4.6 Article

Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Blockchain IOTA Sharding-Based Scalable Secure Group Communication in Large VANETs

Vankamamidi S. S. Naresh et al.

Summary: The emergence of group-oriented communication applications has led to research on secure group communication (SGC) in vehicular ad hoc networks (VANETs). However, existing systems face challenges in terms of their static nature, processing loads, storage requirements, communication, security, and privacy concerns. To address these issues, we propose a blockchain IOTA sharding-based smart contract-centric GKA scheme for SGC in large VANETs.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Telecommunications

A platform for power management based on indoor localization in smart buildings using long short-term neural networks

Mohammed Elbes et al.

Summary: Location-based services(LBS) have revolutionized the operation of smart cities and smart buildings by providing a complete layered architecture, offering new experiences to citizens, and providing collaborative features and services in power management.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Computer Science, Information Systems

Novel system for road traffic optimisation in large cities

Ahmad A. A. Alkhatib et al.

Summary: This article proposes a novel urban traffic control system that improves traffic flow by introducing vehicle counting, lane evaluation, and overall control methods. The simulation results show a significant reduction in average waiting time.

IET SMART CITIES (2022)

Article Computer Science, Information Systems

An optimized differential privacy scheme with reinforcement learning in VANET

Xin Chen et al.

Summary: This paper proposes an optimized privacy differential privacy scheme with reinforcement learning in vehicular ad hoc network, which can dynamically optimize the privacy budget allocation for each location on the vehicle trajectory to achieve a better balance between geolocation obfuscation and semantic security.

COMPUTERS & SECURITY (2021)

Article Engineering, Multidisciplinary

Privacy preserving and data publication for vehicular trajectories with differential privacy

Muhammad Arif et al.

Summary: In Vehicular Ad-hoc Networks, Location-based Services provide personalized services to clients based on their movement characteristics, but privacy protection is a challenge. Proposed Differential Privacy and generalization based anonymization approach aims to protect sensitive vehicular trajectories. Experiments show good data feasibility and efficiency of the method, as well as the impact of privacy budget values on error rates.

MEASUREMENT (2021)

Article Automation & Control Systems

Energy-Efficient End-to-End Security for Software-Defined Vehicular Networks

Gunasekaran Raja et al.

Summary: The article proposes an energy-efficient end-to-end security solution for software-defined vehicular networks (SDVNs), utilizing software-defined networking, end-to-end security schemes, and collaborative learning to protect privacy and provide green IIoT services.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Engineering, Civil

Preserving Privacy in the Internet of Connected Vehicles

Soheila Ghane et al.

Summary: This paper discusses privacy issues in distributed edge computing, addressing data communication between multiple vehicles in the IoT layer and potentially untrusted edge controllers. The proposed mechanism ensures a strong privacy level by adding correlated noise in the vehicle's side, scaling with data correlation. Extensive experiments demonstrate that this approach outperforms recent methods in terms of utility.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Review Computer Science, Information Systems

Privacy Preservation in Resource-Constrained IoT Devices Using Blockchain-A Survey

Zainab Iftikhar et al.

Summary: This paper discusses the benefits and privacy issues of implementing blockchain in IoT, as well as related research. Blockchain can improve the efficiency of IoT and maintain trust, addressing privacy limitations. Research finds that blockchain is the optimal way to prevent identity disclosure, monitoring, and provide tracking in IoT.

ELECTRONICS (2021)

Article Automation & Control Systems

Achieving Personalized k-Anonymity-Based Content Privacy for Autonomous Vehicles in CPS

Jinbao Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Proceedings Paper Computer Science, Information Systems

Data Fusion in Autonomous Vehicles Research, Literature Tracing from Imaginary Idea to Smart Surrounding Community

Shadi AlZu'bi et al.

2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC) (2020)

Article Computer Science, Information Systems

VPPCS: VANET-Based Privacy-Preserving Communication Scheme

Mahmood A. Al-Shareeda et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Differential Privacy Techniques for Cyber Physical Systems: A Survey

Muneeb Ul Hassan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

Mahmood A. Al-Shareeda et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Privacy Preservation in Big Data From the Communication Perspective-A Survey

Tao Wang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Theory & Methods

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

Shaobo Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions

Umair Sarfraz et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Theory & Methods

Privacy aware decentralized access control system

Sehrish Shafeeq et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks

P. Vijayakumar et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Proceedings Paper Computer Science, Theory & Methods

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response

Ulfar Erlingsson et al.

CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)