Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions
暂无分享,去创建一个
Yaser Jararweh | Moayad Aloqaily | Khaled Salah | Razi Iqbal | Talal Ashraf Butt | K. Salah | M. Aloqaily | Y. Jararweh | R. Iqbal | T. Butt | Moayad Aloqaily
[1] Min Chen,et al. Cognitive Internet of Vehicles , 2018, Comput. Commun..
[2] Oscar Garcia Morchon,et al. Efficient distributed security for wireless medical sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[3] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[4] Rajen Akalu. Privacy, consent and vehicular ad hoc networks (VANETs) , 2018, Comput. Law Secur. Rev..
[5] Claude Castelluccia,et al. I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.
[6] Huirong Fu,et al. Privacy Issues of Vehicular Ad-Hoc Networks , 2010 .
[7] Ahmed Ahmim,et al. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[8] Bin Hu,et al. A City-Wide Real-Time Traffic Management System: Enabling Crowdsensing in Social Internet of Vehicles , 2018, IEEE Communications Magazine.
[9] Yaser Jararweh,et al. An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.
[10] Burak Kantarci,et al. On the Feasibility of Deep Learning in Sensor Network Intrusion Detection , 2019, IEEE Networking Letters.
[11] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[12] Andreas Unterweger,et al. Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions , 2018, Computer Science - Research and Development.
[13] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[14] Carmela Troncoso,et al. PrETP: Privacy-Preserving Electronic Toll Pricing , 2010, USENIX Security Symposium.
[15] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[16] Salil S. Kanhere,et al. BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.
[17] H. T. Mouftah,et al. Vehicle as a resource for continuous service availability in smart cities , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[18] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[19] Sherali Zeadally,et al. Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies , 2015, IEEE Wireless Communications.
[20] Gang Qu,et al. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy , 2019, IEEE Transactions on Intelligent Transportation Systems.
[21] Jong Hyuk Park,et al. Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..
[22] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[23] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[24] Mario Gerla,et al. Securing Vehicle to Vehicle Communications using Blockchain through Visible Light and Acoustic Side-Channels , 2017, ArXiv.
[25] Burak Kantarci,et al. Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications , 2017, IEEE Sensors Letters.
[26] G. Aceto. The social internet of things (SIoT)-When social networks meet the internet of things: Concept, architecture and network characterization , 2017 .
[27] Ian Goldberg,et al. Optimally Robust Private Information Retrieval , 2012, USENIX Security Symposium.
[28] Michael Weber,et al. V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[29] Ankur Taly,et al. Privacy, Discovery, and Authentication for the Internet of Things , 2016, ESORICS.
[30] Wei Cheng,et al. Characterizing privacy leakage of public WiFi networks for users on travel , 2013, 2013 Proceedings IEEE INFOCOM.
[31] H. T. Mouftah,et al. Fairness-Aware Game Theoretic Approach for Service Management in Vehicular Clouds , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[32] Yaser Jararweh,et al. Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments , 2019, IEEE Communications Magazine.
[33] Benjamin I. P. Rubinstein,et al. Privacy Assessment of De-identified Opal Data: A report for Transport for NSW , 2017, ArXiv.
[34] Michael Friedewald,et al. Seven Types of Privacy , 2013, European Data Protection.
[35] Robert K. Cunningham,et al. SoK: Privacy on Mobile Devices – It’s Complicated , 2016, Proc. Priv. Enhancing Technol..
[36] Mauro Conti,et al. A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..
[37] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[38] Kai Zhao,et al. Beyond K-Anonymity: Protect Your Trajectory from Semantic Attack , 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[39] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[40] Serge Gutwirth,et al. European Data Protection: Coming of Age , 2013, European Data Protection.
[41] Sherali Zeadally,et al. Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.
[42] Salil S. Kanhere,et al. A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..
[43] Kejie Lu,et al. Cloud-Assisted Safety Message Dissemination in VANET–Cellular Heterogeneous Wireless Network , 2017, IEEE Systems Journal.
[44] Yih-Chun Hu,et al. Efficient Certificate Revocation List Organization and Distribution , 2011, IEEE Journal on Selected Areas in Communications.
[45] N. Truong,et al. A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .
[46] Reinhard German,et al. SlotSwap: strong and affordable location privacy in intelligent transportation systems , 2011, IEEE Communications Magazine.
[47] Lei Wang,et al. Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions , 2019, IEEE Communications Surveys & Tutorials.
[48] Yiqing Zhou,et al. Heterogeneous Vehicular Networking: A Survey on Architecture, Challenges, and Solutions , 2015, IEEE Communications Surveys & Tutorials.
[49] Wathiq Mansoor,et al. A survey on context-aware vehicular network applications , 2016, Veh. Commun..
[50] Yaser Jararweh,et al. Congestion Mitigation in Densely Crowded Environments for Augmenting QoS in Vehicular Clouds , 2018, DIVANet'18.
[51] Arushi Arora,et al. Block Chain Based Security Mechanism for Internet of Vehicles (IoV) , 2018 .
[52] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[53] Abdulmotaleb El-Saddik,et al. Toward Social Internet of Vehicles: Concept, Architecture, and Applications , 2015, IEEE Access.
[54] Klaus Wehrle,et al. Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.
[55] Jianhua Li,et al. A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle , 2017, IEEE Internet of Things Journal.
[56] Razi Iqbal,et al. Social Internet of Vehicles: Architecture and enabling technologies , 2018, Comput. Electr. Eng..
[57] Hussein T. Mouftah,et al. Connected and Autonomous Electric Vehicles (CAEVs) , 2018, IT Professional.