Filters








16 Hits in 7.0 sec

Table of contents

2021 IEEE Internet of Things Journal  
Ma 636 A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Martini 596 FMAC: A Self-Adaptive MAC Protocol for Flocking of Flying Ad Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2020.3042911 fatcat:wi6ehljchvhjdf3zpjxwug6z3u

Privacy-Preserving Solutions in Blockchain-Enabled Internet of Vehicles

Konstantinos Kaltakis, Panagiota Polyzi, George Drosatos, Konstantinos Rantos
2021 Applied Sciences  
Moreover, it provides suggestions to researchers for future work in the field of privacy-preserving blockchain-enabled solutions for vehicular networks.  ...  Blockchain technology can inherently guarantee the availability, integrity and immutability of data stored in IoV, yet it cannot protect privacy and data confidentiality on its own.  ...  IoV is also a superset of Vehicular Ad-Hoc Networks (VANETs) and extends its scale and services [2] .  ... 
doi:10.3390/app11219792 fatcat:3yh7w3xqdzedrdwsiyndhq7j4e

Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D. Manivannan, Shafika Showkat Moni, Sherali Zeadally
2020 Vehicular Communications  
Acknowledgement We thank the editor and the reviewers for their valuable comments, which helped us greatly in improving the content and presentation of the paper.  ...  warnings, are ready for the widespread deployment in Vehicular Ad-hoc NETworks (VANETs).  ...  : United States Department of Transportation V2I: Vehicle to Infrastructure V2V: Vehicle to Vehicle VANET: Vehicular Ad-hoc Network VHN: Vehicular Heterogeneous Networks VPKI: Vehicular Public Key Infrastructure  ... 
doi:10.1016/j.vehcom.2020.100247 fatcat:5h6t2z5mufgshpaojyp3xbrana

APPAS:A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs

Tianhan Gao, Xinyang Deng, Qingshan Li, Mario Collotta, Ilsun You
2019 IEEE Access  
Vehicular social networks (VSNs) provide a variety of services for users based on social relationships through vehicular ad hoc networks (VANETs).  ...  In this paper, a privacy-preserving scheme based on the pseudonym ring in VSNs is proposed. Hierarchical network architecture and trust model are established.  ...  In this paper, we propose a privacy-preserving authentication scheme based on pseudonym ring in VSNs (APPAS).  ... 
doi:10.1109/access.2019.2900593 fatcat:ldem5jmm3rbq5gxgrwswgvij4i

Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey [article]

Muhammad Baqer Mollah, Jun Zhao, Dusit Niyato, Yong Liang Guan, Chau Yuen, Sumei Sun, Kwok-Yan Lam, Leong Hai Koh
2020 arXiv   pre-print
In this paper, we present a contemporary survey on the latest advancement in blockchain for IoV.  ...  By allowing the development of a common information exchange platform between vehicles and heterogeneous vehicular networks, this integration aims to create a better environment and public space to the  ...  Nevertheless, most of the aforesaid aspects are almost common with vehicular ad hoc network scenarios.  ... 
arXiv:2007.06022v1 fatcat:j7zjypmq3jhzjeqejeedjgdepa

IOV Privacy Protection System Based on Double-Layered Chains

Yin Ru Chen, Jin Rui Sha, Zhi Hong Zhou
2019 Wireless Communications and Mobile Computing  
Specifically, an IOV double-layered chain model is constructed to simulate a semicentralized system that is convenient for government to supervise; also, a RSA protocol based on zero-knowledge proof (ZKP  ...  Taking an aim of solving this problem, a privacy protection system on double-layered chain basis is designed to eliminate the said security risk during vehicle data communication.  ...  Hu et al. introduces an efficient privacy-preserving protocol with confidentiality for vehicular ad hoc networks based on group signcryption [9] .  ... 
doi:10.1155/2019/3013562 fatcat:u2qcxiqndndubo43av54rz4coa

A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions [article]

Brian Hildebrand, Mohamed Baza, Tara Salman, Fathi Amsaad, Abdul Razaqu, Abdullah Alourani
2022 arXiv   pre-print
Blockchain technology has been emerged as a decentralized approach for enhanced security without depending on trusted third parties to run services.  ...  In this work, we present the state-of-the-art of Blockchain-enabled IoVs (BIoV) with a particular focus on their applications such as crowdsourcing-based applications, energy trading, traffic congestion  ...  IoV is a vehicular ad hoc network (VANET) that has been connected to the Internet [23] .  ... 
arXiv:2203.10708v1 fatcat:sozptzz5l5a27oh5rukujcg32a

Internet of things security: A top-down survey

Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef
2018 Computer Networks  
Finally, we give a general classification of existing solutions and comparison based on important parameters.  ...  This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors.  ...  It is the case, for example, of AMI in smart grids and ad-hoc infrastructures in Vehicular Networks. In [6] , authors interested in healthcare applications.  ... 
doi:10.1016/j.comnet.2018.03.012 fatcat:xbczp44t6neqxcfy74q6rsvuci

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
Revocable Data-Sharing Scheme in VANETs; TVT Dec. 2020 15933-15946 Hoseini, S.A., Ding, M., Hassan, M., and Chen, Y., Analyzing the Impact of Molecular Re-Radiation on the MIMO Capacity in High-Frequency  ...  + Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex  ...  ., +, TVT May 2020 5403-5415 Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma

All One Needs to Know about Fog Computing and Related Edge Computing Paradigms

Ashkan Yousefpour, Caleb Fung, Tam Nguyen, Krishna Kadiyala, Fatemeh Jalali, Amirreza Niakanlahiji, Jian Kong, Jason P. Jue
2019 Journal of systems architecture  
Next, we provide a taxonomy of research topics in fog computing, and through a comprehensive survey, we summarize and categorize the efforts on fog computing and its related computing paradigms.  ...  In this paper, we first provide a tutorial on fog computing and its related computing paradigms, including their similarities and differences.  ...  The authors in [421] propose a privacy-preserving protocol for vehicular road surface condition monitoring.  ... 
doi:10.1016/j.sysarc.2019.02.009 fatcat:udonbl6rerfwdap2psex7ryloa

Privacy-preserving Communication for Vehicular with Multi Receiver Conditionally Anonymous Ring Signcryption

Qian Wang, Mingxing He, Xiao Zheng
2016 Proceedings of the 2016 3rd International Conference on Materials Engineering, Manufacturing Technology and Control   unpublished
In this paper, we propose a privacy preserving protocol based on multi -receiver conditional anonymous ring signcryption.  ...  The protocol does not depend on any fully trusted authority during the tracing phase.  ...  The literature [3, 4] presented scheme based on the pseudonym, although the pseudonym signature scheme can let users privacy be protected, but each a set of pseudonyms for a period of time to be replaced  ... 
doi:10.2991/icmemtc-16.2016.96 fatcat:pysy4jjhxrapzggzp5grezqbg4

2020 Index IEEE Systems Journal Vol. 14

2020 IEEE Systems Journal  
., +, JSYST Dec. 2020 5176-5186 Ad hoc networks Agent Pseudonymous Authentication-Based Conditional Privacy Preserva- tion: An Emergent Intelligence Technique.  ...  ., +, JSYST March 2020 298-309 A Novel Privacy-Preserving Authentication Scheme for V2G Networks.  ...  ., +, 2585 -2588 Energy-Efficient IoT-Fog-Cloud Architectural Paradigm for Real-Time Wildfire Prediction and Forecasting. 2003 -2011 Agent Pseudonymous Authentication-Based Conditional Privacy Preservation  ... 
doi:10.1109/jsyst.2021.3054547 fatcat:zf2aafvnfzbeje32qei5563myu

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  ., +, JIoT June 1, 2021 8865-8882 A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks.  ...  ., +, JIoT Jan. 15, 2021 778-790 Digital signatures A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+70 others)
2015 International Journal of Network Security   unpublished
In 2007, Camenisch, Neven and Shelat proposed an adap-tive oblivious transfer (OT) scheme in which a sender has n messages, of which a receiver can adaptively choose to receive k one-after-the-other.  ...  In this paper, we show that the scheme has a drawback that the sender can serve a single receiver only once. The drawback results from the deterministic encryption used.  ...  The authors gratefully acknowledge the anonymous reviewers for their valuable comments. Acknowledgement We would like to thank the anonymous reviewers for their valuable comments and suggestions.  ... 
fatcat:tup6p3z7pzc4dpeyn3blmj3foi

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2017 International Journal of Network Security   unpublished
A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding is proposed.  ...  This scheme firstly employed Wang and Su's sharing scheme to share a secret image into n shadows.  ...  In Acknowledgement The authors would like to thank the anonymous reviewers for their useful comments.  ... 
fatcat:btwmayvuhzbotmhejwow3wbldq
« Previous Showing results 1 — 15 out of 16 results