access methods, IoV enables vehicles to connect with their surroundings. However, without …
Blockchain-enabled vehicular ad hoc networks: A systematic literature review
This systematic literature review provides an extensive categorization of the blockchain-
enabled applications across the domain of vehicular ad hoc networks (VANETs). Within the …
enabled applications across the domain of vehicular ad hoc networks (VANETs). Within the …
A Systematic Review on Blockchain-enabled Internet of Vehicles (BIoV): Challenges, Defences and Future Research Directions
In the field of vehicular communication, the Internet of Vehicles (IoV) serves as a new era
that guarantees increased connectivity, efficiency, and safety. The modern area and new …
that guarantees increased connectivity, efficiency, and safety. The modern area and new …
Analysis on security and privacy guidelines: RFID-based IoT applications
HA Abdulghani, NA Nijdam, D Konstantas - Ieee Access, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency
Identification (RFID), which can be used to track single or multiple objects. This technology …
Identification (RFID), which can be used to track single or multiple objects. This technology …
Toward designing a secure authentication protocol for IoT environments
Authentication protocol is a critical part of any application to manage the access control in
many applications. A former research recently proposed a lightweight authentication …
many applications. A former research recently proposed a lightweight authentication …
Secured authentication of RFID devices using lightweight block ciphers on FPGA platforms
Near Field Communication (NFC) has emerged as a pivotal wireless technology for short-
range data exchange between devices, including smartphones and wearables. Leveraging …
range data exchange between devices, including smartphones and wearables. Leveraging …
Privacy-Aware Secure Routing through Elliptical Curve Cryptography with Optimal RSU Distribution in VANETs
Vehicular Ad-Hoc Networks (VANETs) are the backbone of the intelligent transportation
system, which consists of high-speed vehicles with huge dynamic mobility. The …
system, which consists of high-speed vehicles with huge dynamic mobility. The …
A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
[PDF][PDF] Pragmatic analysis of ECC based security models from an empirical perspective
This paper provides a detailed discussion about currently proposed Elliptic Curve
Cryptography (ECC) models focusing on performance parameters such as Security …
Cryptography (ECC) models focusing on performance parameters such as Security …
IoV security and privacy survey: issues, countermeasures, and challenges
A Haddaji, S Ayed, L Chaari Fourati - The Journal of Supercomputing, 2024 - Springer
As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad
hoc networks, the Internet of Vehicles (IoV) is intended to perform as a core information …
hoc networks, the Internet of Vehicles (IoV) is intended to perform as a core information …