메뉴 건너뛰기




Volumn 19, Issue 8, 2018, Pages 2627-2637

Privacy-Preserved pseudonym scheme for fog computing supported internet of vehicles

Author keywords

fog computing; game theory; Internet of vehicles; location privacy; pseudonym management

Indexed keywords

ACCIDENT PREVENTION; CLOUD COMPUTING; COMPUTATION THEORY; COMPUTER ARCHITECTURE; COMPUTER GAMES; COMPUTER PRIVACY; COST REDUCTION; DATA PRIVACY; EDGE COMPUTING; FOG; GAME THEORY; INTELLIGENT SYSTEMS; LOCATION; NETWORK ARCHITECTURE; VEHICLES;

EID: 85034238284     PISSN: 15249050     EISSN: None     Source Type: Journal    
DOI: 10.1109/TITS.2017.2764095     Document Type: Article
Times cited : (213)

References (24)
  • 1
    • 84941085241 scopus 로고    scopus 로고
    • Internet of Things: A survey on enabling technologies, protocols, and applications
    • 4th Quart.
    • A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.4 , pp. 2347-2376
    • Al-Fuqaha, A.1    Guizani, M.2    Mohammadi, M.3    Aledhari, M.4    Ayyash, M.5
  • 2
    • 84954308584 scopus 로고    scopus 로고
    • Mobile crowd sensing for traffic prediction in Internet of vehicles
    • Art. no. 88
    • J. Wan et al., "Mobile crowd sensing for traffic prediction in Internet of vehicles," Sensors, vol. 16, no. 1, 2016, Art. no. 88.
    • (2016) Sensors , vol.16 , Issue.1
    • Wan, J.1
  • 3
    • 85007015710 scopus 로고    scopus 로고
    • School Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech. Rep. CMU-CS-15-139
    • Y. Gao et al., "Are cloudlets necessary?" School Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech. Rep. CMU-CS-15-139, 2015.
    • (2015) Are Cloudlets Necessary?
    • Gao, Y.1
  • 4
    • 84976471358 scopus 로고    scopus 로고
    • Vehicular fog computing: A viewpoint of vehicles as the infrastructures
    • Jun.
    • X. Hou, Y. Li, M. Chen, D. Wu, D. Jin, and S. Chen, "Vehicular fog computing: A viewpoint of vehicles as the infrastructures," IEEE Trans. Veh. Technol., vol. 65, no. 6, pp. 3860-3873, Jun. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.6 , pp. 3860-3873
    • Hou, X.1    Li, Y.2    Chen, M.3    Wu, D.4    Jin, D.5    Chen, S.6
  • 5
    • 84962579256 scopus 로고    scopus 로고
    • MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks
    • Jan.
    • R. Yu, J. Kang, X. Huang, S. Xie, Y. Zhang, and S. Gjessing, "MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks," IEEE Trans. Depend. Sec. Comput., vol. 13, no. 1, pp. 93-105, Jan. 2016.
    • (2016) IEEE Trans. Depend. Sec. Comput. , vol.13 , Issue.1 , pp. 93-105
    • Yu, R.1    Kang, J.2    Huang, X.3    Xie, S.4    Zhang, Y.5    Gjessing, S.6
  • 6
    • 84925855850 scopus 로고    scopus 로고
    • Pseudonym schemes in vehicular networks: A survey
    • 1st Quart.
    • J. Petit, F. Schaub, M. Feiri, and F. Kargl, "Pseudonym schemes in vehicular networks: A survey," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 228-255, 1st Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.1 , pp. 228-255
    • Petit, J.1    Schaub, F.2    Feiri, M.3    Kargl, F.4
  • 7
    • 74049097109 scopus 로고    scopus 로고
    • On non-cooperative location privacy: A gametheoretic analysis
    • J. Freudiger et al., "On non-cooperative location privacy: A gametheoretic analysis," in Proc. ACM CCS, 2009, pp. 324-337.
    • (2009) Proc. ACM CCS , pp. 324-337
    • Freudiger, J.1
  • 9
    • 84857789593 scopus 로고    scopus 로고
    • A dynamic privacy-preserving key management scheme for location-based services in VANETs
    • Mar.
    • R. Lu, X. Lin, X. Liang, and X. Shen, "A dynamic privacy-preserving key management scheme for location-based services in VANETs," IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127-139, Mar. 2012.
    • (2012) IEEE Trans. Intell. Transp. Syst. , vol.13 , Issue.1 , pp. 127-139
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 10
    • 77951259549 scopus 로고    scopus 로고
    • SLOW: A practical pseudonym changing scheme for location privacy in VANETs
    • Oct.
    • L. Buttyán, T. Holczer, A. Weimerskirch, and W. Whyte, "SLOW: A practical pseudonym changing scheme for location privacy in VANETs," in Proc. IEEE VNC, Oct. 2009, pp. 1-8.
    • (2009) Proc. IEEE VNC , pp. 1-8
    • Buttyán, L.1    Holczer, T.2    Weimerskirch, A.3    Whyte, W.4
  • 11
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
    • Jan.
    • R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, T.H.3    Liang, X.4    Shen, X.5
  • 12
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Secur., vol. 15, no. 1, pp. 39-68, 2007.
    • (2007) J. Comput. Secur. , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.-P.2
  • 13
    • 84959900865 scopus 로고    scopus 로고
    • An efficient anonymous batch authentication scheme based on HMAC for VANETs
    • Aug.
    • S. Jiang, X. Zhu, and L. Wang, "An efficient anonymous batch authentication scheme based on HMAC for VANETs," IEEE Trans. Intell. Transp. Syst., vol. 17, no. 8, pp. 2193-2204, Aug. 2016.
    • (2016) IEEE Trans. Intell. Transp. Syst. , vol.17 , Issue.8 , pp. 2193-2204
    • Jiang, S.1    Zhu, X.2    Wang, L.3
  • 14
    • 84949627105 scopus 로고    scopus 로고
    • Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing
    • Jan.
    • K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong, "Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing," J. Netw. Comput. Appl., vol. 59, pp. 46-54, Jan. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.59 , pp. 46-54
    • Gai, K.1    Qiu, M.2    Zhao, H.3    Tao, L.4    Zong, Z.5
  • 15
    • 84957592886 scopus 로고    scopus 로고
    • A fog based system model for cooperative IoT node pairing using matching theory
    • 2015
    • S. F. Abedin, M. G. R. Alam, N. H. Tran, and C. S. Hong, "A fog based system model for cooperative IoT node pairing using matching theory," in Proc. APNOMS, 2015, pp. 309-314.
    • Proc. APNOMS , pp. 309-314
    • Abedin, S.F.1    Alam, M.G.R.2    Tran, N.H.3    Hong, C.S.4
  • 16
    • 78651449231 scopus 로고    scopus 로고
    • Privacy and anonymity in VANETs: A contemporary study
    • S. Biswas et al., "Privacy and anonymity in VANETs: A contemporary study," Ad Hoc Sens. Wireless Netw., vol. 10, nos. 2-3, pp. 177-192, 2010.
    • (2010) Ad Hoc Sens. Wireless Netw. , vol.10 , Issue.2-3 , pp. 177-192
    • Biswas, S.1
  • 17
    • 84942636228 scopus 로고    scopus 로고
    • Software defined networking-based vehicular Adhoc network with fog computing
    • May
    • N. B. Truong, G. M. Lee, and Y. Ghamri-Doudane, "Software defined networking-based vehicular Adhoc network with fog computing," in Proc. IFIP/IEEE Int. Symp. IM May 2015, pp. 1202-1207.
    • (2015) Proc. IFIP/IEEE Int. Symp. Im , pp. 1202-1207
    • Truong, N.B.1    Lee, G.M.2    Ghamri-Doudane, Y.3
  • 18
    • 84987650945 scopus 로고    scopus 로고
    • Pseudonymous authentication for secure V2I services in cloud-based vehicular networks
    • Y. Park, C. Sur, and K.-H. Rhee, "Pseudonymous authentication for secure V2I services in cloud-based vehicular networks," J. Ambient Intell. Hum. Comput., vol. 7, no. 5, pp. 661-671, 2015.
    • (2015) J. Ambient Intell. Hum. Comput. , vol.7 , Issue.5 , pp. 661-671
    • Park, Y.1    Sur, C.2    Rhee, K.-H.3
  • 19
    • 84962514275 scopus 로고    scopus 로고
    • A pseudonym management system to achieve anonymity in vehicular ad hoc networks
    • Jan.
    • H. Artail and N. Abbani, "A pseudonym management system to achieve anonymity in vehicular ad hoc networks," IEEE Trans. Depend. Sec. Comput., vol. 13, no. 1, pp. 106-119, Jan. 2016.
    • (2016) IEEE Trans. Depend. Sec. Comput. , vol.13 , Issue.1 , pp. 106-119
    • Artail, H.1    Abbani, N.2
  • 20
    • 85010056879 scopus 로고    scopus 로고
    • Focusing on mobile users at the edge of Internet of things using fog computing
    • R. Suryawanshi et al., "Focusing on mobile users at the edge of Internet of things using fog computing," Int. J. Sci. Eng. Technol. Res., vol. 4, no. 17, pp. 3225-3231, 2015.
    • (2015) Int. J. Sci. Eng. Technol. Res. , vol.4 , Issue.17 , pp. 3225-3231
    • Suryawanshi, R.1
  • 21
    • 77149139158 scopus 로고    scopus 로고
    • Limits of predictability in human mobility
    • C. Song et al., "Limits of predictability in human mobility," Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
    • (2010) Science , vol.327 , Issue.5968 , pp. 1018-1021
    • Song, C.1
  • 22
    • 58149135996 scopus 로고    scopus 로고
    • Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications
    • Sep.
    • Z. Ma, F. Kargl, and M. Weber, "Pseudonym-on-demand: A new pseudonym refill strategy for vehicular communications," in Proc. IEEE Veh. Technol. Conf., Sep. 2008, pp. 1-5.
    • (2008) Proc. IEEE Veh. Technol. Conf. , pp. 1-5
    • Ma, Z.1    Kargl, F.2    Weber, M.3
  • 23
    • 84925535304 scopus 로고    scopus 로고
    • Privacy-aware access control for message exchange in vehicular ad hoc networks
    • S. Karumanchi, A. Squicciarini, and D. Lin, "Privacy-aware access control for message exchange in vehicular ad hoc networks," Telecommun. Syst., vol. 58, no. 4, pp. 349-361, 2015.
    • (2015) Telecommun. Syst. , vol.58 , Issue.4 , pp. 349-361
    • Karumanchi, S.1    Squicciarini, A.2    Lin, D.3
  • 24
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
    • Apr.
    • R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE INFOCOM, Apr. 2008, pp. 1229-1237.
    • (2008) Proc. IEEE INFOCOM , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.