Analysis of Magnitude of Threats for V2X Authentication Schemes Under Quantum Powered Adversary

dc.contributor.authorSawant, S.V.
dc.contributor.authorRudra, B.
dc.date.accessioned2026-02-06T06:34:46Z
dc.date.issued2023
dc.description.abstractThe Internet has revolutionized the way we communicate. We are now able to connect to anyone across the globe with little or no effort. This revolution has empowered various technological inventions. The Internet has fixed numerous challenges that were difficult to address before. Today, even Vehicular Communication is possible due to the Internet. From providing situational vigilance to taking sound decisions, vehicles have traveled a smart journey. These technological marvels were possible due to the remarkable progress in the computational power of devices. Now, with the world moving towards quantum computing, we stare at future with an ocean of possibilities. Such capabilities in the hands of adversaries can lead to unpleasant consequences. Hence, it is important to determine whether our existing systems are safe against such powerful adversaries. Also, it is equally important to develop techniques that can defend vehicles from adversaries. In this paper, we have listed out various authentication schemes against quantum adversaries and presented our observations. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
dc.identifier.citationLecture Notes in Networks and Systems, 2023, Vol.720 LNNS, , p. 479-489
dc.identifier.issn23673370
dc.identifier.urihttps://doi.org/10.1007/978-981-99-3761-5_43
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/29433
dc.publisherSpringer Science and Business Media Deutschland GmbH
dc.subjectInternet of Vehicles (IoVs)
dc.subjectPost quantum cryptography
dc.subjectQuantum computing
dc.subjectQuantum-resistant
dc.subjectSecurity
dc.subjectVANETs
dc.subjectVehicular communication
dc.titleAnalysis of Magnitude of Threats for V2X Authentication Schemes Under Quantum Powered Adversary

Files