Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments

2008 ◽  
Vol 31 (12) ◽  
pp. 2767-2780 ◽  
Author(s):  
Yao H. Ho ◽  
Ai H. Ho ◽  
Kien A. Hua
2015 ◽  
Vol 50 ◽  
pp. 252-257 ◽  
Author(s):  
Balasubramani ◽  
L. Karthikeyan ◽  
V. Deepalakshmi

2019 ◽  
Vol 14 (6) ◽  
pp. 1922-1927
Author(s):  
Belal Ayyoub ◽  
Bilal Zahran ◽  
Jihad Nader ◽  
Jamil al Al-Azzah ◽  
Ahmed Sharadqeh

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Junfeng Miao ◽  
Zhaoshun Wang ◽  
Xue Miao ◽  
Longyue Xing

When mobile network enters 5G era, 5G networks have a series of unparalleled advantages. Therefore, the application of 5G network technology in the Internet of Vehicles (IoV) can promote more intelligently vehicular networks and more efficiently vehicular information transmission. However, with the combination of 5G networks and vehicular networks technology, it requires safe and reliable authentication and low computation overhead. Therefore, it is a challenge to achieve such low latency, security, and high mobility. In this paper, we propose a secure and efficient lightweight authentication protocol for vehicle group. The scheme is based on the extended chaotic map to achieve authentication, and the Chinese remainder theorem distributes group keys. Scyther is used to verify the security of the scheme, and the verification results show that the security of the scheme can be guaranteed. In addition, through security analysis, the scheme can not only effectively resist various attacks but also guarantee security requirements such as anonymity and unlinkability. Finally, by performance analysis and comparison, our scheme has less computation and communication overhead.


Sign in / Sign up

Export Citation Format

Share Document