User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 23
VANET Communication System with HENON Based Privacy Preserving Authentication
2023
Journal:  
International Journal of Intelligent Systems and Applications in Engineering
Author:  
Abstract:

Abstract It is extremely difficult to ensure the security of the Vehicular Internet of Things (VIoT) because of how diverse and infrastructure-free it is deployed, which exposes it to a variety of security concerns. There is an urgent need for a mutual authentication method among the linked devices to solve this problem and safeguard sensitive data inside the deployed region. However, when used in VIoT systems, previous methods have significant computational costs and insecure connectivity. Therefore, it is essential to provide an authentication system that protects privacy and can successfully protect VANET devices from attacks. In order to provide private and secure authentication between VANET devices, this study offers a special, compact, and secure protocol based on network-centric Henon Chaotic Maps (NC-HCM). The proposed method enables real devices to vary their keys for each transmission iteration while ensuring secure transmission of sensitive data from the source to the destination. The security level of the proposed model is assessed and analysed formally using the Burrows-Abadi-Needham Logic (BAN). The given model is also thoroughly verified using AVISPA and the Profverif tool. The results of the investigation show that the suggested strategy acts as a strong deterrent against both active and passive attacks. It successfully protects the VANET devices and guarantees the veracity, integrity, and secrecy of the data sent.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles












International Journal of Intelligent Systems and Applications in Engineering

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 1.632
Cite : 489
2023 Impact : 0.054
International Journal of Intelligent Systems and Applications in Engineering