4.8 Article

Fortifying Smart Transportation Security Through Public Blockchain

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

Basudeb Bera et al.

Summary: In this paper, a novel access control scheme for unauthorized UAV detection and mitigation, called ACSUD-IoD, is proposed. By incorporating a blockchain-based solution in ACSUD-IoD, the data from drones can be securely stored for detection of unauthorized UAVs, and Big data analytics can be performed on the authenticated transactional data stored in the blockchain to ensure data authenticity and effectiveness. The detailed security analysis and testbed experiments demonstrate the robustness and efficacy of the proposed scheme in an IoD environment compared to existing schemes.

COMPUTER COMMUNICATIONS (2021)

Review Engineering, Industrial

Big data algorithms and applications in intelligent transportation system: A review and bibliometric analysis

Sepideh Kaffash et al.

Summary: Big Data algorithms are widely applied in the Intelligent Transportation System (ITS) for signal recognition, traffic flow prediction, vehicle safety, and other areas. This study provides a comprehensive review of the application of Big Data algorithms in ITS, highlighting research gaps and future directions.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2021)

Article Engineering, Electrical & Electronic

A Decoupled Blockchain Approach for Edge-Envisioned IoT-Based Healthcare Monitoring

Gagangeet Singh Aujla et al.

Summary: The proposed approach utilizes blockchain-based decoupled blocks and incremental tensor for secure data transmission in a large IoT healthcare network, showing effectiveness in terms of block preparation time, header generation time, tensor reduction ratio, and approximation error.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

VESPA: A Framework for Optimizing Heterogeneous Sensor Placement and Orientation for Autonomous Vehicles

Joydeep Dey et al.

Summary: This article discusses the importance of perceiving the surrounding environment in autonomous vehicles and introduces a novel optimization framework called VESPA to find the optimal sensor configuration for vehicles, achieving their autonomy goals.

IEEE CONSUMER ELECTRONICS MAGAZINE (2021)

Article Engineering, Electrical & Electronic

Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems

Anusha Vangala et al.

Summary: The study introduces a novel blockchain-enabled certificate-based authentication scheme, BCAS-VADN, for vehicle accident detection and notification in an Internet of Vehicles (IoV) environment, ensuring secure storage, transmission, and verification of accident-related data.

IEEE SENSORS JOURNAL (2021)

Article Engineering, Civil

Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach

Shiva Raj Pokhrel et al.

Summary: Driverless parking is a significant early benefit for autonomous vehicles, but privacy issues exist in the design. Researchers have developed a secure, privacy-aware parking reservation framework and improved model performance through differential privacy and reinforcement learning techniques.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Computer Science, Information Systems

Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control

Bhaskara S. Egala et al.

Summary: The rapid development of the Internet of Medical Things (IoMT) has enabled smart healthcare systems to provide more advanced real-time services, but has also brought about privacy and security concerns. This article proposes a blockchain-based solution that addresses the shortcomings of traditional cloud-centric IoMT systems, enhancing system security and privacy.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications

Yoney Kirsal Ever

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

PoBT: A Lightweight Consensus Algorithm for Scalable IoT Business Blockchain

Sujit Biswas et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

Federated Learning for Data Privacy Preservation in Vehicular Cyber-Physical Systems

Yunlong Lu et al.

IEEE NETWORK (2020)

Article Computer Science, Information Systems

BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme

Yue Wang et al.

COMPUTER COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment

Basudeb Bera et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT

Suhui Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

Decentralized Public Key Infrastructures atop Blockchain

Yannan Li et al.

IEEE NETWORK (2020)

Article Computer Science, Information Systems

Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure

Shaik Mullapathi Farooq et al.

IEEE ACCESS (2020)

Article Computer Science, Hardware & Architecture

Blockchain-Based Energy Trading in Electric-Vehicle-Enabled Microgrids

Ifiok Anthony Umoren et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2020)

Article Automation & Control Systems

Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment

Srinivas Jangirala et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network

Mostafa Farhadi Moghadam et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs

Yanji Jiang et al.

IEEE ACCESS (2020)

Article Engineering, Civil

Big Data Analytics in Intelligent Transportation Systems: A Survey

Li Zhu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)

Article Engineering, Civil

An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks

Jie Cui et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)

Article Engineering, Electrical & Electronic

Vehicular Communications: A Network Layer Perspective

Haixia Peng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

Design of secure key management and user authentication scheme for fog computing services

Mohammad Wazid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system

Rajat Chaudhary et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Modeling of Smart Cities Based on ITS Architecture

Ondrej Pribyl et al.

IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE (2019)

Article Engineering, Electrical & Electronic

LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment

Rajat Chaudhary et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Engineering, Electrical & Electronic

Software Platform for Heterogeneous In-Vehicle Environments

Milena Milosevic et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2018)

Article Engineering, Electrical & Electronic

Secure Message Communication Protocol Among Vehicles in Smart City

Amit Dua et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Low-Complexity Charging/Discharging Scheduling for Electric Vehicles at Home and Common Lots for Smart Households Prosumers

Abbas Mehrabi et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Civil

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Yanbing Liu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Information Systems

Provably secure user authentication and key agreement scheme for wireless sensor networks

Ashok Kumar Das et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks

Ashok Kumar Das

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2012)

Article Engineering, Electrical & Electronic

Dedicated Short-Range Communications (DSRC) Standards in the United States

John B. Kenney

PROCEEDINGS OF THE IEEE (2011)

Article Computer Science, Theory & Methods

Practical byzantine fault tolerance and proactive recovery

M Castro et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2002)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)