Irshad, AzeemAshraf Chaudhry, Shehzad2024-09-112024-09-1120201751-956X1751-9578https://doi.org/10.1049/iet-its.2020.0273https://hdl.handle.net/11363/7779This comment is presented to identify the drawbacks in a recently published scheme SFVCC by Mishra et al. doi:10.1049/iet-its.2019.0250. In this scheme, a malicious adversary may initiate a replay attack and denial of service attack after eavesdropping the communication. These attacks render the scheme inapplicable for practical deployment.eninfo:eu-repo/semantics/openAccessfeature extractionsecurity of datatelecommunication securitycomputer network securitycryptographic protocolsfiltering theorycloud computingmalicious adversaryreplay attackdenialchaotic map-based security frameworkvehicular cloudrecently published scheme SFVCCComment on 'SFVCC: Chaotic map-based security framework for vehicular cloud computing'Editorial14121723172310.1049/iet-its.2020.02732-s2.0-85096471422WOS:000594678400022Q2