4.7 Article

Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Detecting Sybil Attacks Using Proofs of Work and Location in VANETs

Mohamed Baza et al.

Summary: This article proposes a Sybil attack detection scheme using proofs of work and location. The scheme creates an anonymous identity for vehicles using proofs issued by multiple consecutive road side units (RSUs), and prevents the creation of multiple trajectories by vehicles through the use of proof of work. It also identifies Sybil vehicles by matching their trajectories.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Blockchain-Inspired Secure Computation Offloading in a Vehicular Cloud Network

Shilin Xu et al.

Summary: This article proposes a blockchain-based secure computation offloading scheduling scheme to address security concerns caused by malicious service providers in resource-constrained vehicular cloud networks. The scheme incorporates blockchain-based trust management and smart contract-enabled deep reinforcement learning (DRL) algorithm to ensure secure and intelligent computation offloading scheduling. The effectiveness of the proposed scheme is verified through simulations.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach

Favian Dewanta et al.

Summary: The paper proposes a Bidding-Price-based Transaction (BPT) method for vehicular fog computing service in rural areas, which establishes mutual trust and assigns payoff based on transaction evaluation, enabling trusted fog computing service transactions between vehicles without the direct assistance of any trusted third party. Simulation results and feasibility analysis validate the performance of the BPT scheme in rural areas, claiming that it can be realized by adjusting vehicle speed and transmission range with respect to the size of offloaded data.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Civil

Trust in VANET: A Survey of Current Solutions and Future Research Opportunities

Rasheed Hussain et al.

Summary: Security and privacy are crucial in the commercialization of Vehicular Ad-hoc NETworks (VANETs), where traditional cryptographic and non-cryptographic approaches are used. Challenges remain in achieving trust and reputation through conventional cryptographic methods, highlighting the importance of entity and content trust in supporting trustworthy communication in VANETs.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Computer Science, Information Systems

Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain

Jianfeng Ma et al.

Summary: The research proposes an attribute-based encryption algorithm using blockchain for securely accessing different types of announcement messages in VANET. By recording the uploader's key on the blockchain and tracking all transactions, the scheme achieves a balance between security and efficiency.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Challenges and Solutions for Cellular Based V2X Communications

Sohan Gyawali et al.

Summary: This article surveys the existing work and challenges on LTE and 5G to support efficient V2X communications, covering motivations for cellular based V2X communications, LTE V2X architecture and scenarios, challenges in LTE for V2X communications and solutions, challenges and solutions for 5G vehicular communications, as well as open research issues and possible research directions in cellular based vehicular communications.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Engineering, Electrical & Electronic

Toward Reliable and Scalable Internet of Vehicles: Performance Analysis and Resource Management

Yuanzhi Ni et al.

PROCEEDINGS OF THE IEEE (2020)

Article Engineering, Electrical & Electronic

Blockchain Empowered Cooperative Authentication With Data Traceability in Vehicular Edge Computing

Hong Liu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Coverage and Rate Analysis of Downlink Cellular Vehicle-to-Everything (C-V2X) Communication

Vishnu Vardhan Chetlur et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Blockchain-Based Trust Management With Conditional Privacy-Preserving Announcement Scheme for VANETs

Xingchen Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Theory & Methods

LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs

Jun Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Engineering, Civil

Vehicular Clouds Leveraging Mobile Urban Computing Through Resource Discovery

Rodolfo Meneguette et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Engineering, Civil

A Survey of Vehicular Cloud Research: Trends, Applications and Challenges

Stephan Olariu

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Computer Science, Information Systems

Security and Privacy Challenges in Connected Vehicular Cloud Computing

Arooj Masood et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Blockchain-Based Decentralized Trust Management in Vehicular Networks

Zhe Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Telecommunications

Blockchain based secure data sharing system for Internet of vehicles: A position paper

Lei Zhang et al.

VEHICULAR COMMUNICATIONS (2019)

Article Computer Science, Information Systems

TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles

Chaker Abdelaziz Kerrache et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing

Hong Liu et al.

IEEE NETWORK (2018)

Article Engineering, Civil

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

Lun Li et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Computer Science, Information Systems

A Privacy-Preserving Trust Model Based on Blockchain for VANETs

Zhaojun Lu et al.

IEEE ACCESS (2018)

Article Engineering, Civil

ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks

Wenjia Li et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Engineering, Civil

Security Challenges in Vehicular Cloud Computing

Gongjun Yan et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2013)

Article Engineering, Electrical & Electronic

Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks

Xiaodong Lin et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2013)

Proceedings Paper Computer Science, Theory & Methods

TIaaS: Secure Cloud-assisted Traffic Information Dissemination in Vehicular Ad hoc NETworks

Rasheed Hussain et al.

PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013) (2013)

Article Computer Science, Theory & Methods

Charm: a framework for rapidly prototyping cryptosystems

Joseph A. Akinyele et al.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2013)

Article Engineering, Electrical & Electronic

Dedicated Short-Range Communications (DSRC) Standards in the United States

John B. Kenney

PROCEEDINGS OF THE IEEE (2011)

Article Engineering, Electrical & Electronic

Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks

Vanesa Daza et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2009)

Article Computer Science, Theory & Methods

Security arguments for digital signatures and blind signatures

D Pointcheval et al.

JOURNAL OF CRYPTOLOGY (2000)