Trust management in social Internet of Things across domains

H Bangui, B Buhnova, D Kusnirakova, D Halasz - Internet of Things, 2023 - Elsevier
Socialization has changed the behavior of physical objects in IoT (Internet of Things) by
introducing the SIoT (Social Internet of Things) paradigm to emulate the social behavior of …

Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Electronics, 2023 - mdpi.com
The privacy and security of the information exchanged between automobiles in 5G-enabled
vehicular networks is at risk. Several academics have offered a solution to these problems in …

An enhanced hybrid ant colony optimization routing protocol for vehicular ad-hoc networks

R Ramamoorthy, M Thangavelu - Journal of Ambient Intelligence and …, 2022 - Springer
Vehicle ad-hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs).
The VANETs communication framework is used to provide communication between moving …

Trust on wheels: Towards secure and resource efficient IoV networks

A Mahmood, SA Siddiqui, QZ Sheng, WE Zhang… - Computing, 2022 - Springer
The emerging yet promising paradigm of Internet-of-Vehicles (IoV) has received
considerable attention in the recent years as an integral and indispensable constituent of the …

Blockchain and trust-based clustering scheme for the IoV

S Ayed, A Hbaieb, L Chaari - Ad Hoc Networks, 2023 - Elsevier
The advent of the Internet of Vehicles (IoV) leads to the proliferation of services proposed for
the users. Its adoption aims mainly to make driving more secure and enhance the users' …

TS-ABOS-CMS: Time-bounded secure attribute-based online/offline signature with constant message size for IoT systems

H Hong, Z Sun - Journal of Systems Architecture, 2022 - Elsevier
Authentication is especially significant in IoT since the identity of the connected object needs
to be verified before carrying out interaction processes with the various IoT data. The …

A new scheme for detecting malicious nodes in vehicular ad hoc networks based on monitoring node behavior

M Alkhalidy, AF Al-Serhan, A Alsarhan, B Igried - Future Internet, 2022 - mdpi.com
Vehicular ad hoc networks have played a key role in intelligent transportation systems that
considerably improve road safety and management. This new technology allows vehicles to …

Secure and trustworthiness IoT systems: investigations and literature review

W Bekri, R Jmal, LC Fourati - Telecommunication Systems, 2024 - Springer
Abstract Internet of Things (IoT) is creating a new automated environment where human
interaction is limited, in which smart-physical objects obtain the power to produce, acquire …

[PDF][PDF] An efficient and secure attribute-based online/offline signature scheme for mobile crowdsensing

H Hong, B Hu, Z Sun - Hum.-Cent. Comput. Inf. Sci, 2021 - hcisj.com
The mobile crowdsensing network has gradually become an important means of realizing
comprehensive perception. In the mobile crowdsensing scenario, people use many kinds of …

[PDF][PDF] Non-repudiation-based network security system using multiparty computation

KS Divya, HR Roopashree… - International Journal of …, 2022 - researchgate.net
Security has always been a prominent concern over the network, and various essential
requirements are required to cater to an efficient security system. Non-repudiation is a …