메뉴 건너뛰기




Volumn 4, Issue 3, 2017, Pages 772-782

A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing

Author keywords

Certificateless aggregate signcryption (CLASC); fog computing; road surface condition monitoring system; security

Indexed keywords

AGGREGATES; COMPUTATIONAL EFFICIENCY; CONDITION MONITORING; CRYPTOGRAPHY; DATA PRIVACY; FOG; QUALITY CONTROL; ROADS AND STREETS; TRANSPORTATION;

EID: 85021672640     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2017.2666783     Document Type: Article
Times cited : (235)

References (35)
  • 1
    • 80052698972 scopus 로고    scopus 로고
    • Distributed road surface condition monitoring using mobile phones
    • Heidelberg, Germany: Springer
    • M. Perttunen et al., "Distributed road surface condition monitoring using mobile phones," in Ubiquitous Intelligence and Computing. Heidelberg, Germany: Springer, 2011, pp. 64-78.
    • (2011) Ubiquitous Intelligence and Computing , pp. 64-78
    • Perttunen, M.1
  • 3
    • 57349124799 scopus 로고    scopus 로고
    • The pothole patrol: Using a mobile sensor network for road surface monitoring
    • Breckenridge, CO, USA
    • J. Eriksson et al., "The pothole patrol: Using a mobile sensor network for road surface monitoring," in Proc. 6th Int. Conf. Mobile Syst. Appl. Services, Breckenridge, CO, USA, 2008, pp. 29-39.
    • (2008) Proc. 6th Int. Conf. Mobile Syst. Appl. Services , pp. 29-39
    • Eriksson, J.1
  • 6
    • 84923117513 scopus 로고    scopus 로고
    • Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
    • Southbank, VIC, Australia
    • I. Stojmenovic, "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks," in Proc. Aust. Telecommun. Netw. Appl. Conf. (ATNAC), Southbank, VIC, Australia, 2014, pp. 117-122.
    • (2014) Proc. Aust. Telecommun. Netw. Appl. Conf. (ATNAC) , pp. 117-122
    • Stojmenovic, I.1
  • 7
    • 84866627419 scopus 로고    scopus 로고
    • Fog computing and its role in the Internet of Things
    • Helsinki, Finland
    • F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," in Proc. ACM SIGCOMM, Helsinki, Finland, 2012, pp. 13-16.
    • (2012) Proc. ACM SIGCOMM , pp. 13-16
    • Bonomi, F.1    Milito, R.2    Zhu, J.3    Addepalli, S.4
  • 9
    • 33747386499 scopus 로고    scopus 로고
    • An information propagation scheme for VANETs
    • Vienna, Austria
    • T. Little and A. Agarwal, "An information propagation scheme for VANETs," in Proc. IEEE Intell. Transp. Syst., Vienna, Austria, 2005, pp. 155-160.
    • (2005) Proc. IEEE Intell. Transp. Syst , pp. 155-160
    • Little, T.1    Agarwal, A.2
  • 10
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • C.-T. Li, M.-S. Hwang, and Y.-P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Comput. Commun., vol. 31, no. 12, pp. 2803-2814, 2008.
    • (2008) Comput. Commun , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 11
    • 51249100419 scopus 로고    scopus 로고
    • RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
    • Beijing, China
    • C. Zhang, X. Lin, R. Lu, and P.-H. Ho, "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks," in Proc. IEEE Int. Conf. Commun., Beijing, China, 2008, pp. 1451-1457.
    • (2008) Proc. IEEE Int. Conf. Commun , pp. 1451-1457
    • Zhang, C.1    Lin, X.2    Lu, R.3    Ho, P.-H.4
  • 12
    • 51249087922 scopus 로고    scopus 로고
    • AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks
    • Beijing, China
    • H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, "AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks," in Proc. IEEE Int. Conf. Commun., Beijing, China, 2008, pp. 1436-1440.
    • (2008) Proc. IEEE Int. Conf. Commun , pp. 1436-1440
    • Zhu, H.1    Lin, X.2    Lu, R.3    Ho, P.-H.4    Shen, X.5
  • 13
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Taipei, Taiwan
    • S. Al-Riyami and K. Paterson, "Certificateless public key cryptography," in Proc. Asiacrypt, vol. 2894. Taipei, Taiwan, 2003, pp. 452-473.
    • (2003) Proc. Asiacrypt , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.2
  • 15
    • 85006189359 scopus 로고    scopus 로고
    • Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
    • Z. Eslami and N. Pakniat, "Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model," J. Comput. Inf. Sci., vol. 26, no. 3, pp. 276-286, 2014.
    • (2014) J. Comput. Inf. Sci , vol.26 , Issue.3 , pp. 276-286
    • Eslami, Z.1    Pakniat, N.2
  • 16
    • 81455124994 scopus 로고    scopus 로고
    • An efficient certificateless aggregate signcryption scheme from pairings
    • Ningbo, China
    • H. Lu and Q. Xie, "An efficient certificateless aggregate signcryption scheme from pairings," in Proc. Int. Conf. Electron. Commun. Control (ICECC), Ningbo, China, 2011, pp. 132-135.
    • (2011) Proc. Int. Conf. Electron. Commun. Control (ICECC) , pp. 132-135
    • Lu, H.1    Xie, Q.2
  • 18
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • L. M. Vaquero and L. Rodero-Merino, "Finding your way in the fog: Towards a comprehensive definition of fog computing," ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 27-32, 2014.
    • (2014) ACM SIGCOMM Comput. Commun. Rev , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 21
    • 84959540048 scopus 로고    scopus 로고
    • An efficient certificateless encryption for secure data sharing in public clouds
    • Sep
    • S.-H. Seo, M. Nabeel, X. Ding, and E. Bertino, "An efficient certificateless encryption for secure data sharing in public clouds," IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2107-2119, Sep. 2014.
    • (2014) IEEE Trans. Knowl. Data Eng , vol.26 , Issue.9 , pp. 2107-2119
    • Seo, S.-H.1    Nabeel, M.2    Ding, X.3    Bertino, E.4
  • 22
    • 53449097686 scopus 로고    scopus 로고
    • A survey of certificateless encryption schemes and security models
    • A. W. Dent, "A survey of certificateless encryption schemes and security models," Int. J. Inf. Security, vol. 7, no. 5, pp. 349-377, 2008.
    • (2008) Int. J. Inf. Security , vol.7 , Issue.5 , pp. 349-377
    • Dent, A.W.1
  • 23
    • 33846219987 scopus 로고    scopus 로고
    • Certificateless signature: A new security model and an improved generic construction
    • B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, "Certificateless signature: A new security model and an improved generic construction," Designs Codes Cryptography, vol. 42, no. 2, pp. 109-126, 2007.
    • (2007) Designs Codes Cryptography , vol.42 , Issue.2 , pp. 109-126
    • Hu, B.C.1    Wong, D.S.2    Zhang, Z.3    Deng, X.4
  • 24
    • 38149080541 scopus 로고    scopus 로고
    • Certificateless signature revisited
    • Townsville City, QLD, Australia
    • X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, "Certificateless signature revisited," in Proc. ACISP, Townsville City, QLD, Australia, 2007, pp. 308-322.
    • (2007) Proc. ACISP , pp. 308-322
    • Huang, X.1    Mu, Y.2    Susilo, W.3    Wong, D.S.4    Wu, W.5
  • 25
    • 62449298276 scopus 로고    scopus 로고
    • A new efficient certificateless signcryption scheme
    • Shanghai, China
    • C. Wu and Z. Chen, "A new efficient certificateless signcryption scheme," in Proc. Int. Symp. Inf. Sci. Eng. (ISISE), vol. 1. Shanghai, China, 2008, pp. 661-664.
    • (2008) Proc. Int. Symp. Inf. Sci. Eng. (ISISE) , vol.1 , pp. 661-664
    • Wu, C.1    Chen, Z.2
  • 26
    • 77957655140 scopus 로고    scopus 로고
    • Efficient and provably secure certificateless signcryption from bilinear maps
    • Beijing, China
    • W. Xie and Z. Zhang, "Efficient and provably secure certificateless signcryption from bilinear maps," in Proc. IEEE Int. Conf. Wireless Commun. Netw. Inf. Security (WCNIS), Beijing, China, 2010, pp. 558-562.
    • (2010) Proc. IEEE Int. Conf. Wireless Commun. Netw. Inf. Security (WCNIS) , pp. 558-562
    • Xie, W.1    Zhang, Z.2
  • 29
    • 84944189227 scopus 로고    scopus 로고
    • Provably secure identity-based aggregate signcryption scheme in random oracles
    • Sep
    • J. Kar, "Provably secure identity-based aggregate signcryption scheme in random oracles," Int. J. Netw. Security, vol. 17, no. 5, pp. 580-587, Sep. 2015.
    • (2015) Int. J. Netw. Security , vol.17 , Issue.5 , pp. 580-587
    • Kar, J.1
  • 30
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Fairfax, VA, USA
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Conf. Comput. Commun. Security (CCS), Fairfax, VA, USA, 1993, pp. 62-73.
    • (1993) Proc. 1st ACM Conf. Comput. Commun. Security (CCS) , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 31
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Santa Barbara, CA, USA
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in Proc. Adv. Cryptol. CRYPTO, vol. 2139. Santa Barbara, CA, USA, 2001, pp. 213-229.
    • (2001) Proc. Adv. Cryptol. CRYPTO , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.