Distributed Key Generation for Secure Communications Between Different Actors in Service Oriented Highly Dense VANET

[1]  G. Gong,et al.  Ultra-Lightweight Cryptography for Low-Cost RFID Tags : Hummingbird Algorithm and Protocol , 2009 .

[2]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[3]  Jyotir Moy Chatterjee,et al.  Fog Computing and Its security issues , 2019, Security Designs for the Cloud, Iot, and Social Networking.

[4]  Muhammad Rizwan Ghori,et al.  Vehicular ad-hoc network (VANET): Review , 2018, 2018 IEEE International Conference on Innovative Research and Development (ICIRD).

[5]  Manoj Kumar,et al.  Security of Vehicular Ad-Hoc Networks (VANET): A survey , 2020 .

[6]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[7]  Ria Das,et al.  Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques , 2016, 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).

[8]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[9]  Daniel W. Engels,et al.  The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.

[10]  Rajendra Kumar,et al.  Generating Random Binary Bit Sequences for Secure Communications between Constraint Devices under the IOT Environment , 2020, 2020 International Conference for Emerging Technology (INCET).

[11]  Masaya Yoshikawa,et al.  Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).

[12]  Singh Internet of Things – Technology Adoption Model in India , 2022 .

[13]  Talal Al-Kharobi,et al.  Performance Evaluation and Review of Lightweight Cryptography in an Internet-of-Things Environment , 2019, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).

[14]  Siu-Ming Yiu,et al.  SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.

[15]  Hongyang Zhang,et al.  Vehicular Ad Hoc Networks: Architectures, Research Issues, Methodologies, Challenges, and Trends , 2015, Int. J. Distributed Sens. Networks.

[16]  Marco Aurélio Spohn,et al.  VANETs' research over the past decade: overview, credibility, and trends , 2018, CCRV.

[17]  Mu-En Wu,et al.  A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions , 2014, RFIDSec Asia.

[18]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[19]  Aditi Garg,et al.  Security on Vehicular Ad Hoc Networks (VANET) : A Review Paper , 2013 .

[20]  Narinder K. Seera,et al.  Perspective of Database Services for Managing Large-Scale Data on the Cloud: A Comparative Study , 2015 .