Advanced Computer Networking
Survey
A Countermeasure for Garg et al. Scheme: An Authentication Method for V2G Networks

University of Tehran

Authors: Alireza Akrami, Saeed Jafari

With the development and advancement of technology and the heated discussion of IoT, the issue of its security has become a challenging issue, and many protocols have been proposed to provide security in various IoT-related networks. One of these protocols is the protocol of Garg et al. For authentication in V2G networks, which is based on the studies that have been done in this research. First, an analysis of this protocol is presented, its weaknesses are declared, and then a fast and efficient authentication protocol is presented to eliminate the drawbacks of the Garg protocol. Also, to evaluate the performance of the proposed protocol, the new protocol is compared with the Garg protocol in terms of providing security features and processing and communication overhead.

Course: Advanced Network Security

Full Report
Saeed Jafari

© Creative CV. All rights reserved.