Our framework can be applied in design, making choices appropriate for the intended context in both intra-vehicle and inter-vehicle communications. The main contribution of this study is a framework to enable protocol designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. This paper provides such a framework, proposing a new taxonomy to enable a consistent means of classifying authentication schemes based upon seven main criteria. Most existing classifications either use computation complexity of cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication. However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation. Several existing survey papers have attempted to classify some of these protocols based on a limited set of characteristics. Research aimed at tackling this problem has resulted in the proposal of multiple authentication protocols. However, VC systems are vulnerable to cyber attacks involving message manipulation. This should result in improved safety and may optimize traffic. Vehicles communicate with other vehicles and with nearby fixed equipment to support different applications, including those which increase driver awareness of the surroundings. In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems known as Vehicular Communication (VC) systems.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |