|
[1] M. N. O. Sadiku, M. Tembely, and S. M. Musa, “Internet of vehicles: An introduction,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, p. 11, February 2018. [2] A. Dua, N. Kumar, and S. Bawa, “A systematic review on routing protocols for vehicular ad hoc networks,” Vehicular Communications, vol. 1, pp. 33–52, January 2014. [3] S. Supriya and B. Bharathi, “Iov-a novel mechanism for initiating secure vehicle data transmission using pso with two phase authentication,” Journal of Ambient Intelligence and Humanized Computing, 2021. [4] J. Snoeyink, S. Suri, and G. Varghese, “A lower bound for multicast key distribution,” vol. 1, pp. 422– 431, IEEE, November 2002. [5] A. Mansour, K. M. Malik, A. Alkaff, and H. Kanaan, “Alms: Asymmetric lightweight centralized group key management protocol for vanets,” IEEE Transactions on Intelligent Transportation Sys- tems, vol. 22, pp. 1663–1678, March 2021. [6] M. Bilal and S. G. Kang, “A secure key agreement protocol for dynamic group,” Cluster Computing, vol. 20, pp. 2779–2792, September 2017. [7] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, pp. 39–68, 1 2007. [8] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010. [9] I. A. Kamil and S. O. Ogundoyin, “A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for lte-v-based internet of vehicles in smart cities,” Journal of Information Security and Applications, vol. 63, p. 102994, 2021. [10] K. Lim, K. M. Tuladhar, X. Wang, and W. Liu, “A scalable and secure key distribution scheme for group signature based authentication in vanet,” in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 478–483, 2017. [11] H. Tan, D. Choi, P. Kim, S. Pan, and I. Chung, “Secure certificateless authentication and road message dissemination protocol in vanets,” Wireless Communications and Mobile Computing, vol. 2018, 2018. [12] H. Zhong, S. Zhang, J. Cui, L. Wei, and L. Liu, “Broadcast encryption scheme for v2i communication in vanets,” IEEE Transactions on Vehicular Technology, 2021. [13] H. Aliev, H. Kim, and S. Choi, “A scalable and secure group key management method for secure v2v communication,” Sensors (Switzerland), vol. 20, pp. 1–31, November 2020. [14] A. Fiat and M. Naor, “Broadcast encryption,” in Advances in Cryptology — CRYPTO’ 93 (D. R. Stinson, ed.), (Berlin, Heidelberg), pp. 480–491, Springer Berlin Heidelberg, 1994. [15] D. Boneh and M. Franklin, “An efficient public key traitor tracing scheme,” in Advances in Cryptology — CRYPTO’ 99 (M. Wiener, ed.), (Berlin, Heidelberg), pp. 338–353, Springer Berlin Heidelberg, 1999. [16] D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in Advances in Cryptology – CRYPTO 2005 (V. Shoup, ed.), (Berlin, Heidelberg), pp. 258–275, Springer Berlin Heidelberg, 2005. [17] C. Delerablée, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” in Advances in Cryptology – ASIACRYPT 2007 (K. Kurosawa, ed.), (Berlin, Heidelberg), pp. 200–215, Springer Berlin Heidelberg, 2007. |