Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey

Author(s):  
J. Jenefa ◽  
E. A. Mary Anita
Author(s):  
Shivaprasad More ◽  
Rahul Sonkamble ◽  
Udaykumar Naik ◽  
Shraddha Phansalkar ◽  
Priyanka More ◽  
...  

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 125052-125064
Author(s):  
Mostafa Nozari ◽  
Faramarz Hendessi ◽  
Nadia H. Khiadani ◽  
Maryam Ataei Kachooei

Author(s):  
Harsha Vasudev ◽  
Debasis Das

More study is needed to make VANETs more relevant. Opportunistic routing (OR) is a new model that has been proposed for wireless networks. OR has emerged from the research communities because of its ability to increase the performance of wireless networks. It benefits from the broadcast characteristic of wireless mediums to improve network performance. The basic function of OR is its ability to overhear the transmitted packet and to coordinate among relaying nodes. In this chapter, an exhaustive survey of existing OR protocols is done by considering various factors. More precisely, existing secure OR protocols are deliberated. Future directions of research are also included, which provide a superior way to overcome some of the limitations of these existing protocols. Through this detailed survey, an outline and in-depth knowledge of existing OR protocols can be acquired.


Author(s):  
Gregor V. Bochmann ◽  
Eric Zhen Zhang

The requirements for an authentication infrastructure for electronic commerce are explained by identifying the partners involved in e-commerce transactions and the trust relationships required. Related security requirements are also explained, such as authentication, access rights, payment credentials, anonymity (in certain cases), and privacy and integrity of message exchanges. Then several general authentication schemes and specific protocols are reviewed and their suitability for mobile users is discussed. Finally, an improved authentication protocol is presented which can provide trust relationships for mobile e-commerce users. Its analysis and comparison with other proposed authentication protocols indicate that it is a good candidate for use in the context of mobile e-commerce.


Sign in / Sign up

Export Citation Format

Share Document