Secure intelligent traffic light control using fog computing
暂无分享,去创建一个
Jian Shen | Lei Zhang | Yuanfei Zhang | Jiangtao Li | Xinyu Meng | Jian Liu | Feifei Dai | Jian Shen | Jiangtao Li | Jian Liu | Lei Zhang | Yuanfei Zhang | Xinyu Meng | Feifei Dai
[1] Gongjun Yan,et al. An efficient geographic location-based security mechanism for vehicular adhoc networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[2] D. Denning,et al. A Location Based Encryption Technique and Some of Its Applications , 2003 .
[3] Josep Domingo-Ferrer,et al. Practical secure and privacy-preserving scheme for value-added applications in VANETs , 2015, Comput. Commun..
[4] Maythem K. Abbas,et al. Traffic light control using VANET system architecture , 2011, 2011 National Postgraduate Conference.
[5] Kim-Kwang Raymond Choo,et al. A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network , 2014, SecureComm.
[6] Shahaboddin Shamshirband,et al. A Lightweight Radio Propagation Model for Vehicular Communication in Road Tunnels , 2016, PloS one.
[7] Moonseong Kim,et al. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation , 2015, PloS one.
[8] Md. Rafiqul Islam,et al. A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering , 2015, SecureComm.
[9] Josep Domingo-Ferrer,et al. A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[10] Josep Domingo-Ferrer,et al. Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.
[11] Dipak Ghosal,et al. Adaptive Traffic Signal Control With Vehicular Ad hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[12] Brent Waters,et al. New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.
[13] Jalal Almhana,et al. Adaptive Traffic Light Control using VANET: A case study , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[14] Edward Chung,et al. AN EVALUATION OF SCATS MASTER ISOLATED CONTROL , 1998 .
[15] Wann-Ming Wey,et al. Model formulation and solution algorithm of traffic signal control in an urban network , 2000 .
[16] D I Robertson,et al. "TRANSYT" METHOD FOR AREA TRAFFIC CONTROL , 1969 .
[17] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[18] Kuntal Sengupta,et al. Framework for real-time behavior interpretation from traffic video , 2005, IEEE Transactions on Intelligent Transportation Systems.
[19] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[20] Osama Masoud,et al. A vision-based approach to collision prediction at traffic intersections , 2005, IEEE Transactions on Intelligent Transportation Systems.
[21] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[22] Adnan Yazici,et al. An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks , 2016, Ad Hoc Networks.
[23] Lei Zhang,et al. Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[24] Christian Priemer,et al. A decentralized adaptive traffic signal control using V2I communication data , 2009, 2009 12th International IEEE Conference on Intelligent Transportation Systems.
[25] R. D. Bretherton,et al. INTELLIGENT SYSTEMS FOR PRIORITY AT TRAFFIC SIGNALS IN LONDON: THE INCOME PROJECT , 1997 .
[26] Tu Shiliang,et al. A realtime dynamic traffic control system based on wireless sensor network , 2005, 2005 International Conference on Parallel Processing Workshops (ICPPW'05).
[27] Jiannong Cao,et al. Protocols for Traffic Safety Using Wireless Sensor Network , 2007, ICA3PP.
[28] Slobodan Guberinic,et al. Optimal Traffic Control: Urban Intersections , 2007 .
[29] Tuomas Aura. DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion) , 2000, Security Protocols Workshop.
[30] Danda B. Rawat,et al. A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks , 2011, ICIC 2011.
[31] Josep Domingo-Ferrer,et al. Distributed Aggregate Privacy-Preserving Authentication in VANETs , 2017, IEEE Transactions on Intelligent Transportation Systems.