Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing

M Li, L Zhu, X Lin - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Carpooling enables passengers to share a vehicle to reduce traveling time, vehicle carbon
emissions, and traffic congestion. However, the majority of passengers lean to find local …

Survey on blockchain-based applications in internet of vehicles

L Mendiboure, MA Chalouf, F Krief - Computers & Electrical Engineering, 2020 - Elsevier
Vehicular networks are evolving towards a new paradigm, the Internet of Vehicles (IoV). With
IoV, vehicles should be able to communicate with their environment using heterogeneous …

Blockchain-enabled trustworthy group communications in UAV networks

K Gai, Y Wu, L Zhu, KKR Choo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are increasingly deployed in networked environments,
such as places of mass gatherings, smart cities and smart nations. For example, UAVs can …

[HTML][HTML] Blockchain based peer to peer communication in autonomous drone operation

MS Kumar, S Vimal, NZ Jhanjhi, SS Dhanabalan… - Energy Reports, 2021 - Elsevier
With the prevalence of Aerospace Technologies, the regulations of cybersecurity are
becoming smarter, assured, and long-lasting. Modern communication network technologies …

Secure and blockchain-based emergency driven message protocol for 5G enabled vehicular edge computing

L Nkenyereye, B Adhi Tama, MK Shahzad, YH Choi - Sensors, 2019 - mdpi.com
Basic safety message (BSM) are messages that contain core elements of a vehicle such as
vehicle's size, position, speed, acceleration and others. BSM are lightweight messages that …

Blockchain for secure location verification

MR Nosouhi, S Yu, W Zhou, M Grobler… - Journal of Parallel and …, 2020 - Elsevier
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …

PPCA-privacy-preserving collision avoidance for autonomous unmanned aerial vehicles

P Tedeschi, S Sciancalepore… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely
on short-range sensors, such as proximity sensors, cameras, and microphones …

Why do record/replay tests of web applications break?

M Hammoudi, G Rothermel… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Software engineers often use record/replay tools to enable the automated testing of web
applications. Tests created in this manner can then be used to regression test new versions …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing

M Li, L Zhu, X Lin - Security and Privacy in Communication Networks: 15th …, 2019 - Springer
Ride-hailing services have experienced remarkable development throughout the world,
serving millions of users per day. However, service providers, such as Uber and Didi …