J Zhao, Q Li, Y Gong, K Zhang - … Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
… reputation management system to provide security protection and enhance network efficiency in the implementation of vehicular edge computing. In [22], the authors designed …
G Yan, D Wen, S Olariu… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
… The main contribution of this work is to identify and analyze a number of security … security issues have received attention in cloud computing and vehicularnetworks, we identify security …
A Masood, DS Lakew, S Cho - IEEE Communications Surveys …, 2020 - ieeexplore.ieee.org
… To cover the broad aspects of security and privacy issues in VCC, we first recapitulate the … of in-vehicularnetwork, V2X network, and vehicular cloud. Then, we address the security and …
… security and privacy-related issues. The primary security requirements in a vehicularnetwork are vehicle … Furthermore, we evaluate the performance of P-LAS in terms of computation …
Y Wang, Z Su, Q Xu, TH Luan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… However, the intense collaborative computing and data transmissions among unknown others will inevitably introduce severe security concerns. Aiming at addressing security concerns …
Z Wei, FR Yu, H Tang, C Liang… - … and Network Security …, 2016 - ieeexplore.ieee.org
… cloud computing model in VANETs is presented. In this cloud-based vehicularnetwork, the … Resource management for cognitive cloud vehicularnetworks is studied in [26]. The authors …
… Then, we present the vehicularnetwork architecture with regard to the system model and security goals. … The 5G-BS does not save or compute the data regarding vehicularnetworks. …
K Wang, H Yin, W Quan, G Min - IEEE network, 2018 - ieeexplore.ieee.org
… privacy in vehicularnetworks of edge computing, we should take a higher secure and private measure. According to some studies, the security applied in current cloud computing may …
D Choudhary - International Journal of Pervasive Computing and …, 2023 - emerald.com
… used in a variety of networking protocols including the Transport Layer Security (TLS) protocol that encrypt network traffic in vehicle ad hoc networks (VANET) applications like accidents …