Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks
Abstract
:1. Introduction
- First, a Chebyshev polynomial-based scheme for resisting side-channel attacks in 5G-enabled vehicular networks that fulfills the design goals with regard to the privacy and security requirements;
- Second, a scheme that resists side-channel attacks by regularly renewing the system’s sensitive information (pseudonym) preserved in the TPD;
- Third, a scheme that outperforms other works based on bilinear pair cryptography and elliptic curve cryptography schemes; therefore, it the suitable for large-scale deployment in vehicular networks.
2. Related Work
2.1. Public Key Infrastructure (PKI)-Based
2.2. Group Signature (GS)-Based
2.3. Pseudonym-Based
- Bilinear Pair Cryptography (BPC):In 2008, Zhang et al. [23] were the first to propose the bilinear pair cryptography and pseudonym-based approach to achieve security communication in vehicular networks. The scheme of Zhang et al. [23] stores the secret key of the system (TA) in the TPD of the vehicle, which is claimed not to be compromised by the adversary.In 2013, Lee and Lai [24] highlighted the limitation arising from the scheme of Zhang et al. [23]: it could not achieve non-repudiation and replay attacks resistance. Therefore, Lee and Lai [24] proposed an enhanced scheme to satisfy privacy preservation in vehicular networks.Later, Bayat et al. [25], and Jianhong et al. [26] highlighted the limitation arising from the scheme of Lee and Lai [24]: it could not resist the impersonation attacks in 2015 and 2014, respectively.In 2016, Lei Zhang et al. [27] designed a pseudonym-based authentication scheme to resist side-channel attacks by periodically renewing the sensitive data preserved on the TPD of the vehicle.
- Elliptic Curve Cryptography (ECC):In 2015, He et al. [28] were the first to propose the use of elliptic curve cryptography rather than bilinear pair cryptography to achieve privacy and security requirements in vehicular networks. He et al. [28] also highlighted the limitation arising from the schemes of Lee and Lai [24] and Jianhong et al. [26]: they could not resist forgery attacks. However, due to the secret key of the system (TA) being saved on the TPD, the scheme of He et al. [28] suffers from side-channel attacks to retrieve the data for impersonating legal vehicles and sending fake messages in the vehicular networks. In 2017, Wu et al. [29] designed a pseudonym-based scheme in which TA preloaded a batch of pseudonym identities for each enrolled vehicle to provide secure communication in vehicular networks. In 2020, Cui et al. [30] presented a mutual authentication with privacy preservation to resist side-channel attacks by using operation ECC. In 2020, the TA in the scheme of Cui et al. [31] preserved the secret key to the TPD of OBU for enrolled vehicles. In 2019, the scheme proposed by [32] employs time-consuming operations with regards to scalar multiplication-based ECC to check several messages in the urban area.
3. Preliminaries
3.1. Architectural Design
- TA: Fully trusted component for vehicular networks. It is responsible for generating Chebyshev polynomial-based public parameters of the system and preloading them into enrolled vehicles.
- 5G-BS: Base station device installed on the roadside. It is responsible for tossing the messages from vehicles to TA or vice versa.
- OBU: Each vehicle has an onboard unit (OBU) to process, send and receive messages. Each OBU has a TPD to preserve sensitive data.
3.2. Design Goal
- Pseudonym Identity: The adversary is not capable of disclosing the original identity of the vehicle from the information sent from any enrolled user.
- Authentication and Integrity: Each piece of information sent by a vehicle is checked by enrolled vehicles. Furthermore, enrolled vehicles should be capable of detecting any alteration of received messages.
- Traceability: The TA is the only component capable of revealing the original identity of the vehicle in case it is needed.
- Unlinkability: The adversary is not capable of tracking the behavior of the vehicle by linking two messages sent from the same source.
- Resistance Security Attacks: The sophisticated schemes should resist security attacks again, as will be explained in the coming subsection.
3.3. Threat Model
- Side-Channel Attack: The adversary may retrieve the sensitive information saved on the TPD of the vehicle in order to realize his/her workable advantage.
- Replay Attack: The adversary may replay the previous message sent by the enrolled vehicle in order to realize his/her workable advantage.
- Modify Attack: The adversary may modify the message sent by the enrolled vehicle in order to realize his/her workable advantage.
- Forgery Attack: The adversary may impersonate the enrolled vehicle in order to realize his/her workable advantage.
- Man-In-The-Middle Attack: The third party may intercept the communication among enrolled vehicles in order to realize his/her workable advantage.
3.4. Mathematical Foundations
- Chebyshev polynomial:Definition 1.Assume n and P indicate an integer and a large prime number, respectively. x indicates a variable taking values over the interval . : a Chebyshev polynomial of stage n is identified asThereby, based on Definition 1, the recurrence formulation of the Chebyshev polynomial mapping is as below:The Chebyshev polynomial has two significant properties, namely chaotic and semi-group, respectively.
- -
- Chaotic property: When degree n > 1, it can identify a Chebyshev polynomial mapping as a chaotic mapping with a constant density function .
- -
- Semi-group property:
The two hard assumption problems are introduced.
4. Proposed Scheme
4.1. System Initialization
- The TA chooses the large prime P and generates values based on chaotic map.
- The TA picks a random values s as its secret key.
- The TA determines one hash function h based on the chaotic map, where .
- The TA publishes the parameters of system { , x, P, h}.
4.2. Enrollment
- The user sends the vehicle’s original identity to the TA.
- The TA first tests the legitimacy of ; if it is true, the TA continues with the subsequent steps; otherwise, it stops.
- The TA chooses a short valid period , such as 1 January 2022–1 February 2022.
- The TA computes = and inter-pseudonym identity.
- The TA preloads the tuples to the vehicle. At the same time, it put the tuples into the list of members of the TA.
- The vehicle stores the tuples into TPD.
4.3. Signing
- The vehicle randomly picks a value w and computes public pseudonym identity , where is the latest timestamp.
- The vehicle calculates the parameter .
- The vehicle signs the message .
- The vehicle calculates the message signature .
- Lastly, the vehicle broadcasts the message-tuple {, , , } to others.
4.4. Verification
- When the message-tuple arrives {, , , }, the receiver initially tests the freshness of timestamp as follows. Assume is the time of arriving and is the time of predefined delay. If ( > − ), thereafter is legitimate. Otherwise, the message-tuple {, , , } is discarded.
- Then, the receiver computes the parameter .
- Lastly, the receiver utilizes the message signature of the message-tuple {, , , } to verify the message , where . The receiver accepts the tuple when the following equation holds. Otherwise, the message is rejected.
4.5. Pseudonym Renew
- The vehicle randomly picks a value , computes and computes public pseudonym identity , where is the latest timestamp.
- The vehicle computes and sends the tuple to the TA through the 5G-BS.
- The TA first verifies the timestamp of the tuple and then checks the vehicle by checking whether the equation are equal.
- The TA seeks whether the member list has the inter-pseudonym identity . If it is false, the process will be ended. Otherwise, the TA continues by checking the validity of .
- The TA randomly picks a value , computes and computes a new inter-pseudonym identity , where is a new short time period.
- The TA encrypts by using , computes and then sends tuple to the vehicle through the 5G-BS.
- The vehicle first verifies the timestamp of the tuple and then checks the TA by checking whether the equations are equal.
- The vehicle sets as the new inter-pseudonym identity by using .
5. Security Analysis
5.1. Formal Analysis
5.2. Security Proof
5.3. Informal Analysis
- Satisfying Pseudonym Identity: The vehicle’s original identity is hidden with an inter-pseudonym identity by the TA at the enrollment phase of our work. Before broadcasting the message to vehicle-to-everything (V2X) communication, the vehicle computes a public pseudonym identity , where is the latest timestamp and then sends the message-tuple {, , , }. Therefore, our work is safe, and the adversary does not have the capability to attack the scheme to obtain the vehicle’s identity from the message.
- Satisfying Authentication and Integrity: In our work, the recipient verifies the node authentication and message integrity by checking through . After completing the verification process, the vehicle then accepts the safety-related message included of the message-tuple {, , , }. Therefore, our work is achieving requirements of authentication and integrity in 5G-enabled vehicular networks.
- Satisfying Traceablility: The original identity of vehicle is hid in an inter-pseudonym identity , where . Due to the being hid in of the message-tuple {, , , }, the attacker does not have the ability to disclose it. The TA is only able to retrieve the original identity by computing , where is stored on the TA. Therefore, our work is satisfying traceability requirement.
- Satisfying Unlinkability: In our work, the vehicle generates public pseudonym identity by the chaotic map based a hash function h, and the adversary does not have the ability to determine two that are issued from the same enrolled vehicle. Hence, our work satisfies the unlinkability requirement in 5G-enabled vehicular networks.
- Resisting Side-Channel Attack: The assumption of the existing authentication scheme is that a TPD is not compromised by an adversary; thereby, the secret key of the system (TA) is preloaded and saved in the enrolled vehicle. Nevertheless, the adversary could conduct malicious activities by launching an attack on a side channel to acquire the sensitive data preserved on TPD. Then, the adversary impersonates a legal vehicle and sends fake messages to collapse the system of vehicular networks. In our work, before the short valid period is to expire, the inter-pseudonym identity is regularly renewed to be new to resist side-channel attack. Therefore, our work is safe from the side-channel attack, and the adversary does not have the ability to attack the scheme to acquire the sensitive information saved on the TPD of enrolled vehicles in 5G-enabled vehicular networks.
- Resisting Replay Attack: The message-tuple {, , , } sent by the enrolled vehicle includes a timestamp ; the recipient has the ability to check if the message is replayed by verifying the timestamp . Therefore, our work is safe for a replay attack, and the adversary does not have the ability to attack the scheme to replay the message in 5G-enabled vehicular networks.
- Resisting Modify Attack: The message-tuple {, , , } sent by the enrolled vehicle includes a signature ; the recipient has the ability to check if the message is modify by verifying the , as shown in Equation (3). Therefore, our work is safe for modification attacks, and the adversary does not have the ability to attack the scheme to modify the message.
- Resisting Forgery Attack: During the enrollment phase of our work, after submitting the original identity of vehicle , the TA computes the inter-pseudonym identity . Then, and are preloaded to the enrolled vehicle by the TA. Therefore, no third party has the ability to retrieve the data saved to impregnate a legal vehicle. Therefore, our work is safe for forgery attacks, and the adversary does not have the ability to attack the scheme to impersonate the legal vehicle in 5G-enabled vehicular networks.
- Resisting Man-In-The-Middle attack: According to Section 5.1, the model of the Dolev–Yao threat is implemented by AVISPA. Therefore, our work is safe for a Man-In-The-Middle attack, and the adversary does not have the ability to attack the scheme to change/modify the message sent in 5G-enabled vehicular networks.
5.4. Security Comparison
6. Efficiency Performance
6.1. Cost of Computation
6.2. Cost of Communication
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chiti, F.; Fantacci, R.; Giuli, D.; Paganelli, F.; Rigazzi, G. Communications protocol design for 5G vehicular networks. In 5G Mobile Communications; Springer: Cham, Switzerland, 2017; pp. 625–649. [Google Scholar]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors 2021, 21, 8206. [Google Scholar] [CrossRef] [PubMed]
- Wymeersch, H.; Seco-Granados, G.; Destino, G.; Dardari, D.; Tufvesson, F. 5G mmWave positioning for vehicular networks. IEEE Wirel. Commun. 2017, 24, 80–86. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Khalil, A.; Hasbullah, I.H. Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey. IEEE Access 2021, 9, 121522–121531. [Google Scholar] [CrossRef]
- Ge, X.; Li, Z.; Li, S. 5G software defined vehicular networks. IEEE Commun. Mag. 2017, 55, 87–93. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 2022, 22, 1696. [Google Scholar] [CrossRef]
- Alazzawi, M.A.; Al-behadili, H.A.; Srayyih Almalki, M.N.; Challoob, A.L.; Al-shareeda, M.A. Id-ppa: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network. In Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia, 8–9 December 2020; pp. 80–94. [Google Scholar]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks. Appl. Sci. 2022, 12, 1383. [Google Scholar] [CrossRef]
- Cincilla, P.; Hicham, O.; Charles, B. Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios. In Proceedings of the IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, 8–10 December 2016; pp. 1–8. [Google Scholar]
- Huang, D.; Misra, S.; Verma, M.; Xue, G. PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2011, 12, 736–746. [Google Scholar] [CrossRef]
- Joshi, A.; Gaonkar, P.; Bapat, J. A reliable and secure approach for efficient car-to-car communication in intelligent transportation systems. In Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 1617–1620. [Google Scholar]
- Lu, R.; Lin, X.; Luan, T.H.; Liang, X.; Shen, X. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 2011, 61, 86–96. [Google Scholar] [CrossRef]
- Thenmozhi, T.; Somasundaram, R. Pseudonyms based blind signature approach for an improved secured communication at social spots in VANETs. Wirel. Pers. Commun. 2015, 82, 643–658. [Google Scholar] [CrossRef]
- Rajput, U.; Abbas, F.; Oh, H. A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access 2016, 4, 7770–7784. [Google Scholar] [CrossRef]
- Asghar, M.; Doss, R.R.M.; Pan, L. A scalable and efficient PKI based authentication protocol for VANETs. In Proceedings of the 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, NSW, Australia, 21–23 November 2018; pp. 1–3. [Google Scholar]
- Förster, D.; Kargl, F.; Löhr, H. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). In Proceedings of the IEEE Vehicular Networking Conference (VNC), Paderborn, Germany, 3–5 December 2014; pp. 25–32. [Google Scholar]
- Sun, Y.; Zhang, B.; Zhao, B.; Su, X.; Su, J. Mix-zones optimal deployment for protecting location privacy in VANET. Peer -Peer Netw. Appl. 2015, 8, 1108–1121. [Google Scholar] [CrossRef]
- Shao, J.; Lin, X.; Lu, R.; Zuo, C. A Threshold Anonymous Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 2015, 65, 1711–1720. [Google Scholar] [CrossRef]
- Alimohammadi, M.; Pouyan, A.A. Sybil attack detection using a low cost short group signature in VANET. In Proceedings of the 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), Rasht, Iran, 8–10 September 2015; pp. 23–28. [Google Scholar]
- Zhang, L.; Wu, Q.; Qin, B.; Domingo-Ferrer, J.; Liu, B. Practical secure and privacy-preserving scheme for value-added applications in VANETs. Comput. Commun. 2015, 71, 50–60. [Google Scholar] [CrossRef]
- Cui, J.; Wang, Y.; Zhang, J.; Xu, Y.; Zhong, H. Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad hoc Networks. IEEE Trans. Veh. Technol. 2020, 69, 8914–8924. [Google Scholar] [CrossRef]
- Lim, K.; Tuladhar, K.M.; Wang, X.; Liu, W. A scalable and secure key distribution scheme for group signature based authentication in VANET. In Proceedings of the IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, USA, 19–21 October 2017; pp. 478–483. [Google Scholar]
- Zhang, C.; Lu, R.; Lin, X.; Ho, P.H.; Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 246–250. [Google Scholar]
- Lee, C.C.; Lai, Y.M. Toward a secure batch verification with group testing for VANET. Wirel. Netw. 2013, 19, 1441–1449. [Google Scholar] [CrossRef]
- Bayat, M.; Barmshoory, M.; Rahimi, M.; Aref, M.R. A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 2015, 21, 1733–1743. [Google Scholar] [CrossRef]
- Jianhong, Z.; Min, X.; Liying, L. On the security of a secure batch verification with group testing for VANET. Int. J. Netw. Secur. 2014, 16, 351–358. [Google Scholar]
- Zhang, L.; Wu, Q.; Domingo-Ferrer, J.; Qin, B.; Hu, C. Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 2016, 18, 516–526. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
- Wu, L.; Fan, J.; Xie, Y.; Wang, J.; Liu, Q. Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717700899. [Google Scholar] [CrossRef]
- Cui, J.; Xu, W.; Han, Y.; Zhang, J.; Zhong, H. Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Veh. Commun. 2020, 21, 100200. [Google Scholar] [CrossRef]
- Cui, J.; Chen, J.; Zhong, H.; Zhang, J.; Liu, L. Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2022, 23, 1247–1259. [Google Scholar] [CrossRef]
- Cui, J.; Zhang, X.; Zhong, H.; Ying, Z.; Liu, L. RSMA: Reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks. IEEE Internet Things J. 2019, 6, 6417–6428. [Google Scholar] [CrossRef]
- Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P.H.; Héam, P.C.; Kouchnarenko, O.; Mantovani, J.; et al. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of the International Conference on Computer Aided Verification, Edinburgh, UK, 6–10 July 2005; pp. 281–285. [Google Scholar]
- Glouche, Y.; Genet, T.; Heen, O.; Courtay, O. A security protocol animator tool for AVISPA. In Proceedings of the ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa, Italy, 18–20 May 2006. [Google Scholar]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Roychoudhury, P.; Roychoudhury, B.; Saikia, D.K. Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput. Commun. 2018, 127, 146–157. [Google Scholar] [CrossRef]
Notations | Definition |
---|---|
TA | The trusted authority |
5G-BS | The 5G-base station |
OBU | The onboard unit |
TPD | The tamper-proof device |
The system parameters | |
P | A large prime |
The original identity of vehicle | |
h | The hash function based on the chaotic map |
A short valid period | |
An inter-pseudonym identity | |
The time of arriving | |
The time of predefined delay | |
The current timestamp | |
|| | The concatenation operation |
⊕ | The exclusive-OR operation |
Schemes | src1 | src2 | src3 | src4 | src5 | src6 | src7 | src8 | src9 |
---|---|---|---|---|---|---|---|---|---|
Bayat et al. [25] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ |
Jianhong et al. [26] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ |
He et al. [28] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ |
Wu et al. [29] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ |
Our work | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Operations | Description | Time (ms) |
---|---|---|
The runtime of the BPC operation (S, T). | 1.537 | |
The runtime of a Point-to-Map hashing operation for the BPC. | 0.937 | |
The runtime of a scale multiplication operation for the ECC. | 0.715 | |
The runtime of the Chebyshev’s polynomial mapping operation. | 0.341 |
Schemes | Signing Messages | Verifying Messages |
---|---|---|
Bayat et al. [25] | ms | ms |
Jianhong et al. [26] | ms | ms |
He et al. [28] | ms | ms |
Wu et al. [29] | ms | ms |
Cui et al. [31] | ms | ms |
Our work | ms | ms |
Schemes | Signing Messages | Verifying Messages |
---|---|---|
Bayat et al. [25] | 27.21% | 81.65% |
Jianhong et al. [26] | 27.21% | 77.81% |
He et al. [28] | 68.21% | 52.32% |
Wu et al. [29] | 52.31% | 64.23 |
Cui et al. [31] | 68.21% | 52.32% |
Schemes | Message Tuple | Size of Tuple (Bits) | Improvement |
---|---|---|---|
Bayat et al. [25] | { } | 1024 + 160 + 160 + 32 = 1376 | 74.42% |
Jianhong et al. [26] | { } | 1024 + 160 + 160 + 32 = 1376 | 74.42% |
He et al. [28] | {} | 320 + 160 + 32 + 320 + 160 = 992 | 64.52% |
Wu et al. [29] | { } | 320 + 32 + 32 + 160 + 320 +160 = 1024 | 65.63% |
Cui et al. [31] | {} | 320+320+160+160 +32 = 992 | 64.52% |
Our work | {, , } | 160 + 32 + 160 = 352 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al-Shareeda, M.A.; Manickam, S.; Mohammed, B.A.; Al-Mekhlafi, Z.G.; Qtaish, A.; Alzahrani, A.J.; Alshammari, G.; Sallam, A.A.; Almekhlafi, K. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks. Appl. Sci. 2022, 12, 5939. https://0-doi-org.brum.beds.ac.uk/10.3390/app12125939
Al-Shareeda MA, Manickam S, Mohammed BA, Al-Mekhlafi ZG, Qtaish A, Alzahrani AJ, Alshammari G, Sallam AA, Almekhlafi K. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks. Applied Sciences. 2022; 12(12):5939. https://0-doi-org.brum.beds.ac.uk/10.3390/app12125939
Chicago/Turabian StyleAl-Shareeda, Mahmood A., Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, and Khalil Almekhlafi. 2022. "Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks" Applied Sciences 12, no. 12: 5939. https://0-doi-org.brum.beds.ac.uk/10.3390/app12125939