Comment on 'SFVCC: Chaotic map-based security framework for vehicular cloud computing'
dc.authorid | Irshad, Azeem/0000-0002-1366-2834 | |
dc.authorid | Chaudhry, Shehzad/0000-0002-9321-6956 | |
dc.contributor.author | Irshad, Azeem | |
dc.contributor.author | Ashraf Chaudhry, Shehzad | |
dc.date.accessioned | 2024-09-11T19:51:24Z | |
dc.date.available | 2024-09-11T19:51:24Z | |
dc.date.issued | 2020 | |
dc.department | İstanbul Gelişim Üniversitesi | en_US |
dc.description.abstract | This comment is presented to identify the drawbacks in a recently published scheme SFVCC by Mishra et al. doi:10.1049/iet-its.2019.0250. In this scheme, a malicious adversary may initiate a replay attack and denial of service attack after eavesdropping the communication. These attacks render the scheme inapplicable for practical deployment. | en_US |
dc.identifier.doi | 10.1049/iet-its.2020.0273 | |
dc.identifier.endpage | 1723 | en_US |
dc.identifier.issn | 1751-956X | |
dc.identifier.issn | 1751-9578 | |
dc.identifier.issue | 12 | en_US |
dc.identifier.scopus | 2-s2.0-85096471422 | en_US |
dc.identifier.startpage | 1723 | en_US |
dc.identifier.uri | https://doi.org/10.1049/iet-its.2020.0273 | |
dc.identifier.uri | https://hdl.handle.net/11363/7779 | |
dc.identifier.volume | 14 | en_US |
dc.identifier.wos | WOS:000594678400022 | en_US |
dc.identifier.wosquality | Q2 | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.language.iso | en | en_US |
dc.publisher | Wiley | en_US |
dc.relation.ispartof | Iet Intelligent Transport Systems | en_US |
dc.relation.publicationcategory | Diğer | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.snmz | 20240903_G | en_US |
dc.subject | feature extraction | en_US |
dc.subject | security of data | en_US |
dc.subject | telecommunication security | en_US |
dc.subject | computer network security | en_US |
dc.subject | cryptographic protocols | en_US |
dc.subject | filtering theory | en_US |
dc.subject | cloud computing | en_US |
dc.subject | malicious adversary | en_US |
dc.subject | replay attack | en_US |
dc.subject | denial | en_US |
dc.subject | chaotic map-based security framework | en_US |
dc.subject | vehicular cloud | en_US |
dc.subject | recently published scheme SFVCC | en_US |
dc.title | Comment on 'SFVCC: Chaotic map-based security framework for vehicular cloud computing' | en_US |
dc.type | Editorial | en_US |