Secure and efficient privacy-preserving authentication scheme for 5G software defined vehicular networks

J Huang, Y Qian, RQ Hu - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
… of 5G software defined vehicular network and propose a secure and efficient privacy …
basic security objectives that a secure vehicular network should achieve. Cloud computing

Computation offloading and resource allocation for cloud assisted mobile edge computing in vehicular networks

J Zhao, Q Li, Y Gong, K Zhang - … Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
… reputation management system to provide security protection and enhance network
efficiency in the implementation of vehicular edge computing. In [22], the authors designed …

Security challenges in vehicular cloud computing

G Yan, D Wen, S Olariu… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
… The main contribution of this work is to identify and analyze a number of securitysecurity
issues have received attention in cloud computing and vehicular networks, we identify security

Security and privacy challenges in connected vehicular cloud computing

A Masood, DS Lakew, S Cho - IEEE Communications Surveys …, 2020 - ieeexplore.ieee.org
… To cover the broad aspects of security and privacy issues in VCC, we first recapitulate the …
of in-vehicular network, V2X network, and vehicular cloud. Then, we address the security and …

A lightweight authentication scheme with privacy preservation for vehicular networks

GS Rawat, K Singh, NI Arshad, K Hadidi… - Computers and Electrical …, 2022 - Elsevier
security and privacy-related issues. The primary security requirements in a vehicular network
are vehicle … Furthermore, we evaluate the performance of P-LAS in terms of computation

Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks

Y Wang, Z Su, Q Xu, TH Luan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… However, the intense collaborative computing and data transmissions among unknown
others will inevitably introduce severe security concerns. Aiming at addressing security concerns …

Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing

Z Wei, FR Yu, H Tang, C Liang… - … and Network Security  …, 2016 - ieeexplore.ieee.org
… cloud computing model in VANETs is presented. In this cloud-based vehicular network, the
… Resource management for cognitive cloud vehicular networks is studied in [26]. The authors …

[HTML][HTML] Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU)

MA Al-Shareeda, S Manickam, BA Mohammed… - Sustainability, 2022 - mdpi.com
… Then, we present the vehicular network architecture with regard to the system model and
security goals. … The 5G-BS does not save or compute the data regarding vehicular networks. …

Enabling collaborative edge computing for software defined vehicular networks

K Wang, H Yin, W Quan, G Min - IEEE network, 2018 - ieeexplore.ieee.org
… privacy in vehicular networks of edge computing, we should take a higher secure and private
measure. According to some studies, the security applied in current cloud computing may …

[HTML][HTML] Optimized security algorithm for connected vehicular network

D Choudhary - International Journal of Pervasive Computing and …, 2023 - emerald.com
… used in a variety of networking protocols including the Transport Layer Security (TLS) protocol
that encrypt network traffic in vehicle ad hoc networks (VANET) applications like accidents …