ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems

PK Roy, P Kumar, A Bhattacharya - Future Generation Computer Systems, 2025 - Elsevier
Vehicular communication systems can provide two types of communications: Vehicle-to-
Infrastructure (V2I) and Vehicle-to-Vehicle (V2V). However, in both cases, there is zero-trust …

A Survey on Vehicular Cloud Network Security

J Deng, J Deng, P Liu, H Wang, J Yan, D Pan… - IEEE Access, 2023 - ieeexplore.ieee.org
The novel Vehicular Cloud Network (VCN) is a close combination of Vehicular Ad hoc
Network, Cloud Computing, and Edge Computing. However, VCN is facing the enormous …

A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network

SJ Payattukalanirappel, PV Vamattathil… - Peer-to-Peer Networking …, 2024 - Springer
Abstract Vehicular Ad-Hoc Network (VANET), provides considerable real-time traffic
information services that enhance safety and traffic effectiveness. However, as most of the …

Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET

P Kumar, H Om - Vehicular Communications, 2024 - Elsevier
The rapid growth of Vehicular Ad-hoc Networks (VANET), fueled by advancements in the
Internet-of-Things, cloud computing, Intelligent Transportation Systems, and fog computing …

[PDF][PDF] Cryptanalysis of a Biometric based Anonymous Authentication Approach for IoT Environment

K Jha, S Srivastava, A Jain - International Journal of Microsystems …, 2024 - researchgate.net
Network-based services place significant emphasis on user authentication as a critical
security concern. Li et al. have proposed a user authentication method for wireless sensor …

PUF-assisted Anonymous Authentication Scheme for 6G VANET

Y Wang, Y Zhao, J Meng, H Zhang… - Proceedings of the 2024 …, 2024 - dl.acm.org
Breaking the traditional external security defense concept, digging into the common
endogenous attributes of communication and security, and integrating cryptography …