Computer Science ›› 2025, Vol. 52 ›› Issue (12): 331-338.doi: 10.11896/jsjkx.241100093
• Information Security • Previous Articles Next Articles
SU Xinzhong1, XU Youyun2
CLC Number:
| [1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey[J].Internet of Things,2023,22:100809. [2]VISHWAKARMA L,NAHAR A,DAS D.LBSV:Lightweightblockchain security protocol for secure storage and communication in SDN-enabled IoV[J].IEEE Transactions on Vehicular Technology,2022,71(6):5983-5994. [3]OSIBO B K,ZHANG C,XIA C,et al.Security and privacy in 5G Internet of Vehicles(IoV) environment[J].Journal on Internet of Things,2021,3(2):77. [4]STORCK C R,DUARTE-FIGUEIREDO F.A survey of 5Gtechnology evolution,standards,and infrastructure associated with vehicle-to-everything communications by Internet of Vehicles[J].IEEE Access,2020,8:117593-117614. [5]LIANG W,XIE S,LONG J,et al.A double PUF-based RFIDidentity authentication protocol in service-centric internet of things environments[J].Information Sciences,2019,503:129-147. [6]SHANG F J,DENG X X.Blockchain-based privacy-preserving Internet of Vehicles data sharing scheme[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2025,37(2):155-164. [7]SONG L,SUN G,YU H,et al.Fbia:A fog-based identity authentication scheme for privacy preservation in Internet of Vehicles[J].IEEE Transactions on Vehicular Technology,2020,69(5):5403-5415. [8]MA K,SONG G,ZHOU Y,et al.An efficient identity authentication protocol with revocation,tracking and fine-grained access control for electronic medical system[J].Computer Standards & Interfaces,2024,88:103784. [9]MALL P,AMIN R,DAS A K,et al.PUF-based authentication and key agreement protocols for IoT,WSNs,and smart grids:A comprehensive survey[J].IEEE Internet of Things Journal,2022,9(11):8205-8228. [10]WU L,SUN Q,WANG X,et al.An efficient privacy-preserving mutual authentication scheme for secure V2V communication in vehicular ad hoc network[J].IEEE Access,2019,7:55050-55063. [11]WANG P,CHEN C M,KUMARI S,et al.HDMA:Hybrid D2D message authentication scheme for 5G-enabled VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2020,22(8):5071-5080. [12]MUN H,SEO M,LEE D H.Secure privacy-preserving V2Vcommunication in 5G-V2X supporting network slicing[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(9):14439-14455. [13]DU Q,ZHOU J,MA M.EAIA:An Efficient and AnonymousIdentity-Authentication Scheme in 5G-V2V[J].Sensors,2024,24(16):5376. [14]ULLAH S,ZHENG J,DIN N,et al.Elliptic Curve Cryptography;Applications,challenges,recent advances,and future trends:A comprehensive survey[J].Computer Science Review,2023,47:100530. [15]CERVESATO I.The Dolev-Yao intruder is the most powerful attacker[C]//16th AnnualSymposium on Logic in Computer Science.2001. [16]YιLDιZ H,CENK M,ONUR E.PLGAKD:A PUF-based lightweight group authentication and key distribution protocol[J].IEEE Internet of Things Journal,2020,8(7):5682-5696. [17]PARK C S,PARK W S.A group-oriented DTLS handshake for secure IoT applications[J].IEEE Transactions on Automation Science and Engineering,2018,15(4):1920-1929. [18]SU X,XU Y.Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment[J].Sensors,2024,24(22):7119. [19]XIE Q,DING Z,TANG W,et al.Provable secure and light-weight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs[J].IEEE Transactions on Vehicular Technology,2023,72(12):15200-15212. |
| [1] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
| [2] | REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian. Web Access Control Vulnerability Detection Approach Based on Site Maps [J]. Computer Science, 2024, 51(9): 416-424. |
| [3] | ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili. Construction of Internet of Vehicles Covert Channel Based on Websocket Protocol [J]. Computer Science, 2024, 51(8): 364-370. |
| [4] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
| [5] | LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387. |
| [6] | WANG Bo, ZHAO Jincheng, XU Bingfeng, HE Gaofeng. Zero Day Attack Detection Method for Internet of Vehicles [J]. Computer Science, 2024, 51(12): 334-342. |
| [7] | XUE Jianbin, YU Bowen, XU Xiaofeng, DOU Jun. Queueing Theory-based Joint Optimization of Communication and Computing Resources in Edge Computing Networks [J]. Computer Science, 2024, 51(11A): 240100103-9. |
| [8] | ZENG Congai, LIU Yali, CHEN Shuyi, ZHU Xiuping, NING Jianting. Multi-type K-nearest Neighbor Query Scheme with Mutual Privacy-preserving in Road Networks [J]. Computer Science, 2024, 51(11): 400-417. |
| [9] | MEN Ruirui, JIA Hongyong, DU Jinru. Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts [J]. Computer Science, 2024, 51(10): 372-379. |
| [10] | LIN Xinyu, YAO Zewei, HU Shengxi, CHEN Zheyi, CHEN Xing. Task Offloading Algorithm Based on Federated Deep Reinforcement Learning for Internet of Vehicles [J]. Computer Science, 2023, 50(9): 347-356. |
| [11] | TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25. |
| [12] | ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347. |
| [13] | GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316. |
| [14] | YANG Xin, LI Gengxin, LI Hui. EHFM:An Efficient Hierarchical Filtering Method for Multi-source Network Malicious Alerts [J]. Computer Science, 2023, 50(2): 324-332. |
| [15] | MA Qican, WU Zehui, WANG Yunchao, WANG Xinlei. Approach of Web Application Access Control Vulnerability Detection Based on State Deviation Analysis [J]. Computer Science, 2023, 50(2): 346-352. |
|
||