
Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
Author(s) -
Irshad Azeem,
Ashraf Chaudhry Shehzad
Publication year - 2020
Publication title -
iet intelligent transport systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.579
H-Index - 45
eISSN - 1751-9578
pISSN - 1751-956X
DOI - 10.1049/iet-its.2020.0273
Subject(s) - eavesdropping , denial of service attack , computer science , scheme (mathematics) , computer security , software deployment , cloud computing , adversary , replay attack , computer network , authentication (law) , the internet , world wide web , operating system , mathematical analysis , mathematics
This comment is presented to identify the drawbacks in a recently published scheme SFVCC by Mishra et al. doi:10.1049/iet‐its.2019.0250 . In this scheme, a malicious adversary may initiate a replay attack and denial of service attack after eavesdropping the communication. These attacks render the scheme inapplicable for practical deployment.