A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
IEEE Access Special Section Editorial: Communication and Fog/Edge Computing Toward Intelligent Connected Vehicles (ICVS)
2021
IEEE Access
This Special Section in IEEE Access focuses on innovative technologies and solutions enabled communication and edge computing toward ICVs. ...
both the drivers and passengers in vehicular environments. ...
In the article ''Traffic chain: A blockchain-based secure and privacy-preserving traffic map,'' by Wang et al., a secure and privacy-preserving decentralized traffic information collection system on the ...
doi:10.1109/access.2021.3071260
doaj:3c15b73f232c41a199e81c178ee3a34d
fatcat:c5xvpfeh3zf5fgyzkpzmdkw3jy
Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation
2021
IEEE Network
The Special Issue focuses on several topics that are recent concerns in the community, including data integrity and privacy preservation, cloud/ edge/fog analysis for big data evaluations, energy harvesting ...
Poaching in national parks can be avoided with the help of drones and the associated data can be stored on the blockchain. ...
He has many research contributions in the area of machine learning, big data analytics, security and privacy, Internet of Things, and cloud computing. ...
doi:10.1109/mnet.2021.9355047
fatcat:rtbml7qwbfehrgi53s5vy5mzzu
Emergency Message Dissemination in Vehicular Networks: A Review
2020
IEEE Access
), Internet of Things (IoT), Priority messaging, Clustering approach, Software Defined Network (SDN) and Fog Computing. ...
The number of vehicles on the roads has increased proportionally over the last couple of years and this number is likely to rise due to the increase in population growth and the number of vehicles that ...
ACKNOWLEDGMENT The authors would like to gratefully acknowledge the DSR technical and financial support. ...
doi:10.1109/access.2020.2975110
fatcat:5szw7tpnhbda7pjjkjcakmgpgi
Autonomous Vehicles in 5G and Beyond: A Survey
[article]
2022
arXiv
pre-print
With the advent of 5G technology and rise of autonomous vehicles (AVs), road safety is going to get more secure with less human errors. ...
Then, we focus on the emerging techniques required for integrating 5G technology with AVs, impact of 5G and B5G technologies on AVs along with security concerns in AVs. ...
systems based on fog computing and 5G. ...
arXiv:2207.10510v1
fatcat:myzpimlcazgjbkcr5n4e6zefsi
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables. ...
The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. ...
Hence, privacy preservation for Fog paradigm-based 5G radio access network should be exploited in the future.
B. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
2018
IEEE Internet of Things Journal
In addition, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods towards secure and privacy-preserving blockchain technologies with respect to the blockchain model, specific ...
Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog computing, etc. ...
We provided an overview of the application domains of blockchain technologies in IoT, e.g., Internet of Vehicles, Internet of Energy, Internet of Cloud, and Fog computing. ...
doi:10.1109/jiot.2018.2882794
fatcat:xt2oh3dmozgrjg3n42xsdgm7f4
Architectural Design Alternatives based on Cloud/Edge/Fog Computing for Connected Vehicles
2020
IEEE Communications Surveys and Tutorials
/edge/fog computing architectures for CVs based on functional requirements of CV systems, including advantages, disadvantages, and research challenges. ...
As vehicles playing an increasingly important role in people's daily life, requirements on safer and more comfortable driving experience have arisen. ...
However, a single edge server cannot realize collision avoidance among vehicles in different locations. ...
doi:10.1109/comst.2020.3020854
fatcat:eoakuexy6naj5bsbk2mgm5tpzy
Privacy for 5G-Supported Vehicular Networks
2021
IEEE Open Journal of the Communications Society
Further, we present existing privacy-preserving solutions and analyze them in-depth. ...
Next, we introduce the architecture, features, and services of 5GVN, followed by the privacy objectives of 5GVN and privacy threats to 5GVN. ...
They classify fog-based Internetof-Things (IoT) services based on fog nodes. They also discuss security and privacy threats to IoT services and demonstrate requirements on security and privacy in FC. ...
doi:10.1109/ojcoms.2021.3103445
fatcat:cznswnoczrb4dgfg7hhiywifpe
2021 Index IEEE Transactions on Intelligent Transportation Systems Vol. 22
2021
IEEE transactions on intelligent transportation systems (Print)
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021. ...
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
-2261 Resource Allocation in 5G IoV Architecture Based on SDN and Fog-Cloud Computing.Cao, B., +, TITS June 2021 3832-3840 Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge ...
doi:10.1109/tits.2021.3139738
fatcat:p2mkawtrsbaepj4zk24xhyl2oa
Blockchain-Based Solutions for UAV-Assisted Connected Vehicle Networks in Smart Cities: A Review, Open Issues, and Future Perspectives
2021
Telecom
The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims ...
However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/telecom2010008
fatcat:2527i73gerhk7my56rgwedkecy
2021 Index IEEE Internet of Things Journal Vol. 8
2021
IEEE Internet of Things Journal
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021. ...
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
., +, JIoT Feb. 15, 2021 2603-2614 A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. ...
doi:10.1109/jiot.2022.3141840
fatcat:42a2qzt4jnbwxihxp6rzosha3y
An Overview of Federated Learning at the Edge and Distributed Ledger Technologies for Robotic and Autonomous Systems
[article]
2021
arXiv
pre-print
However, FL by itself does not provide the levels of security and robustness required by today's standards in distributed autonomous systems. ...
While these technological revolutions were taking place, raising concerns in terms of data security and end-user privacy has become an inescapable research consideration. ...
Some of the most prominent results are being shown in the era of the internet of vehicles, set to become increasingly important with the wider adoption of 5G and beyond mobile connectivity solutions. ...
arXiv:2104.10141v2
fatcat:x4mysoxyzzagpjxpzmpxu2af4q
Future Communication Trends toward Internet of Things Services and Applications
2019
Zenodo
Consonantly, the Internet of Things (IoT) has been dominating the technological landscape, from autonomous connected vehicles to wearable devices. ...
There have been murmurs of network functions virtualization and software-defined networking in the past 10 years, but these technologies have been caught in the spotlight of attention in recent year s. ...
The security analysis results show that the solution can preserve users' privacy as well as prevent collision attacks. ...
doi:10.5281/zenodo.3686992
fatcat:gkmu2eqzx5eabidikfs6dxbfu4
Game Theoretic Approaches in Vehicular Networks: A Survey
[article]
2020
arXiv
pre-print
In the era of the Internet of Things (IoT), vehicles and other intelligent components in Intelligent Transportation System (ITS) are connected, forming the Vehicular Networks (VNs) that provide efficient ...
Then, a comprehensive review of applications of GT in VNs is presented, which primarily covers the aspects of QoS and security. ...
A few recent studies use GT to prove the security of the privacy-preserving schemes in VNs. ...
arXiv:2006.00992v1
fatcat:lljjlitvlvbvhbg3aot5xszefm
Towards 6G-enabled Internet of Vehicles: Security and Privacy
2022
IEEE Open Journal of the Communications Society
will play on providing the expected level of security and privacy for the Internet of Vehicles. ...
Particularly, 6G will be a prominent supporter for the evolution towards a truly Intelligent Transportation System and the realisation of the Smart City concept by fulfilling the limitations of 5G, once ...
6G, neither provides in details of the security landscape Our focus is particularly security and privacy aspects of recent technologies of beyond 5G and 6G towards IoV. • We provide an overhaul on the ...
doi:10.1109/ojcoms.2022.3143098
fatcat:vfuwuncr3vaotly7yw7yx25xyu
« Previous
Showing results 1 — 15 out of 270 results