Articles with "ecc based" as a keyword



A cooperative ECC-based authentication protocol for VANETs

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-24663-8

Abstract: Vehicular Ad Hoc Networks (VANETs) play a critical role in Intelligent Transportation Systems (ITSs), enabling secure communication between vehicles and roadside infrastructure. However, in dense traffic environments, conventional centralized Vehicle-to-Infrastructure (V2I) authentication schemes impose a… read more here.

Keywords: authentication; based authentication; authentication protocol; ecc based ... See more keywords

A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204271

Abstract: Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has miserable significance in many areas, including wildlife monitoring,… read more here.

Keywords: authentication; authentication scheme; verifiably secure; scheme ... See more keywords

On the Security of an ECC-Based Authentication Scheme for Internet of Drones

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2022.3162604

Abstract: We demonstrate that the ECC-based authentication scheme for internet of drones (short for IoD-AS, published in IEEE Systems Journal, Hussain et al., 2021) Amassing the security: An ECC-based authentication scheme for Internet of Drones) fails… read more here.

Keywords: authentication scheme; scheme internet; internet drones; ecc based ... See more keywords