A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Vehicular Visible Light Communications
[chapter]
2017
Visible Light Communications
As phase information is prone to distortions for mobility scenarios, sole dependence on signal intensity of IM/DD scheme also makes VLC a promising technology for vehicular communications. ...
wireless communication is proposed as a complementary technology for vehicular connectivity. ...
SecVLC stands for cryptographic key generation/management where vehicles use IR to share a secret key. ...
doi:10.5772/intechopen.69536
fatcat:5e2mli4nuzauni63qvq2zjwzk4
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing
2016
Entropy
and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc. ...
algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection ...
In the next paper [8] , entitled "Comparing Security Notions of Secret Sharing Schemes", Songsong Dai and Donghui Guo study the relations of several security notions for secret sharing schemes defined ...
doi:10.3390/e18090334
fatcat:vxubyrnfrrhdzgedsufoews4gq
A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks
[article]
2022
arXiv
pre-print
We analyze around 75 blockchain-based security schemes for vehicular networks from an application, security, and blockchain perspective. ...
The application perspective focuses on various applications which use secure blockchain-based vehicular networks such as transportation, parking, data sharing/ trading, and resource sharing. ...
Security schemes can use random secrets along with the session-specific secrets to ensure that there is a different session key for every session. ...
arXiv:2201.04803v1
fatcat:yhm4umjt45ho5fu7mbeu7g66sq
A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks
2022
Security and Communication Networks
The security of these techniques requires a common secret key to be shared between the communicating entities or depend upon the premise that some mathematical problems are computationally hard. ...
Many cryptographic techniques have been proposed to conceive a secure and privacy-oriented vehicular ad hoc network (VANET) for its practical deployment. ...
Use of the movable fog node by Ref. [49] for efficient V2V communication and traffic-related issues also have been proposed. A hybrid framework for vehicular cloud using fog computing in Ref. ...
doi:10.1155/2022/4280617
fatcat:7xmbgns7ajgfrpnaxcsmfg5wby
A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks
2020
Sensors
Encryption is a common method to guarantee the security of vehicle data in the process of data dissemination and computation. However, encrypted vehicle data cannot be analyzed easily and flexibly. ...
Next, we present the framework, communication domains, wireless access technologies and cyber-security issues of VANETs. ...
Acknowledgments: We thank the reviewers for their detailed reviews and constructive comments, which have helped to greatly improve the quality of this paper. ...
doi:10.3390/s20154253
pmid:32751627
fatcat:2m2lw3vutbh4tbynvotylachye
6G for Vehicle-to-Everything (V2X) Communications: Enabling Technologies, Challenges, and Opportunities
[article]
2022
arXiv
pre-print
Aiming for truly intelligent transportation systems, we envision that machine learning will play an instrumental role for advanced vehicular communication and networking. ...
To this end, we provide an overview on the recent advances of machine learning in 6G vehicular networks. ...
For example, the use of quantum federated learning to securely execute learning tasks among vehicles can be an important use case [59] . ...
arXiv:2012.07753v2
fatcat:u5edqsewbzgthlkgc3nooqmdo4
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
2018
Cryptography
This may be an advantage when designing security architectures for energy-restricted devices. ...
The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. ...
Acknowledgments: This work was funded by VTT's Cyber Security and Future Communications Growth Area programs. ...
doi:10.3390/cryptography2010005
fatcat:dngahpmopbgtxonuawmwiiiuky
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios
2017
IEEE Transactions on Mobile Computing
Securing a wireless channel between any two vehicles is a crucial component of vehicular networks security. This can be done by using a secret key to encrypt the messages. ...
We propose a scheme to allow two cars to extract a shared secret from RSSI (Received Signal Strength Indicator) values in such a way that nearby cars cannot obtain the same key. ...
CONCLUSIONS AND FUTURE WORK We consider extracting a shared secret key for two vehicles communicating over a wireless channel. ...
doi:10.1109/tmc.2016.2557784
fatcat:fgxji2eydbbzlnw4b2rdbno3qe
6G for Vehicle-to-Everything (V2X) Communications: Enabling Technologies, Challenges, and Opportunities
2022
Proceedings of the IEEE
This article provides a comprehensive overview of the scientific and technological advances that have the capability to shape future 6G vehicle-to-everything (6G-V2X) communications. ...
For example, the use of quantum federated learning to securely execute learning tasks among vehicles can be an important use case [59] . ...
spectrum sharing approach, which has the potential to provide secure, smarter, low-cost, and highly efficient decentralized spectrum sharing [54] . ...
doi:10.1109/jproc.2022.3173031
fatcat:vo37ywop6babtmnl7nnq3kmgqa
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions
[article]
2022
arXiv
pre-print
Lastly, a number of open issues and challenges as well as future opportunities in the area of AI-enabled BIoV, hardware-assisted security for BIoV and quantum computing attacks on BIoV. ...
Blockchain technology has been emerged as a decentralized approach for enhanced security without depending on trusted third parties to run services. ...
Authors here used a private proximity test with location information for generating a unique secret key which is used between passenger and driver. ...
arXiv:2203.10708v1
fatcat:sozptzz5l5a27oh5rukujcg32a
Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap
[article]
2022
arXiv
pre-print
This paper helps to identify existing trends by establishing a layered architecture along with a life cycle and an ecosystem for privacy-preserving cloud systems in addition to identifying the existing ...
Cloud computing is important because it allows for scalability, adaptability, and improved security. ...
Privacy and reliability in cloud storage environments can be achieved using encryption schemes proposed by the authors of [246] such as BP-XOR secret sharing or LDPC secret sharing. ...
arXiv:2204.11120v1
fatcat:tx75pckegjgqxg6tiibptiazbi
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
2021
IEEE Access
In this paper, an up-to-date privacy method mapping and relevant use cases are surveyed for II services. ...
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs. ...
[259] proposed an efficient ABE scheme based on the learning with errors over rings (R-LWE).
9) QUANTUM-RESISTANT SECURE MULTI-PARTY COMPUTATION Quantum-resistant secure multi-party computation has ...
doi:10.1109/access.2021.3062201
fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments
2021
IEEE Access
The article "A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing," by Wei et al., proposes an identity-based signature that achieves unforgeability against chosen-message ...
As a result, the chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection. ...
The article ''A secured and efficient communication scheme for decentralized cognitive radio-based Internet of Vehicles,'' by Yao et al., proposes a secured and efficient communication scheme for a decentralized ...
doi:10.1109/access.2021.3075818
fatcat:7t3tgqarsndc5dq2gulr7hapzi
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
2017
IEEE Communications Surveys and Tutorials
With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks. ...
In addition, an overview of recommendations for further research is also provided. ...
secure communications between vehicles and roadside devices, 3) a secure and efficient communication scheme with privacy preservation. ...
doi:10.1109/comst.2017.2718178
fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi
NTRU Implementation of Efficient Privacy-Preserving Location-Based Querying in VANET
2018
Wireless Communications and Mobile Computing
The key for location-based service popularization in vehicular environment is security and efficiency. ...
Thus accordingly, a postquantum secure oblivious transfer protocol is devised based on efficient NTRU cryptosystem, which then serves as the understructure of a complete location-based querying scheme ...
In this paper, an efficient and secure OT 1 protocol will be constructed based on NTRUEncrypt in the light of its linearity and resistance to quantum machines. ...
doi:10.1155/2018/7823979
fatcat:4zcb2wdhljc2hauwfcpejgpx54
« Previous
Showing results 1 — 15 out of 284 results