Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5 G-V2X communication

Security concerns in 5 G-V2X communication, including message authenticity, entity identification, and efficient malicious entity detection, necessitate innovative solutions. This paper introduces a novel protocol aimed at addressing security challenges in 5 G-V2X communication, focusing on authenti...

Full description

Bibliographic Details
Main Authors: Shimaa A. Abdel Hakeem, HyungWon Kim
Format: Article
Language:English
Published: Elsevier 2023-12-01
Series:Alexandria Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S111001682301013X