Secure crowd-sensing protocol for fog-based vehicular cloud
Tóm tắt
Từ khóa
Tài liệu tham khảo
Y. Wang, Huge data for connected vehicles (white paper).
Ding, 2018, Smart cities on wheels: A newly emerging vehicular cognitive capability harvesting network for data transportation, IEEE Wirel. Commun., 25, 160, 10.1109/MWC.2017.1700151
Ni, 2017, Security, privacy, and fairness in fog-based vehicular crowdsensing, IEEE Commun. Mag., 55, 146, 10.1109/MCOM.2017.1600679
Gong, 2016, Optimal task recommendation for mobile crowdsourcing with privacy control, IEEE Internet Things J., 3, 745, 10.1109/JIOT.2015.2512282
Olariu, 2013, The next paradigm shift: from vehicular networks to vehicular clouds, Mob. Ad Hoc Netw. Cut. Edge Dir., 56, 645, 10.1002/9781118511305.ch19
Nkenyereye, 2019, Towards secure and privacy preserving collision avoidance system in 5g fog based internet of vehicles, Future Gener. Comput. Syst., 95, 488, 10.1016/j.future.2018.12.031
Bonomi, 2012, Fog computing and its role in the internet of things, 13
Pereira, 2019, Assessing the reliability of fog computing for smart mobility applications in vanets, Future Gener. Comput. Syst., 94, 317, 10.1016/j.future.2018.11.043
Sarkar, 2016, Theoretical modelling of fog computing: A green computing paradigm to support iot applications, Iet Netw., 5, 23, 10.1049/iet-net.2015.0034
Zhang, 2018, Security and trust issues in fog computing: A survey, Future Gener. Comput. Syst., 88, 16, 10.1016/j.future.2018.05.008
Xiao, 2018, Mobile crowdsensing games in vehicular networks, IEEE Trans. Veh. Technol., 67, 1535, 10.1109/TVT.2016.2647624
Khelifi, 2019, Named data networking in vehicular ad hoc networks: State-of-the-art and challenges, IEEE Commun. Surv. Tutor., 22, 320, 10.1109/COMST.2019.2894816
Khelifi, 2020, A blockchain-based architecture for secure vehicular named data networks, Comput. Electr. Eng., 86, 10.1016/j.compeleceng.2020.106715
Bilal, 2014, Time aware least recent used (tlru) cache management policy in icn, 528
Bilal, 2017, A cache management scheme for efficient content eviction and replication in cache networks, IEEE Access, 5, 1692, 10.1109/ACCESS.2017.2669344
Kang, 2018, Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles, IEEE Trans. Intell. Transp. Syst., 19, 2627, 10.1109/TITS.2017.2764095
Yao, 2019, Reliable and secure vehicular fog service provision, IEEE Internet Things J., 6, 734, 10.1109/JIOT.2018.2855718
Benzaid, 2016, Fast authentication in wireless sensor networks, Future Gener. Comput. Syst., 55, 362, 10.1016/j.future.2014.07.006
Yassine, 2020, Cloudlet-based intelligent auctioning agents for truthful autonomous electric vehicles energy crowdsourcing, IEEE Trans. Veh. Technol., 69, 5457, 10.1109/TVT.2020.2979941
Lèbre, 2020, Efficient vehicular crowdsourcing models in vanet for disaster management, 1
Li, 2017, Capability-based security enforcement in named data networking, IEEE/ACM Trans. Netw., 25, 2719, 10.1109/TNET.2017.2715822
Misra, 2017, Accconf: An access control framework for leveraging in-network cached data in the icn-enabled wireless edge, IEEE Trans. Dependable Secure Comput., 16, 5, 10.1109/TDSC.2017.2672991
Li, 2016, Attribute-based access control for icn naming scheme, IEEE Trans. Dependable Secure Comput., 15, 194, 10.1109/TDSC.2016.2550437
Venkatraman, 2018, Use of data visualisation for zero-day malware detection, Secur. Commun. Netw., 2018, 1, 10.1155/2018/1728303
Jiang, 2016, Ciphertext-policy attribute based encryption supporting access policy update, 39
Huang, 2017, Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, IEEE Access, 5, 12941, 10.1109/ACCESS.2017.2727054
Tan, 2018, Comment on secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, IEEE Access, 6, 22464, 10.1109/ACCESS.2018.2827698
Sun, 2019, Security and privacy preservation in fog-based crowd sensing on the internet of vehicles, J. Netw. Comput. Appl., 134, 89, 10.1016/j.jnca.2019.02.018
Altayeb, 2013, A survey of vehicular ad hoc networks routing protocols, Int. J. Innov. Appl. Stud., 3, 829
Mohammad, 2011, Vanet architectures and protocol stacks: a survey, 95
R. Yu, Y. Zhang, S. Gjessing, W. Xia, K. Yang, Toward cloud-based vehicular networks with efficient resource management, arXiv preprint arXiv:1308.6208.
Kenney, 2011, Dedicated short-range communications (dsrc) standards in the united states, Proc. IEEE, 99, 1162, 10.1109/JPROC.2011.2132790
Olariu, 2011, Taking vanet to the clouds, Int. J. Pervasive Comput. Commun., 7, 7, 10.1108/17427371111123577
Eltoweissy, 2010, Towards autonomous vehicular clouds, 1
Hussain, 2014, Cooperation-aware vanet clouds: Providing secure cloud services to vehicular ad hoc networks, JIPS, 10, 103
Lee, 2014, Vehicular cloud networking: architecture and design principles, IEEE Commun. Mag., 52, 148, 10.1109/MCOM.2014.6736756
Lee, 2015, S-itsf: a service based intelligent transportation system framework for smart accident management, Human-centric Comput. Inf. Sci., 5, 34, 10.1186/s13673-015-0054-x
Alazab, 2020, Intelligent mobile malware detection using permission requests and api calls, Future Gener. Comput. Syst., 107, 509, 10.1016/j.future.2020.02.002
Mutlag, 2019, Enabling technologies for fog computing in healthcare iot systems, Future Gener. Comput. Syst., 90, 62, 10.1016/j.future.2018.07.049
P.G.V. Naranjo, Z. Pooranian, M. Shojafar, M. Conti, R. Buyya, Focan: A fog-supported smart city network architecture for management of applications in the internet of everything environments, J. Parallel Distrib. Comput.
Zhang, 2018, Data driven business rule generation based on fog computing, Future Gener. Comput. Syst., 89, 494, 10.1016/j.future.2018.07.003
Tang, 2019, Big data for cybersecurity: Vulnerability disclosure trends and dependencies, IEEE Trans. Big Data, 5, 317, 10.1109/TBDATA.2017.2723570
Yi, 2015, A survey of fog computing: concepts, applications and issues, 37
Lai, 2019, Efficient data request answering in vehicular ad-hoc networks based on fog nodes and filters, Future Gener. Comput. Syst., 93, 130, 10.1016/j.future.2018.09.065
Wazid, 2019, Design of secure key management and user authentication scheme for fog computing services, Future Gener. Comput. Syst., 91, 475, 10.1016/j.future.2018.09.017
Kai, 2016, Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues, J. China Univ. Posts Telecommun., 23, 56, 10.1016/S1005-8885(16)60021-3
Mota, 2018, Towards scalable mobile crowdsensing through device-to-device communication, J. Netw. Comput. Appl., 122, 99, 10.1016/j.jnca.2018.08.010
H. Shen, G. Bai, Y. Hu, T. Wang, P2ta: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing, J. Syst. Archit.
Zhan, 2018, Incentive mechanism in platform-centric mobile crowdsensing: A one-to-many bargaining approach, Comput. Netw., 132, 40, 10.1016/j.comnet.2017.12.013
Alazab, 2014, A hybrid wrapper-filter approach for malware detection, J. Netw., 9, 2878
Li, 2016, Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage, IEEE Trans. Serv. Comput., 10, 715, 10.1109/TSC.2016.2542813
J. Li, Y. Wang, Y. Zhang, J. Han, Full verifiability for outsourced decryption in attribute based encryption, IEEE Trans. Serv. Comput.
Hussain, 2018, Secure and privacy-aware incentives-based witness service in social internet of vehicles clouds, IEEE Internet Things J., 5, 2441, 10.1109/JIOT.2018.2847249
Li, 2016, Flexible and fine-grained attribute-based data storage in cloud computing, IEEE Trans. Serv. Comput., 10, 785, 10.1109/TSC.2016.2520932
Li, 2017, User collusion avoidance cp-abe with efficient attribute revocation for cloud storage, IEEE Syst. J., 12, 1767, 10.1109/JSYST.2017.2667679
Bilal, 2020, Secure distribution of protected content in information-centric networking, IEEE Syst. J., 14, 1921, 10.1109/JSYST.2019.2931813
Bilal, 2019, Network-coding approach for information-centric networking, IEEE Syst. J., 13, 1376, 10.1109/JSYST.2018.2862913
Barka, 2018, Behavior-aware uav-assisted crowd sensing technique for urban vehicular environments, 1
Choon, 2003, An identity-based signature from gap diffie-hellman groups, 18
Boneh, 2001, Identity-based encryption from the weil pairing, 213
Boneh, 2005, Hierarchical identity based encryption with constant size ciphertext, 440
Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89
Cheung, 2007, Provably secure ciphertext policy abe, 456
Delerablée, 2008, Dynamic threshold public-key encryption, 317
Nkenyereye, 2015, A fine-grained privacy preserving protocol over attribute based access control for vanets, JoWUA, 6, 98
E. Yeh, J. Choi, N. Prelcic, C. Bhat, R. Heath Jr, Security in automotive radar and vehicular networks, Microw. J.
He, 2015, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks, IEEE Trans. Inf. Forensics Secur., 10, 2681, 10.1109/TIFS.2015.2473820
K. Xue, P. He, X. Zhang, Q. Xia, D.S. Wei, H. Yue, F. Wu, A secure, efficient, and accountable edge-based access control framework for information centric networks, IEEE/ACM Trans. Netw.