Secure crowd-sensing protocol for fog-based vehicular cloud

[1]  Susana Sargento,et al.  Assessing the reliability of fog computing for smart mobility applications in VANETs , 2019, Future Gener. Comput. Syst..

[2]  Fan Yang,et al.  Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters , 2019, Future Gener. Comput. Syst..

[3]  Satyajayant Misra,et al.  AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge , 2019, IEEE Transactions on Dependable and Secure Computing.

[4]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[5]  MengChu Zhou,et al.  Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..

[6]  Dijiang Huang,et al.  Attribute-based Access Control for ICN Naming Scheme , 2018, IEEE Trans. Dependable Secur. Comput..

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Xiaolin Chang,et al.  Reliable and Secure Vehicular Fog Service Provision , 2019, IEEE Internet of Things Journal.

[9]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[10]  N. Arunkumar,et al.  Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..

[11]  Donghyun Kim,et al.  Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds , 2018, IEEE Internet of Things Journal.

[12]  Sitalakshmi Venkatraman,et al.  Use of Data Visualisation for Zero-Day Malware Detection , 2018, Secur. Commun. Networks.

[13]  H. Vincent Poor,et al.  Mobile Crowdsensing Games in Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.

[14]  Sudip Misra,et al.  Theoretical modelling of fog computing: a green computing paradigm to support IoT applications , 2016, IET Networks.

[15]  Athanasios V. Vasilakos,et al.  Design of secure key management and user authentication scheme for fog computing services , 2019, Future Gener. Comput. Syst..

[16]  Kang Kai,et al.  Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues , 2016 .

[17]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[18]  Jiguo Li,et al.  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.

[19]  Mamoun Alazab,et al.  Intelligent mobile malware detection using permission requests and API calls , 2020, Future Gener. Comput. Syst..

[20]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[21]  Rong Yu,et al.  Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[22]  Yixian Yang,et al.  Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.

[23]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[24]  Heekuck Oh,et al.  Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks , 2014, J. Inf. Process. Syst..

[25]  Baowen Xu,et al.  An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Muhammad Bilal,et al.  Time Aware Least Recent Used (TLRU) cache management policy in ICN , 2014, 16th International Conference on Advanced Communication Technology.

[27]  Senlin Luo,et al.  Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges , 2020, IEEE Communications Surveys & Tutorials.

[28]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[29]  Stephan Olariu,et al.  Taking VANET to the clouds , 2011, Int. J. Pervasive Comput. Commun..

[30]  Mohsen Guizani,et al.  A blockchain-based architecture for secure vehicular Named Data Networks , 2020, Comput. Electr. Eng..

[31]  Thiago H. Silva,et al.  Towards scalable mobile crowdsensing through device-to-device communication , 2018, J. Netw. Comput. Appl..

[32]  Bayu Adhi Tama,et al.  A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[33]  Young-Sik Jeong,et al.  s-ITSF: a service based intelligent transportation system framework for smart accident management , 2015, Human-centric Computing and Information Sciences.

[34]  Chi Harold Liu,et al.  Towards secure and privacy preserving collision avoidance system in 5G fog based Internet of Vehicles , 2019, Future Gener. Comput. Syst..

[35]  Yuanqing Xia,et al.  Incentive mechanism in platform-centric mobile crowdsensing: A one-to-many bargaining approach , 2018, Comput. Networks.

[36]  Jiguo Li,et al.  KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.

[37]  Mohsen Guizani,et al.  Security and privacy preservation in fog-based crowd sensing on the internet of vehicles , 2019, J. Netw. Comput. Appl..

[38]  Syh-Yuan Tan Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things” , 2018, IEEE Access.

[39]  Stephan Olariu,et al.  Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..

[40]  S. Razak,et al.  A survey on Vehicular Ad Hoc Networks routing protocols , 2009 .

[41]  Yuguang Fang,et al.  Optimal Task Recommendation for Mobile Crowdsourcing With Privacy Control , 2016, IEEE Internet of Things Journal.

[42]  Jian Shen,et al.  User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage , 2018, IEEE Systems Journal.

[43]  Qi Li,et al.  Capability-Based Security Enforcement in Named Data Networking , 2017, IEEE/ACM Transactions on Networking.

[44]  Md. Rafiqul Islam,et al.  A Hybrid Wrapper-Filter Approach for Malware Detection , 1969, J. Networks.

[45]  David Pointcheval,et al.  Dynamic Threshold Public-Key Encryption , 2008, CRYPTO.

[46]  Sangheon Pack,et al.  Secure Distribution of Protected Content in Information-Centric Networking , 2019, IEEE Systems Journal.

[47]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[48]  Yuguang Fang,et al.  Smart Cities on Wheels: A Newly Emerging Vehicular Cognitive Capability Harvesting Network for Data Transportation , 2018, IEEE Wireless Communications.

[49]  Frédéric Le Mouël,et al.  Efficient Vehicular Crowdsourcing Models in VANET for Disaster Management , 2020, 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring).

[50]  Muhammad Bilal,et al.  A Cache Management Scheme for Efficient Content Eviction and Replication in Cache Networks , 2017, IEEE Access.

[51]  Mamoun Alazab,et al.  Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies , 2019, IEEE Transactions on Big Data.

[52]  Mario Gerla,et al.  Vehicular cloud networking: architecture and design principles , 2014, IEEE Communications Magazine.

[53]  Abderrahmane Lakas,et al.  Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[54]  Silvia Giordano,et al.  The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds , 2013 .

[55]  M. Shamim Hossain,et al.  Cloudlet-Based Intelligent Auctioning Agents for Truthful Autonomous Electric Vehicles Energy Crowdsourcing , 2020, IEEE Transactions on Vehicular Technology.

[56]  Aiqing Zhang,et al.  Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.

[57]  Muhammad Bilal,et al.  Network-Coding Approach for Information-Centric Networking , 2018, IEEE Systems Journal.

[58]  Nadjib Badache,et al.  Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..

[59]  Fuchun Guo,et al.  Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes , 2016, International Journal of Information Security.

[60]  Amir Qayyum,et al.  VANET Architectures and Protocol Stacks: A Survey , 2011, Nets4Cars/Nets4Trains.

[61]  Yifei Zhang,et al.  Data driven business rule generation based on fog computing , 2018, Future Gener. Comput. Syst..