Search
Now showing items 41-50 of 79
Key-policy attribute-based encryption with keyword search in virtualized environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ...
A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With rapid advances in satellite technology, space information network (SIN) has been proposed to meet the increasing demands of ubiquitous mobile communication due to its advantages in providing extensive access services. ...
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
(
Elsevier B.V.
, 2020 , Article)
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ...
A Distributed Framework for Energy Trading between UAVs and Charging Stations for Critical Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Use of Unmanned Aerial Vehicles (UAVs) is rapidly increasing in various domains such as disaster management, delivery of goods, surveillance, military, etc. Significant issues in the expansion of UAV-based applications are ...
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ...
Cloudlet-Based Intelligent Auctioning Agents for Truthful Autonomous Electric Vehicles Energy Crowdsourcing
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
This paper proposes cloudlet-based intelligent agents for energy crowdsourcing from autonomous electric vehicles (AEVs). Existing energy crowdsourcing mechanisms focus on load shedding and cost savings, but lack incentive ...
A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The goal of intelligent transport systems (ITSs) is to enhance the network performance of vehicular ad hoc networks (VANETs). Even though it presents new opportunities to the Internet of Vehicles (IoV) environment, there ...
A Distributed Mobile Fog Computing Scheme for Mobile Delay-Sensitive Applications in SDN-Enabled Vehicular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of intelligent transportation systems, enormous amounts of delay-sensitive vehicular services have been emerging and challenge both the architectures and protocols of vehicular networks. However, ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
(
IEEE Computer Society
, 2020 , Article)
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ...