메뉴 건너뛰기




Volumn 10, Issue 6, 2015, Pages 1299-1314

Secure and privacy preserving protocol for cloud-based vehicular DTNs

Author keywords

Cloud computing; delay tolerant network; security and privacy; VANETs

Indexed keywords

CLOUD COMPUTING; COMPLEX NETWORKS; DELAY TOLERANT NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; ROUTERS; VEHICLE TRANSMISSIONS; VEHICLES; VEHICULAR AD HOC NETWORKS; WIRELESS NETWORKS;

EID: 84928956436     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2407326     Document Type: Article
Times cited : (138)

References (37)
  • 1
    • 78649326285 scopus 로고    scopus 로고
    • VWCA: An efficient clustering algorithm in vehicular ad hoc networks
    • Jan.
    • A. Daeinabi, A. G. P. Rahbar, and A. Khademzadeh, "VWCA: An efficient clustering algorithm in vehicular ad hoc networks," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 207-222, Jan. 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 207-222
    • Daeinabi, A.1    Rahbar, A.G.P.2    Khademzadeh, A.3
  • 5
    • 84878547961 scopus 로고    scopus 로고
    • Directional routing and scheduling for green vehicular delay tolerant networks
    • Y. Zeng, K. Xiang, D. Li, and A. V. Vasilakos, "Directional routing and scheduling for green vehicular delay tolerant networks," Wireless Netw., vol. 19, no. 2, pp. 161-173, 2013.
    • (2013) Wireless Netw. , vol.19 , Issue.2 , pp. 161-173
    • Zeng, Y.1    Xiang, K.2    Li, D.3    Vasilakos, A.V.4
  • 9
    • 70350238158 scopus 로고    scopus 로고
    • SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
    • Oct.
    • H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks," IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628-4639, Oct. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.8 , pp. 4628-4639
    • Zhu, H.1    Lin, X.2    Lu, R.3    Fan, Y.4    Shen, X.5
  • 10
    • 77951292577 scopus 로고    scopus 로고
    • Pi: A practical incentive protocol for delay tolerant networks
    • Apr.
    • R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, "Pi: A practical incentive protocol for delay tolerant networks," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1483-1492, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1483-1492
    • Lu, R.1    Lin, X.2    Zhu, H.3    Shen, X.4    Preiss, B.5
  • 13
    • 56349132859 scopus 로고    scopus 로고
    • Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
    • A. Boldyreva, C. Gentry, A. O'Neill, and D. H. Yum, "Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing," in Proc. 14th ACM Conf. CCS, 2007, pp. 276-285.
    • (2007) Proc. 14th ACM Conf. CCS , pp. 276-285
    • Boldyreva, A.1    Gentry, C.2    O'neill, A.3    Yum, D.H.4
  • 16
    • 79960870810 scopus 로고    scopus 로고
    • STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
    • Apr.
    • X. Lin, R. Lu, X. Liang, and X. Shen, "STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs," in Proc. IEEE INFOCOM, Apr. 2011, pp. 2147-2155.
    • (2011) Proc. IEEE INFOCOM , pp. 2147-2155
    • Lin, X.1    Lu, R.2    Liang, X.3    Shen, X.4
  • 17
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacypreserving protocol for vehicular communications
    • Nov.
    • X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
    • (2007) IEEE Trans. Veh. Technol. , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 18
    • 79953785474 scopus 로고    scopus 로고
    • GRS: The green, reliability, and security of emerging machine to machine communications
    • Apr.
    • R. Lu, X. Li, X. Liang, X. Lin, and X. Shen, "GRS: The green, reliability, and security of emerging machine to machine communications," IEEE Commun. Mag., vol. 49, no. 4, pp. 28-35, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Liang, X.3    Lin, X.4    Shen, X.5
  • 19
    • 77953313061 scopus 로고    scopus 로고
    • SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks
    • Mar.
    • R. Lu, X. Lin, and X. Shen, "SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 20
    • 84928961834 scopus 로고    scopus 로고
    • PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system
    • to be published
    • J. Zhou, X. Lin, X. Dong, and Z. Cao, "PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system," IEEE Trans. Paralell Distrib. Syst., to be published.
    • IEEE Trans. Paralell Distrib. Syst.
    • Zhou, J.1    Lin, X.2    Dong, X.3    Cao, Z.4
  • 21
    • 34548211355 scopus 로고    scopus 로고
    • A fine-grained reputation system for reliable service selection in peer-to-peer networks
    • Aug.
    • Y. Zhang and Y. Fang, "A fine-grained reputation system for reliable service selection in peer-to-peer networks," IEEE Trans. Parallel Distrb. Syst., vol. 18, no. 8, pp. 1134-1145, Aug. 2007.
    • (2007) IEEE Trans. Parallel Distrb. Syst. , vol.18 , Issue.8 , pp. 1134-1145
    • Zhang, Y.1    Fang, Y.2
  • 22
    • 34547532527 scopus 로고    scopus 로고
    • A secure incentive protocol for mobile ad hoc networks
    • Oct.
    • Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks," Wireless Netw., vol. 13, no. 5, pp. 569-582, Oct. 2007.
    • (2007) Wireless Netw. , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Lou, W.2    Liu, W.3    Fang, Y.4
  • 23
    • 34548493227 scopus 로고    scopus 로고
    • On designing incentivecompatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretic and cryptographic techniques
    • Dec.
    • S. Zhong, L. E. Li, Y. G. Liu, and Y. R. Yang, "On designing incentivecompatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretic and cryptographic techniques," Wireless Netw., vol. 13, no. 6, pp. 799-816, Dec. 2007.
    • (2007) Wireless Netw. , vol.13 , Issue.6 , pp. 799-816
    • Zhong, S.1    Li, L.E.2    Liu, Y.G.3    Yang, Y.R.4
  • 25
    • 79960871045 scopus 로고    scopus 로고
    • C4: A new paradigm for providing incentives in multi-hop wireless networks
    • Apr.
    • C. Zhang, X. Zhu, Y. Song, and Y. Fang, "C4: A new paradigm for providing incentives in multi-hop wireless networks," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 918-926.
    • (2011) Proc. IEEE INFOCOM, Shanghai, China , pp. 918-926
    • Zhang, C.1    Zhu, X.2    Song, Y.3    Fang, Y.4
  • 26
    • 84884572913 scopus 로고    scopus 로고
    • Securing m-healthcare social networks: Challenges, countermeasures and future directions
    • Aug.
    • J. Zhou, Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos, "Securing m-healthcare social networks: Challenges, countermeasures and future directions," IEEE Wireless Commun., vol. 20, no. 4, pp. 12-21, Aug. 2013.
    • (2013) IEEE Wireless Commun. , vol.20 , Issue.4 , pp. 12-21
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Lin, X.4    Vasilakos, A.V.5
  • 27
    • 38149054118 scopus 로고    scopus 로고
    • [Online]. Available
    • B. Lynn. PBC Library. [Online]. Available: http://crypto. stanford.edu/pbc/
    • PBC Library
    • Lynn, B.1
  • 28
    • 84877645780 scopus 로고    scopus 로고
    • TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks
    • Dec.
    • J. Zhou and Z. Cao, "TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks," in Proc. IEEE GLOBECOM, Dec. 2012, pp. 985-990.
    • (2012) Proc. IEEE GLOBECOM , pp. 985-990
    • Zhou, J.1    Cao, Z.2
  • 30
    • 84925258369 scopus 로고    scopus 로고
    • BDK: Secure and efficient biometric based deterministic key agreement in wireless body area networks
    • Boston, MA, USA, Sep./Oct.
    • J. Zhou, Z. Cao, and X. Dong, "BDK: Secure and efficient biometric based deterministic key agreement in wireless body area networks," in Proc. 8th Int. Conf. Body Area Netw. (BodyNets), Boston, MA, USA, Sep./Oct. 2013, pp. 488-494.
    • (2013) Proc. 8th Int. Conf. Body Area Netw. (BodyNets) , pp. 488-494
    • Zhou, J.1    Cao, Z.2    Dong, X.3
  • 31
    • 84857752323 scopus 로고    scopus 로고
    • Delegatable homomorphic encryption with applications to secure outsourcing of computation
    • M. Barbosa and P. Farshim, "Delegatable homomorphic encryption with applications to secure outsourcing of computation," in Proc. 12th Conf. CT-RSA, 2012, pp. 296-312.
    • (2012) Proc. 12th Conf. CT-RSA , pp. 296-312
    • Barbosa, M.1    Farshim, P.2
  • 32
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • D. Fiore and R. Gennaro, "Publicly verifiable delegation of large polynomials and matrix computations, with applications," in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 501-512.
    • (2012) Proc. ACM Conf. Comput. Commun. Secur. , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 33
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. 17th EUROCRYPT, 1999, pp. 223-238.
    • (1999) Proc. 17th EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 34
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Boston, MA, USA, Aug.
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. MobiCom, Boston, MA, USA, Aug. 2000, pp. 255-265.
    • (2000) Proc. 6th Annu. Int. Conf. MobiCom , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 35
    • 40749113163 scopus 로고    scopus 로고
    • Efficient routing in intermittently connected mobile networks: The multiple-copy case
    • Feb.
    • T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy case," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 77-90, Feb. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.1 , pp. 77-90
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 36
    • 84900653663 scopus 로고    scopus 로고
    • A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks
    • Jan.
    • H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, "A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 22-32, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 22-32
    • Zhu, H.1    Du, S.2    Gao, Z.3    Dong, M.4    Cao, Z.5
  • 37
    • 84902197946 scopus 로고    scopus 로고
    • LSR: Mitigating zero-day sybil vulnerability in privacypreserving vehicular peer-to-peer networks
    • Sep.
    • X. Lin, "LSR: Mitigating zero-day sybil vulnerability in privacypreserving vehicular peer-to-peer networks," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 237-246, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 237-246
    • Lin, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.