Recently, Vijayakumar et al. proposed a dual authentication and key management scheme for secure data transmission in vehicular ad-hoc networks. As described by Vijayakumar et al., a dual authentication scheme and the corresponding group key management mechanism are illustrated successively. The authors claimed that the proposed scheme is resistant to replay attack and masquerade attack. However, we find that the proposed scheme given by Vijayakumar et al. is still vulnerable to replay attack, which could be conducted by reusing previously acquired messages. Moreover, this scheme cannot resist masquerade attack toward the system. For the above consideration, in this paper, modifications toward the existing protocol are presented, so as to provide adequate security assurance toward the mentioned attacks.
|ジャーナル||IEEE Transactions on Intelligent Transportation Systems|
|出版ステータス||出版済み - 7 2018|
All Science Journal Classification (ASJC) codes
- コンピュータ サイエンスの応用