메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 817-824

Secure intelligent traffic light control using fog computing

Author keywords

Intelligent transportation system; Puzzle; Traffic light control; VANET

Indexed keywords

DENIAL-OF-SERVICE ATTACK; EFFICIENCY; FOG; INTELLIGENT SYSTEMS; INTELLIGENT VEHICLE HIGHWAY SYSTEMS; NETWORK SECURITY; TRANSPORTATION; VEHICLES;

EID: 85013421978     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.02.017     Document Type: Article
Times cited : (142)

References (32)
  • 1
    • 80052002716 scopus 로고    scopus 로고
    • Optimal Traffic Control: Urban Intersections
    • CRC Press
    • Guberinic, S., Senborn, G., Lazic, B., Optimal Traffic Control: Urban Intersections. 2008, CRC Press.
    • (2008)
    • Guberinic, S.1    Senborn, G.2    Lazic, B.3
  • 3
    • 0034073903 scopus 로고    scopus 로고
    • Model formulation and solution algorithm of traffic signal control in an urban network
    • Wey, W., Model formulation and solution algorithm of traffic signal control in an urban network. Comput. Environ. Urban Syst. 24:4 (2000), 355–378.
    • (2000) Comput. Environ. Urban Syst. , vol.24 , Issue.4 , pp. 355-378
    • Wey, W.1
  • 4
    • 0001813590 scopus 로고
    • TRANSYT method for area traffic control
    • Robertson, D., TRANSYT method for area traffic control. Traffic Eng. Control 11:6 (1969), 276–281.
    • (1969) Traffic Eng. Control , vol.11 , Issue.6 , pp. 276-281
    • Robertson, D.1
  • 9
    • 84952330462 scopus 로고    scopus 로고
    • A domain-based multi-cluster SIP solution for mobile ad hoc network
    • K.K.R. Choo, A domain-based multi-cluster SIP solution for mobile ad hoc network, in: Int. Conf. Security Privacy Commun. Syst., 2014, pp. 267–281.
    • (2014) Int. Conf. Security Privacy Commun. Syst. , pp. 267-281
    • Choo, K.K.R.1
  • 10
    • 84986575553 scopus 로고    scopus 로고
    • Privacy-preserving public auditing protocol for low performance end devices in cloud
    • Li, J., Zhang, L., Liu, J.K., Qian, H., Dong, Z., Privacy-preserving public auditing protocol for low performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11:11 (2016), 2572–2583.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.11 , pp. 2572-2583
    • Li, J.1    Zhang, L.2    Liu, J.K.3    Qian, H.4    Dong, Z.5
  • 11
    • 84928914432 scopus 로고    scopus 로고
    • Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation
    • Nam, J., Choo, K.K.R., Han, S., Kim, M., Paik, J., Won, D., Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation. PLoS One, 10(4), 2015, e0116709.
    • (2015) PLoS One , vol.10 , Issue.4 , pp. e0116709
    • Nam, J.1    Choo, K.K.R.2    Han, S.3    Kim, M.4    Paik, J.5    Won, D.6
  • 14
    • 84959934623 scopus 로고    scopus 로고
    • An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
    • Deniz, F., Bagci, H., Korpeoglu, I., Yaz, A., An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks. Ad Hoc Networks, 2016, 104–117.
    • (2016) Ad Hoc Networks , pp. 104-117
    • Deniz, F.1    Bagci, H.2    Korpeoglu, I.3    Yaz, A.4
  • 16
    • 84977492315 scopus 로고    scopus 로고
    • A lightweight radio propagation model for vehicular communication in road tunnels
    • Qureshi, M.A., Noor, R.M., Shamim, A., Shamshirband, S., Choo, K.K.R., A lightweight radio propagation model for vehicular communication in road tunnels. PLoS One, 11(3), 2016, e0152727.
    • (2016) PLoS One , vol.11 , Issue.3 , pp. e0152727
    • Qureshi, M.A.1    Noor, R.M.2    Shamim, A.3    Shamshirband, S.4    Choo, K.K.R.5
  • 18
    • 77952252546 scopus 로고    scopus 로고
    • A scalable robust authentication protocol for secure vehicular communications
    • Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J., A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59:4 (2010), 1606–1617.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.4 , pp. 1606-1617
    • Zhang, L.1    Wu, Q.2    Solanas, A.3    Domingo-Ferrer, J.4
  • 19
    • 84978708856 scopus 로고    scopus 로고
    • Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response
    • Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B., Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. 65:8 (2016), 2562–2574.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.8 , pp. 2562-2574
    • Zhang, L.1    Hu, C.2    Wu, Q.3    Domingo-Ferrer, J.4    Qin, B.5
  • 22
    • 84877865598 scopus 로고    scopus 로고
    • Adaptive traffic signal control with vehicular ad hoc networks
    • Pandit, K., Ghosal, D., Zhang, H., Adaptive traffic signal control with vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62:4 (2013), 1459–1471.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.4 , pp. 1459-1471
    • Pandit, K.1    Ghosal, D.2    Zhang, H.3
  • 24
    • 84912130127 scopus 로고    scopus 로고
    • The Fog computing paradigm: Scenarios and security issues
    • FedCSIS, 2014, September
    • I. Stojmenovic, S. Wen, The Fog computing paradigm: Scenarios and security issues, in: Proc. Comput. Sci. Inform. Syst., FedCSIS, 2014, September 2014, pp. 1–8.
    • (2014) Proc. Comput. Sci. Inform. Syst. , pp. 1-8
    • Stojmenovic, I.1    Wen, S.2
  • 26
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • Denning, D., MacDoran, P., Location-based authentication: Grounding cyberspace for better security. Comput. Fraud Secur. 1996:2 (1996), 12–16.
    • (1996) Comput. Fraud Secur. , vol.1996 , Issue.2 , pp. 12-16
    • Denning, D.1    MacDoran, P.2
  • 27
    • 73849121409 scopus 로고    scopus 로고
    • A location based encryption technique and some of its applications
    • L. Scott, D. Denning, A location based encryption technique and some of its applications, in: Proc. Inst. Navigation Nat. Tech. Meeting, 2003, pp. 734–740.
    • (2003) Proc. Inst. Navigation Nat. Tech. Meeting , pp. 734-740
    • Scott, L.1    Denning, D.2
  • 28
    • 84874889982 scopus 로고    scopus 로고
    • A geographic location-based security mechanism for intelligent vehicular networks
    • G. Yan, J. Lin, D. Rawat, W. Yang, A geographic location-based security mechanism for intelligent vehicular networks, in: Proc. Intell. Comput. Inform. Sci., ICICIS, 2011, pp. 693–698.
    • (2011) Proc. Intell. Comput. Inform. Sci., ICICIS , pp. 693-698
    • Yan, G.1    Lin, J.2    Rawat, D.3    Yang, W.4
  • 29
    • 74249090961 scopus 로고    scopus 로고
    • An efficient geographic location-based security mechanism for vehicular adhoc networks
    • G. Yan, S. Olariu, An efficient geographic location-based security mechanism for vehicular adhoc networks, in: Proc. 6th Int. Conf. Mobile Adhoc Sensor Syst., MASS, 2009, pp. 804–809.
    • (2009) Proc. 6th Int. Conf. Mobile Adhoc Sensor Syst., MASS , pp. 804-809
    • Yan, G.1    Olariu, S.2
  • 31
    • 84932611037 scopus 로고    scopus 로고
    • An intelligent traffic light scheduling algorithm through VANETs
    • M. Younes, A. Boukerche, An intelligent traffic light scheduling algorithm through VANETs, in: 39th Conf. Local Comput. Networks, LCN, 2014, pp. 637–642.
    • (2014) 39th Conf. Local Comput. Networks, LCN , pp. 637-642
    • Younes, M.1    Boukerche, A.2
  • 32
    • 84958926233 scopus 로고    scopus 로고
    • Practical secure and privacy-preserving scheme for value-added applications in VANETs
    • Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J., Liu, B., Practical secure and privacy-preserving scheme for value-added applications in VANETs. Comput. Commun. 71 (2015), 50–60.
    • (2015) Comput. Commun. , vol.71 , pp. 50-60
    • Zhang, L.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4    Liu, B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.