Filters








284 Hits in 8.9 sec

Vehicular Visible Light Communications [chapter]

Bugra Turan, Seyhan Ucar
2017 Visible Light Communications  
As phase information is prone to distortions for mobility scenarios, sole dependence on signal intensity of IM/DD scheme also makes VLC a promising technology for vehicular communications.  ...  wireless communication is proposed as a complementary technology for vehicular connectivity.  ...  SecVLC stands for cryptographic key generation/management where vehicles use IR to share a secret key.  ... 
doi:10.5772/intechopen.69536 fatcat:5e2mli4nuzauni63qvq2zjwzk4

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

James Park, Wanlei Zhou
2016 Entropy  
and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.  ...  algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection  ...  In the next paper [8] , entitled "Comparing Security Notions of Secret Sharing Schemes", Songsong Dai and Donghui Guo study the relations of several security notions for secret sharing schemes defined  ... 
doi:10.3390/e18090334 fatcat:vxubyrnfrrhdzgedsufoews4gq

A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks [article]

Tejasvi Alladi, Vinay Chamola, Nishad Sahu, Vishnu Venkatesh, Adit Goyal, Mohsen Guizani
2022 arXiv   pre-print
We analyze around 75 blockchain-based security schemes for vehicular networks from an application, security, and blockchain perspective.  ...  The application perspective focuses on various applications which use secure blockchain-based vehicular networks such as transportation, parking, data sharing/ trading, and resource sharing.  ...  Security schemes can use random secrets along with the session-specific secrets to ensure that there is a different session key for every session.  ... 
arXiv:2201.04803v1 fatcat:yhm4umjt45ho5fu7mbeu7g66sq

A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks

Kumar Prateek, Fahiem Altaf, Ruhul Amin, Soumyadev Maity, Barbara Masucci
2022 Security and Communication Networks  
The security of these techniques requires a common secret key to be shared between the communicating entities or depend upon the premise that some mathematical problems are computationally hard.  ...  Many cryptographic techniques have been proposed to conceive a secure and privacy-oriented vehicular ad hoc network (VANET) for its practical deployment.  ...  Use of the movable fog node by Ref. [49] for efficient V2V communication and traffic-related issues also have been proposed. A hybrid framework for vehicular cloud using fog computing in Ref.  ... 
doi:10.1155/2022/4280617 fatcat:7xmbgns7ajgfrpnaxcsmfg5wby

A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks

Xiaoqiang Sun, F. Richard Yu, Peng Zhang, Weixin Xie, Xiang Peng
2020 Sensors  
Encryption is a common method to guarantee the security of vehicle data in the process of data dissemination and computation. However, encrypted vehicle data cannot be analyzed easily and flexibly.  ...  Next, we present the framework, communication domains, wireless access technologies and cyber-security issues of VANETs.  ...  Acknowledgments: We thank the reviewers for their detailed reviews and constructive comments, which have helped to greatly improve the quality of this paper.  ... 
doi:10.3390/s20154253 pmid:32751627 fatcat:2m2lw3vutbh4tbynvotylachye

6G for Vehicle-to-Everything (V2X) Communications: Enabling Technologies, Challenges, and Opportunities [article]

Md. Noor-A-Rahim, Zilong Liu, Haeyoung Lee, M. Omar Khyam, Jianhua He, Dirk Pesch, Klaus Moessner, Walid Saad, H. Vincent Poor
2022 arXiv   pre-print
Aiming for truly intelligent transportation systems, we envision that machine learning will play an instrumental role for advanced vehicular communication and networking.  ...  To this end, we provide an overview on the recent advances of machine learning in 6G vehicular networks.  ...  For example, the use of quantum federated learning to securely execute learning tasks among vehicles can be an important use case [59] .  ... 
arXiv:2012.07753v2 fatcat:u5edqsewbzgthlkgc3nooqmdo4

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

2018 Cryptography  
This may be an advantage when designing security architectures for energy-restricted devices.  ...  The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols.  ...  Acknowledgments: This work was funded by VTT's Cyber Security and Future Communications Growth Area programs.  ... 
doi:10.3390/cryptography2010005 fatcat:dngahpmopbgtxonuawmwiiiuky

Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios

Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen
2017 IEEE Transactions on Mobile Computing  
Securing a wireless channel between any two vehicles is a crucial component of vehicular networks security. This can be done by using a secret key to encrypt the messages.  ...  We propose a scheme to allow two cars to extract a shared secret from RSSI (Received Signal Strength Indicator) values in such a way that nearby cars cannot obtain the same key.  ...  CONCLUSIONS AND FUTURE WORK We consider extracting a shared secret key for two vehicles communicating over a wireless channel.  ... 
doi:10.1109/tmc.2016.2557784 fatcat:fgxji2eydbbzlnw4b2rdbno3qe

6G for Vehicle-to-Everything (V2X) Communications: Enabling Technologies, Challenges, and Opportunities

Md. Noor-A-Rahim, Zilong Liu, Haeyoung Lee, Mohammad Omar Khyam, Jianhua He, Dirk Pesch, Klaus Moessner, Walid Saad, H. Vincent Poor
2022 Proceedings of the IEEE  
This article provides a comprehensive overview of the scientific and technological advances that have the capability to shape future 6G vehicle-to-everything (6G-V2X) communications.  ...  For example, the use of quantum federated learning to securely execute learning tasks among vehicles can be an important use case [59] .  ...  spectrum sharing approach, which has the potential to provide secure, smarter, low-cost, and highly efficient decentralized spectrum sharing [54] .  ... 
doi:10.1109/jproc.2022.3173031 fatcat:vo37ywop6babtmnl7nnq3kmgqa

A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions [article]

Brian Hildebrand, Mohamed Baza, Tara Salman, Fathi Amsaad, Abdul Razaqu, Abdullah Alourani
2022 arXiv   pre-print
Lastly, a number of open issues and challenges as well as future opportunities in the area of AI-enabled BIoV, hardware-assisted security for BIoV and quantum computing attacks on BIoV.  ...  Blockchain technology has been emerged as a decentralized approach for enhanced security without depending on trusted third parties to run services.  ...  Authors here used a private proximity test with location information for generating a unique secret key which is used between passenger and driver.  ... 
arXiv:2203.10708v1 fatcat:sozptzz5l5a27oh5rukujcg32a

Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap [article]

Saeed Ahmadi
2022 arXiv   pre-print
This paper helps to identify existing trends by establishing a layered architecture along with a life cycle and an ecosystem for privacy-preserving cloud systems in addition to identifying the existing  ...  Cloud computing is important because it allows for scalability, adaptability, and improved security.  ...  Privacy and reliability in cloud storage environments can be achieved using encryption schemes proposed by the authors of [246] such as BP-XOR secret sharing or LDPC secret sharing.  ... 
arXiv:2204.11120v1 fatcat:tx75pckegjgqxg6tiibptiazbi

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
In this paper, an up-to-date privacy method mapping and relevant use cases are surveyed for II services.  ...  This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  [259] proposed an efficient ABE scheme based on the learning with errors over rings (R-LWE). 9) QUANTUM-RESISTANT SECURE MULTI-PARTY COMPUTATION Quantum-resistant secure multi-party computation has  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
The article "A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing," by Wei et al., proposes an identity-based signature that achieves unforgeability against chosen-message  ...  As a result, the chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection.  ...  The article ''A secured and efficient communication scheme for decentralized cognitive radio-based Internet of Vehicles,'' by Yao et al., proposes a secured and efficient communication scheme for a decentralized  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim
2017 IEEE Communications Surveys and Tutorials  
With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks.  ...  In addition, an overview of recommendations for further research is also provided.  ...  secure communications between vehicles and roadside devices, 3) a secure and efficient communication scheme with privacy preservation.  ... 
doi:10.1109/comst.2017.2718178 fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi

NTRU Implementation of Efficient Privacy-Preserving Location-Based Querying in VANET

Bo Mi, Darong Huang, Shaohua Wan
2018 Wireless Communications and Mobile Computing  
The key for location-based service popularization in vehicular environment is security and efficiency.  ...  Thus accordingly, a postquantum secure oblivious transfer protocol is devised based on efficient NTRU cryptosystem, which then serves as the understructure of a complete location-based querying scheme  ...  In this paper, an efficient and secure OT 1 protocol will be constructed based on NTRUEncrypt in the light of its linearity and resistance to quantum machines.  ... 
doi:10.1155/2018/7823979 fatcat:4zcb2wdhljc2hauwfcpejgpx54
« Previous Showing results 1 — 15 out of 284 results