College of Engineering: المرسلات الحديثة
السجلات المعروضة 3081 -- 3100 من 8730
-
Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid
( IEEE Computer Society , 2020 , Article)In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, and mutual authentication, with reduced energy, communicational, and computational overheads, is proposed for resource-constrained ... -
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
( IEEE Computer Society , 2020 , Article)Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ... -
ELC: Edge Linked Caching for content updating in information-centric Internet of Things
( Elsevier B.V. , 2020 , Article)Internet of things (IoT) has enabled every thing around us to have an Internet connection. In the future, IoT will generate more content than any other network. It is estimated that about 27 billion Internet enabled devices ... -
A High-Availability Data Collection Scheme based on Multi-AUVs for Underwater Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this paper, a high-availability data collection scheme based on multiple autonomous underwater vehicles (AUVs) (HAMA) is proposed to improve the performance of the sensor network and guarantee the high availability of ... -
DAGIoV: A Framework for Vehicle to Vehicle Communication Using Directed Acyclic Graph and Game Theory
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Data sharing and content offloading among vehicles is an imperative part of the Internet of Vehicles (IoV). A peer-to-peer connection among vehicles in a distributed manner is a highly promising solution for fast communication ... -
Power Allocation for D2D Communications with SWIPT
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Power allocation plays a vital role in coordinating interference between Device-to-Device (D2D) and cellular communications, and when power allocation meets simultaneous wireless information and power transfer (SWIPT), the ... -
Toward Incentivizing Fog-Based Privacy-Preserving Mobile Crowdsensing in the Internet of Vehicles
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In the face of a massive number of vehicular users, a data collection paradigm based on vehicular crowdsensing requires an effective means of attracting participants. Thus, the incentive mechanisms play a key role in ... -
A Distributed Mobile Fog Computing Scheme for Mobile Delay-Sensitive Applications in SDN-Enabled Vehicular Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)With the rapid development of intelligent transportation systems, enormous amounts of delay-sensitive vehicular services have been emerging and challenge both the architectures and protocols of vehicular networks. However, ... -
A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The goal of intelligent transport systems (ITSs) is to enhance the network performance of vehicular ad hoc networks (VANETs). Even though it presents new opportunities to the Internet of Vehicles (IoV) environment, there ... -
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ... -
A Distributed Framework for Energy Trading between UAVs and Charging Stations for Critical Applications
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Use of Unmanned Aerial Vehicles (UAVs) is rapidly increasing in various domains such as disaster management, delivery of goods, surveillance, military, etc. Significant issues in the expansion of UAV-based applications are ... -
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ... -
Cloudlet-Based Intelligent Auctioning Agents for Truthful Autonomous Electric Vehicles Energy Crowdsourcing
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)This paper proposes cloudlet-based intelligent agents for energy crowdsourcing from autonomous electric vehicles (AEVs). Existing energy crowdsourcing mechanisms focus on load shedding and cost savings, but lack incentive ... -
A Differentially Private Classification Algorithm with High Utility for Wireless Body Area Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The advancement of the wireless body area networks (WBAN) and sensor technologies allows us to collect a variety of physiological and behavioral data from human body. And appropriate application of machine learning methods ... -
Applications of blockchain in unmanned aerial vehicles: A review
( Elsevier Inc. , 2020 , Article)The recent advancement in Unmanned Aerial Vehicles (UAVs) in terms of manufacturing processes, and communication and networking technology has led to a rise in their usage in civilian and commercial applications. The ... -
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
( Elsevier B.V. , 2020 , Article)Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ... -
Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)With the development of communication technologies, vehicular network applications have evolved from basic traffic safety and efficiency applications to information and entertainment applications. The implementation of ... -
Key-policy attribute-based encryption with keyword search in virtualized environments
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ... -
A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)With rapid advances in satellite technology, space information network (SIN) has been proposed to meet the increasing demands of ubiquitous mobile communication due to its advantages in providing extensive access services. ... -
IntegrityChain: Provable data possession for decentralized storage
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data ...