University of Tehran
Authors: Alireza Akrami, Saeed Jafari
With the development and advancement of technology and the heated discussion of IoT, the issue of its security has become a challenging issue, and many protocols have been proposed to provide security in various IoT-related networks. One of these protocols is the protocol of Garg et al. For authentication in V2G networks, which is based on the studies that have been done in this research. First, an analysis of this protocol is presented, its weaknesses are declared, and then a fast and efficient authentication protocol is presented to eliminate the drawbacks of the Garg protocol. Also, to evaluate the performance of the proposed protocol, the new protocol is compared with the Garg protocol in terms of providing security features and processing and communication overhead.
Course: Advanced Network Security