VANET security and privacy-an overview

MB Mansour, C Salama, HK Mohamed… - International Journal of …, 2018 - papers.ssrn.com
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet
they raise many challenges where the security and privacy concerns are the most critical …

Privacy preserving and data publication for vehicular trajectories with differential privacy

M Arif, J Chen, G Wang, O Geman, VE Balas - Measurement, 2021 - Elsevier
Abstract In the Vehicular Ad-hoc Networks, an enormous number of Location-based
Services could be given to clients as per their development characteristics. Then, protection …

Providing k-anonymity and revocation in ubiquitous VANETs

C Caballero-Gil, J Molina-Gil, J Hernández-Serrano… - Ad Hoc Networks, 2016 - Elsevier
Vehicular ad hoc networks (VANETs) is considered a milestone in improving the safety and
efficiency in transportation. Nevertheless, when information from the vehicular …

Trust management in cloud computing: a survey

MB Monir, MH AbdelAziz… - 2015 IEEE Seventh …, 2015 - ieeexplore.ieee.org
Cloud computing is a new computing model that involves outsourcing of computer
technologies due to the lack of their availability in certain locations. However, when there is …

Differential privacy‐guaranteed trajectory community identification over vehicle ad‐hoc networks

Z Zhou, Y Qiao, L Zhu, J Guan, Y Liu… - Internet Technology …, 2018 - Wiley Online Library
In vehicle ad‐hoc networks (VANETs), a large number of location‐based services can be
provided for users according to their movement features. Meanwhile, privacy may be leaked …

A beaconing-based opportunistic service discovery protocol for vehicular networks

RS Yokoyama, BYL Kimura… - 2014 28th …, 2014 - ieeexplore.ieee.org
In the future, wireless access in vehicular environments (WAVE) will provide the foundation
for a broad range of intelligent applications in transport, related to safety, comfort and, traffic …

Biometric systems and data protection legislation in germany

M Meints, H Biermann, M Bromba… - 2008 International …, 2008 - ieeexplore.ieee.org
How can biometric systems be developed and run in compliance with European data
protection legislation? The German TeleTrusT Association (www. teletrust. de) provides …

A novel approach for evaluating trust of resources in cloud environment

U Divakarla, K Chandrasekaran - 2016 IEEE Region 10 …, 2016 - ieeexplore.ieee.org
Trust is a significant facet in decision making of any distributed network. Cloud computing is
a new computing model that provides computing resources to consumers. Due to …

[PDF][PDF] Machine learning approach for transportation services using vehicular ad hoc network

SR Patel, M Ajmeri - Int J Trend Innov Res (IJTIIR), 2020 - ijtiir.com
Vehicular networks are very likely to become the most pervasive and applicable of mobile
ad hoc networks in this decade. Vehicular ad-hoc networking is an emerging technology for …

SCPP: Secure Credential Provisioning Protocol for Cellular Vehicles

MBM Mansour - 2019 International Symposium on Systems …, 2019 - ieeexplore.ieee.org
Recently, a special type of edge computing, known as Mobile Edge Computing (MEC), has
emerged to satisfy various demands of different user types with minimum latency and high …