Blockchain-based secure computation offloading in vehicular networks

X Zheng, M Li, Y Chen, J Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… In this paper, we focus on the security and offloading of ECCO systems. The … secure
computation offloading framework for a blockchain-based VANET network, in which a mobile vehicle

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

H Sedjelmaci, SM Senouci - Computers & Electrical Engineering, 2015 - Elsevier
… Nevertheless, embedding these both algorithms in a vehicular network could generate a
high computation and communication overheads, specifically when the number of vehicles …

A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks

X Sun, FR Yu, P Zhang, W Xie, X Peng - Sensors, 2020 - mdpi.com
vehicle data cannot be analyzed easily and flexibly. Because homomorphic encryption supports
computations … In this paper, we provide a comprehensive survey of secure computation

Anonymous and lightweight authentication for secure vehicular networks

B Ying, A Nayak - IEEE Transactions on Vehicular Technology, 2017 - ieeexplore.ieee.org
… bilinear pairing to achieve security, which leads to higher computation overhead. Compared
… is proposed for secure vehicular communication. In this scheme, each vehicle obtains a …

Secure and personalized edge computing services in 6G heterogeneous vehicular networks

Y Hui, N Cheng, Z Su, Y Huang, P Zhao… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… Unlike these studies on edge computing in vehicular networks, our article focuses on the
personalized QoE requirements of MVs and the integration of PVs and ECDs in the 6G …

Secure intelligent vehicular network using fog computing

SK Erskine, KM Elleithy - Electronics, 2019 - mdpi.com
… investigation for the network level and the node level security can be … entire VANET. In
addition, since RSUs play a major role in distributing information in VANET, they can be secured

Machine learning for security in vehicular networks: A comprehensive survey

A Talpur, M Gurusamy - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
… onboard storage and computation in vehicular networks by using … to security in vehicular
networks. We present a taxonomy of security attacks at different parts of the vehicular network

A comprehensive survey on the applications of blockchain for securing vehicular networks

T Alladi, V Chamola, N Sahu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
… the complexities of vehicular networks and edge computing. Blockchain can be used to
construct a distributed open market type of system, rather than rely on computation provided by a …

Edge-assisted vehicular networks security

JA Onieva, R Rios, R Roman… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
networks (VNs), especially existing authentication and … security challenges in VN and
describe three deployment models for vehicular edge computing, which refrain from using vehicular

Blockchain-inspired secure computation offloading in a vehicular cloud network

S Xu, C Guo, RQ Hu, Y Qian - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
secure data storage and sharing in vehicular network. To exploit the advantages of the
decentralized, secure … it to VCNs as a secure computation offloading mechanism. Although the …