BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach
暂无分享,去创建一个
[1] Azzedine Boukerche,et al. Vehicular cloud computing: Architectures, applications, and mobility , 2018, Comput. Networks.
[2] LiuYang,et al. Incentive mechanism for computation offloading using edge computing , 2017 .
[3] Dujuan Yang,et al. Relationship between rural built environment and household vehicle ownership: an empirical analysis in rural Sichuan, China , 2018 .
[4] Sriram Chellappan,et al. Detecting Sybil attacks in vehicular networks , 2014, Journal of Trust Management.
[5] Thomas Engel,et al. Enabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers , 2015, Veh. Commun..
[6] Depeng Jin,et al. Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.
[7] Nai-Wei Lo,et al. A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[8] Zibin Zheng,et al. NutBaaS: A Blockchain-as-a-Service Platform , 2019, IEEE Access.
[9] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[10] Fabrice Benhamouda,et al. Security of the J-PAKE Password-Authenticated Key Exchange Protocol , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Xin Wang,et al. A Robust Detection of the Sybil Attack in Urban VANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.
[12] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..
[13] Nicholas R. Jennings,et al. Certified reputation: how an agent can trust a stranger , 2006, AAMAS '06.
[14] M. Hallenbeck,et al. VEHICLE VOLUME DISTRIBUTIONS BY CLASSIFICATION , 1997 .
[15] Xia Feng,et al. A method for defensing against multi-source Sybil attacks in VANET , 2017, Peer-to-Peer Netw. Appl..
[16] Willy Susilo,et al. Secure Message Communication Protocol Among Vehicles in Smart City , 2018, IEEE Transactions on Vehicular Technology.
[17] Shangguang Wang,et al. Architecture and key technologies for Internet of Vehicles: a survey , 2017, Journal of Communications and Information Networks.
[18] Song Guo,et al. Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System , 2020, IEEE Transactions on Industrial Informatics.
[19] Javier López,et al. Modelling trust dynamics in the Internet of Things , 2017, Inf. Sci..
[20] Usman Qamar,et al. Using Blockchain for Electronic Health Records , 2019, IEEE Access.
[21] Nan Zhang,et al. A resource-sharing model based on a repeated game in fog computing , 2017, Saudi journal of biological sciences.
[22] J. Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SimuTools.
[23] Sayem Chaklader,et al. Bridging Digital Divide: ‘Village wireless LAN’, a low cost network infrastructure solution for digital communication, information dissemination & education in rural Bangladesh , 2013, 2013 2nd International Conference on Advances in Electrical Engineering (ICAEE).
[24] Masahiro Mambo,et al. Bidding Price-Based Transaction: Trust Establishment for Vehicular Fog Computing Service in Rural Area , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[25] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[26] Xiaolin Chang,et al. Reliable and Secure Vehicular Fog Service Provision , 2019, IEEE Internet of Things Journal.
[27] Heena Rathore,et al. Sociopsychological trust model for Wireless Sensor Networks , 2016, J. Netw. Comput. Appl..
[28] Jianfeng Ma,et al. LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment , 2016, KSII Trans. Internet Inf. Syst..
[29] Damla Turgut,et al. Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[30] Chinnappan Jayakumar,et al. Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) , 2018, Wirel. Networks.
[31] Olivier Heen,et al. AN INDUSTRIAL AND ACADEMIC JOINT EXPERIMENT ON AUTOMATED VERIFICATION OF A SECURITY PROTOCOL , 2008 .
[32] Jean Louis Fendji Kedieng Ebongue,et al. Rural Wireless Mesh Network: A Design Methodology , 2015, ArXiv.
[33] ByungKwan Lee,et al. A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET , 2013 .
[34] Mahadev Satyanarayanan,et al. Live Synthesis of Vehicle-Sourced Data Over 4G LTE , 2017, MSWiM.
[35] Thomas Genet. A Short SPAN+AVISPA Tutorial , 2015 .
[36] Li-Der Chou,et al. Blockchain-Based Traffic Event Validation and Trust Verification for VANETs , 2019, IEEE Access.
[37] Emmanuel Ndashimye,et al. Vehicle-to-infrastructure communication over multi-tier heterogeneous networks: A survey , 2017, Comput. Networks.
[38] Seung Yeob Nam,et al. Regional Blockchain for Vehicular Networks to Prevent 51% Attacks , 2019, IEEE Access.
[39] Daniel F. Macedo,et al. Vehicular networks using the IEEE 802.11p standard: An experimental analysis , 2014, Veh. Commun..
[40] Ciprian Dobre,et al. Trust and reputation management for opportunistic dissemination , 2017, Pervasive Mob. Comput..
[41] Masahiro Mambo,et al. A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment , 2019, IEEE Access.
[42] Daniel F. Macedo,et al. SNVC: Social networks for vehicular certification , 2016, Comput. Networks.