Chahal, R. K., Kumar, N., and Batra, S. (2020). Trust
management in social internet of things: A taxonomy,
open issues, and challenges. Computer Communica-
tions, 150:13–46.
European Telecommunications Standards Institute (2014).
ETSI EN 302 637-2: Intelligent Transport Sys-
tems (ITS); Vehicular Communications; Basic Set
of Applications; Part 2: Specification of Coopera-
tive Awareness Basic Service. https://www.etsi.org/
standards. Accessed: 2022-05-15.
European Telecommunications Standards Institute (2021).
ETSI TS 102 940 V2.1.1: Intelligent Transport Sys-
tems (ITS); Security; ITS communications security ar-
chitecture and security management; Release 2. https:
//www.etsi.org/standards. Accessed: 2022-11-18.
F
¨
orster, D., Kargl, F., and L
¨
ohr, H. (2014). Puca: A
pseudonym scheme with user-controlled anonymity
for vehicular ad-hoc networks (vanet). In 2014 IEEE
Vehicular Networking Conference (VNC), pages 25–
32.
Galego, N. M. C. and Pascoal, R. M. (2022). Cybersecurity
in smart cities: Technology and data security in intel-
ligent transport systems. In Mesquita, A., Abreu, A.,
and Carvalho, J. V., editors, Perspectives and Trends
in Education and Technology, pages 17–33, Singa-
pore. Springer Singapore.
Gangolli, A., Mahmoud, Q. H., and Azim, A. (2022). A
systematic review of fault injection attacks on iot sys-
tems. Electronics, 11(13).
Gupta, M., Bhatt, S., Alshehri, A. H., and Sandhu, R.
(2022). Authorization Frameworks for Smart and
Connected Ecosystems, pages 39–61. Springer Inter-
national Publishing, Cham.
Hammi, B., Monteuuis, J.-P., and Petit, J. (2022). Pkis in
c-its: Security functions, architectures and projects: A
survey. Vehicular Communications, 38:100531.
Heng, X., Qin, S., Xiao, Y., Wang, J., Tao, Y., and Zhang,
R. (2022). A strong secure v2i authentication scheme
from pki and accumulator. In 2022 2nd International
Conference on Consumer Electronics and Computer
Engineering (ICCECE), pages 98–103.
Khan, A., Ahmad, A., Ahmed, M., Sessa, J., and Anisetti,
M. (2022). Authorization schemes for internet
of things: requirements, weaknesses, future chal-
lenges and trends. Complex & Intelligent Systems,
8(5):3919–3941.
Khan, W. Z., Hakak, S., Khan, M. K., et al. (2020). Trust
management in social internet of things: Architec-
tures, recent advancements, and future challenges.
IEEE Internet of Things Journal, 8(10):7768–7788.
Lauinger, J., Ernstberger, J., Regnath, E., Hamad, M., and
Steinhorst, S. (2021). A-poa: Anonymous proof of
authorization for decentralized identity management.
In 2021 IEEE International Conference on Blockchain
and Cryptocurrency (ICBC), pages 1–9.
Mitsunari, S. (2019). ”MCL cryptolibrary”. https://github.
com/herumi/mcl.
Ometov, A., Masek, P., Malina, L., Florea, R., Hosek,
J., Andreev, S., Hajny, J., Niutanen, J., and Kouch-
eryavy, Y. (2016). Feasibility characterization of cryp-
tographic primitives for constrained (wearable) iot de-
vices. In 2016 IEEE International Conference on
Pervasive Computing and Communication Workshops
(PerCom Workshops), pages 1–6.
Polychronou, N.-F., Thevenon, P.-H., Puys, M., and
Beroulle, V. (2021). A comprehensive survey of
attacks without physical access targeting hardware
vulnerabilities in iot/iiot devices, and their detection
mechanisms. ACM Trans. Des. Autom. Electron. Syst.,
27(1).
Ravidas, S., Lekidis, A., Paci, F., and Zannone, N. (2019).
Access control in internet-of-things: A survey. Jour-
nal of Network and Computer Applications, 144:79–
101.
Sadhu, P. K., Yanambaka, V. P., and Abdelgawad, A.
(2022). Internet of things: Security and solutions sur-
vey. Sensors, 22(19).
Salin, H. and Fokin, D. (2022). An authenticated accumula-
tor scheme for secure master key access in microser-
vice architectures. In Bastieri, D., Wills, G. B., Kac-
suk, P., and Chang, V., editors, Proceedings of the 7th
International Conference on Internet of Things, Big
Data and Security, IoTBDS 2022, Online Streaming,
April 22-24, 2022, pages 119–126. SCITEPRESS.
Salin, H., Fokin, D., and Johansson, A. (2021). Authen-
ticated multi-proxy accumulation schemes for dele-
gated membership proofs. In Luo, B., Mosbah, M.,
Cuppens, F., Othmane, L. B., Cuppens, N., and Kallel,
S., editors, Risks and Security of Internet and Systems
- 16th International Conference, CRiSIS 2021, Virtual
Event, Ames, USA, November 12-13, 2021, Revised
Selected Papers, volume 13204 of Lecture Notes in
Computer Science, pages 162–171. Springer.
Shahab, S., Agarwal, P., Mufti, T., and Obaid, A. J. (2022).
Siot (social internet of things): A review. In Fong, S.,
Dey, N., and Joshi, A., editors, ICT Analysis and Ap-
plications, pages 289–297, Singapore. Springer Na-
ture Singapore.
Sharma, A., Pilli, E. S., Mazumdar, A. P., and Gera, P.
(2020). Towards trustworthy internet of things: A sur-
vey on trust management applications and schemes.
Computer Communications, 160:475–493.
Valle, F., Cooney, M., Mikhaylov, K., and Vinel, A. (2021).
The integration of uavs to the c-its stack. In 2021 IEEE
29th International Conference on Network Protocols
(ICNP), pages 1–6.
Zeddini, B., Maachaoui, M., and Inedjaren, Y. (2022). Se-
curity threats in intelligent transportation systems and
their risk levels. Risks, 10(5).
Zuo, X., Li, L., Luo, S., Peng, H., Yang, Y., and Gong,
L. (2021). Privacy-preserving verifiable graph inter-
section scheme with cryptographic accumulators in
social networks. IEEE Internet of Things Journal,
8(6):4590–4603.
AccA: A Decentralized and Accumulator-Based Authentication and Authorization Architecture for Autonomous IoT in Connected
Infrastructures
177