메뉴 건너뛰기




Volumn 2018, Issue , 2018, Pages

Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

Author keywords

[No Author keywords available]

Indexed keywords

AGGREGATES; CRYPTOGRAPHY; DATA PRIVACY; FOG; FOG COMPUTING; VEHICLE TO ROADSIDE COMMUNICATIONS; VEHICLES;

EID: 85048705343     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1155/2018/1378583     Document Type: Article
Times cited : (15)

References (30)
  • 2
    • 80052382905 scopus 로고    scopus 로고
    • A recursive multiscale correlation-averaging algorithm for an automated distributed road-condition-monitoring system
    • M. Ndoye, A. M. Barker, J. V. Krogmeier, and D. M. Bullock, "A recursive multiscale correlation-averaging algorithm for an automated distributed road-condition-monitoring system," IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 3, pp. 795-808, 2011.
    • (2011) IEEE Transactions on Intelligent Transportation Systems , vol.12 , Issue.3 , pp. 795-808
    • Ndoye, M.1    Barker, A.M.2    Krogmeier, J.V.3    Bullock, D.M.4
  • 3
    • 84876761018 scopus 로고    scopus 로고
    • Energy-spectrum efficiency tradeoff for video streaming over mobile ad hoc networks
    • L. Zhou, R. Q. Hu, Y. Qian, andH.-H. Chen, "Energy-spectrum efficiency tradeoff for video streaming over mobile ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 5, pp. 981-991, 2013.
    • (2013) IEEE Journal on Selected Areas in Communications , vol.31 , Issue.5 , pp. 981-991
    • Zhou, L.1    Hu, R.Q.2    Qian, Y.3    Chen, H.-H.4
  • 4
    • 85050872676 scopus 로고    scopus 로고
    • Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
    • Q. Jiang, Z. Chen, B. Li, J. Shen, L. Yang, and J. Ma, "Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems," Journal of Ambient Intelligence and Humanized Computing, 2017.
    • (2017) Journal of Ambient Intelligence and Humanized Computing
    • Jiang, Q.1    Chen, Z.2    Li, B.3    Shen, J.4    Yang, L.5    Ma, J.6
  • 6
    • 84925262438 scopus 로고    scopus 로고
    • VANET-cloud: A generic cloud computing model for vehicular Ad Hoc networks
    • S. Bitam, A.Mellouk, andS. Zeadally, "VANET-cloud: A generic cloud computing model for vehicular Ad Hoc networks," IEEE Wireless Communications Magazine, vol. 22, no. 1, pp. 96-102, 2015.
    • (2015) IEEE Wireless Communications Magazine , vol.22 , Issue.1 , pp. 96-102
    • Bitam, S.1    Mellouk, A.2    Zeadally, S.3
  • 7
    • 85012065387 scopus 로고    scopus 로고
    • An efficient multiple session key establishment scheme for VANET group integration
    • C.-C. Lee, Y.-M. Lai, and P.-J. Cheng, "An efficient multiple session key establishment scheme for VANET group integration," IEEE Intelligent Systems, vol. 31, no. 6, pp. 35-43, 2016.
    • (2016) IEEE Intelligent Systems , vol.31 , Issue.6 , pp. 35-43
    • Lee, C.-C.1    Lai, Y.-M.2    Cheng, P.-J.3
  • 8
    • 84961572683 scopus 로고    scopus 로고
    • A secure cloud-assisted wireless body area network in mobile emergency medical care system
    • C.-T. Li, C.-C. Lee, and C.-Y. Weng, "A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System," Journal of Medical Systems, vol. 40, no. 5, article no. 117, 2016.
    • (2016) Journal of Medical Systems , vol.40 , Issue.5
    • Li, C.-T.1    Lee, C.-C.2    Weng, C.-Y.3
  • 10
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • ACM, Hangzhou, China, June
    • S. Yi, C. Li, and Q. Li, "A survey of fog computing: concepts, applications and issues," in Proceedings of the Workshop on Mobile Big Data (Mobidata '15), pp. 37-42, ACM, Hangzhou, China, June 2015.
    • (2015) Proceedings of the Workshop on Mobile Big Data (Mobidata '15) , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.3
  • 11
    • 85026636505 scopus 로고    scopus 로고
    • From cloud to fog computing: A review and a conceptual live VM migration framework
    • O. Osanaiye, S. Chen, Z. Yan, R. Lu, K.-K. R. Choo, and M. Dlodlo, "From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework," IEEE Access, vol. 5, pp. 8284-8300, 2017.
    • (2017) IEEE Access , vol.5 , pp. 8284-8300
    • Osanaiye, O.1    Chen, S.2    Yan, Z.3    Lu, R.4    Choo, K.-K.R.5    Dlodlo, M.6
  • 13
    • 79951814345 scopus 로고    scopus 로고
    • An efficient authentication protocol for mobile communications
    • C.-C. Lee, I.-E. Liao, and M.-S.Hwang, "An efficient authentication protocol for mobile communications," Telecommunication Systems, vol. 46, no. 1, pp. 31-41, 2011.
    • (2011) Telecommunication Systems , vol.46 , Issue.1 , pp. 31-41
    • Lee, C.-C.1    Liao, I.-E.2    Hwang, M.-S.3
  • 20
    • 85021672640 scopus 로고    scopus 로고
    • A privacypreserving vehicular crowdsensing based road surface condition monitoring system using fog computing
    • S. Basudan, X. Lin, and K. Sankaranarayanan, "A privacypreserving vehicular crowdsensing based road surface condition monitoring system using fog computing," IEEE Internet of Things Journal, no. 99, pp. 1-1, 2017.
    • (2017) IEEE Internet of Things Journal , Issue.99 , pp. 1
    • Basudan, S.1    Lin, X.2    Sankaranarayanan, K.3
  • 21
    • 84930216224 scopus 로고    scopus 로고
    • Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks
    • H. Xiong and Z. Qin, "Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1442-1455, 2015.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.10 , Issue.7 , pp. 1442-1455
    • Xiong, H.1    Qin, Z.2
  • 22
    • 85006189359 scopus 로고    scopus 로고
    • Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
    • Z. Eslami and N. Pakniat, "Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model," Journal of King Saud University-Computer and Information Sciences, vol. 26, no. 3, pp. 276-286, 2014.
    • (2014) Journal of King Saud University-Computer and Information Sciences , vol.26 , Issue.3 , pp. 276-286
    • Eslami, Z.1    Pakniat, N.2
  • 23
    • 85018460561 scopus 로고    scopus 로고
    • Lightweight threefactor authentication and key agreement protocol for internetintegrated wireless sensor networks
    • Q. Jiang, S. Zeadally, J. Ma, and D. He, "Lightweight threefactor authentication and key agreement protocol for internetintegrated wireless sensor networks," IEEE Access, vol. 5, pp. 3376-3392, 2017.
    • (2017) IEEE Access , vol.5 , pp. 3376-3392
    • Jiang, Q.1    Zeadally, S.2    Ma, J.3    He, D.4
  • 24
    • 84986267432 scopus 로고    scopus 로고
    • Advanced secure anonymous authentication scheme for roaming service in globalmobility networks
    • C.-C. Lee, Y.-M. Lai, C.-T. Chen, and S.-D. Chen, "Advanced Secure Anonymous Authentication Scheme for Roaming Service in GlobalMobility Networks,"Wireless Personal Communications, vol. 94, no. 3, pp. 1281-1296, 2017.
    • (2017) Wireless Personal Communications , vol.94 , Issue.3 , pp. 1281-1296
    • Lee, C.-C.1    Lai, Y.-M.2    Chen, C.-T.3    Chen, S.-D.4
  • 25
    • 85021731374 scopus 로고    scopus 로고
    • An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city
    • X. Li, A. K. Sangaiah, S. Kumari, F. Wu, J. Shen, and M. K. Khan, "An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city," Personal and Ubiquitous Computing, vol. 21, no. 5, pp. 791-805, 2017.
    • (2017) Personal and Ubiquitous Computing , vol.21 , Issue.5 , pp. 791-805
    • Li, X.1    Sangaiah, A.K.2    Kumari, S.3    Wu, F.4    Shen, J.5    Khan, M.K.6
  • 26
    • 84938203681 scopus 로고    scopus 로고
    • Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
    • D. Wang, N. Wang, P. Wang, and S. Qing, "Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity," Information Sciences, vol. 321, Article ID 11496, pp. 162-178, 2015.
    • (2015) Information Sciences , vol.321 , pp. 162-178
    • Wang, D.1    Wang, N.2    Wang, P.3    Qing, S.4
  • 27
    • 84930202100 scopus 로고    scopus 로고
    • Cost-effective scalable and anonymous certificateless remote authentication protocol
    • H. Xiong, "Cost-effective scalable and anonymous certificateless remote authentication protocol," IEEE Transactions on Information Forensics & Security, vol. 9, no. 12, pp. 2327-2339, 2014.
    • (2014) IEEE Transactions on Information Forensics & Security , vol.9 , Issue.12 , pp. 2327-2339
    • Xiong, H.1
  • 29
    • 84875455431 scopus 로고    scopus 로고
    • Improving timing attack on RSA-CRT via error detection and correction strategy
    • C. Chen, T. Wang, and J. Tian, "Improving timing attack on RSA-CRT via error detection and correction strategy," Information Sciences, vol. 232, pp. 464-474, 2013.
    • (2013) Information Sciences , vol.232 , pp. 464-474
    • Chen, C.1    Wang, T.2    Tian, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.