z-logo
open-access-imgOpen Access
Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
Author(s) -
Irshad Azeem,
Ashraf Chaudhry Shehzad
Publication year - 2020
Publication title -
iet intelligent transport systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.579
H-Index - 45
eISSN - 1751-9578
pISSN - 1751-956X
DOI - 10.1049/iet-its.2020.0273
Subject(s) - eavesdropping , denial of service attack , computer science , scheme (mathematics) , computer security , software deployment , cloud computing , adversary , replay attack , computer network , authentication (law) , the internet , world wide web , operating system , mathematical analysis , mathematics
This comment is presented to identify the drawbacks in a recently published scheme SFVCC by Mishra et al. doi:10.1049/iet‐its.2019.0250 . In this scheme, a malicious adversary may initiate a replay attack and denial of service attack after eavesdropping the communication. These attacks render the scheme inapplicable for practical deployment.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here