Abstract: In Industrial Internet of Vehicles (IIoV), vehicles enable efficient cross-domain industrial collaboration through real-time communication with other nodes (infrastructure and other vehicles ...
Abstract: We show that the authentication protocol (Ma and Cheng [10]) fails to keep user anonymity, not as claimed. We suggest a method to fix it. Besides, we find there is a flawed equality, in ...