Abstract

AbstractSecurity is our primary goal for any intelligent systems that are connected to the wireless networks. Researchers are constantly working to improve the security of various applications of these systems like smart home, smart city, and smart transportation. In 2018, Khalid et al. have proposed a security framework to enable secure communication and authentication between smart vehicles and road-side units (RSUs) of intelligent traffic control system such as vehicle to vehicle (V2V), vehicle to infrastructure (V2I), and infrastructure to vehicle (I2V) in the context of intelligent transportation systems. In Khalid et al. scheme, the authors have claimed that their proposed scheme is providing secure communication between smart vehicles and RSUs of intelligent traffic control system and is capable to withstand against various security attacks such as replay attack, DoS attack, Sybil attack, and impersonation attack. In this paper, we have done a thorough security analysis of Khalid et al. authentication scheme and found that their scheme is insecure against some relevant security attacks. The scheme addressed by Khalid et al. is prone to possible security attacks such as side-channel/smart device attack and code injection attacks.KeywordsIntelligent traffic light control systems (ITLCSs)RSUs (road-side units)Smart citiesIntelligent transportation systems (ITSs)VANETs (vehicular ad hoc networks)OBU (on-board unit)

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call