Vehicular edge computing and networking: A survey

L Liu, C Chen, Q Pei, S Maharjan, Y Zhang - Mobile networks and …, 2021 - Springer
vehicular networks into MEC, thereby forming a novel paradigm named as Vehicular Edge
Computing (VEC)… to ensure the security of vehicular crowd sensing networks. A certificateless …

Novel trust framework for vehicular networks

S Ahmed, S Al-Rubeaai, K Tepe - … Transactions on Vehicular …, 2017 - ieeexplore.ieee.org
vehicle to vehicle communications to learn about significant events in the network from
neighboring … Das and MM Islam, “Securedtrust: A dynamic trust computation model for secured

Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading

K Zhang, Y Mao, S Leng, Y He… - IEEE vehicular …, 2017 - ieeexplore.ieee.org
networks. In this framework, we study the effectiveness of the computation transfer strategies
with vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication modes. …

Consortium blockchain-based secure software defined vehicular network

N Zhao, H Wu, X Zhao - Mobile Networks and Applications, 2020 - Springer
… In network computing, we deal with various network data streams as separated commodity
streams. For the established virtual subnet, we denote it as G ′ (V ′ ,P ′ ), where V ′ is …

DRL-based V2V computation offloading for blockchain-enabled vehicular networks

J Shi, J Du, Y Shen, J Wang, J Yuan… - … on Mobile Computing, 2022 - ieeexplore.ieee.org
… the state of the vehicular network, we thus utilize deep reinforcement learning (DRL) in vehicular
task … technology to guarantee security and reliability in vehicular computation offloading. …

[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
… and security issues related to inter-cloud communication. They argue that vehicular cloud
computing … is considered to be suitable for intra-vehicle networking. Woo and Jo [22] propose a …

SE-VFC: Secure and efficient outsourcing computing in vehicular fog computing

X Liu, W Chen, Y Xia, C Yang - IEEE Transactions on Network …, 2021 - ieeexplore.ieee.org
… propose a secure and efficient outsourcing computing scheme in vehicular fog computing
(SE-… efficient data services in vehicular networks via cooperative infrastructure-to-vehicle and …

Trust based secure content delivery in vehicular networks: A bargaining game theoretical approach

J Li, R Xing, Z Su, N Zhang, Y Hui… - … on Vehicular …, 2020 - ieeexplore.ieee.org
… In the vehicular networks, secure content delivery becomes significant yet very challenging
… paper proposes a security-aware content delivery scheme in vehicular networks when the …

FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks

BA Mohammed, MA Al-Shareeda, S Manickam… - IEEE …, 2023 - ieeexplore.ieee.org
… random oracle model to achieve security requirements in a 5G-enabled vehicular network. …
-PA scheme for secure vehicular networks in Section IV. Section V provides security analysis …

Pseudonymous authentication for secure V2I services in cloud-based vehicular networks

Y Park, C Sur, KH Rhee - … Ambient Intelligence and Humanized Computing, 2016 - Springer
vehicular cloud is served on vehicular networks, secure vehicular cloud computing can inherit
some security defenses from the existing VANET-based security mechanisms on one hand…