Salami et al., 2024 - Google Patents
A new secure offloading approach for internet of vehicles in fog-cloud federationSalami et al., 2024
View HTML- Document ID
- 3560014391543971662
- Author
- Salami Y
- Khajehvand V
- Zeinali E
- Publication year
- Publication venue
- Scientific Reports
External Links
Snippet
Abstract The Internet of Vehicles (IoV) plays a crucial role in advancing intelligent transportation systems. However, due to limited processing power, IoV faces challenges in independently handling large volumes of data, necessitating the use of offloading as a …
- 238000013459 approach 0 title abstract description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Waheed et al. | Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures | |
Harbi et al. | A review of security in internet of things | |
Alfandi et al. | A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues | |
Wazid et al. | Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services | |
Wazid et al. | Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap | |
Shahidinejad et al. | Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment | |
Ferrag et al. | Blockchain technologies for the internet of things: Research issues and challenges | |
Tanveer et al. | LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of Drone environment | |
Tuna et al. | A survey on information security threats and solutions for Machine to Machine (M2M) communications | |
Kumar et al. | A survey on the blockchain techniques for the Internet of Vehicles security | |
Nayak et al. | Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview | |
Lin et al. | Secure Internet of medical Things (IoMT) based on ECMQV-MAC authentication protocol and EKMC-SCP blockchain networking | |
Rangwani et al. | A secure user authentication protocol based on ECC for cloud computing environment | |
Uppuluri et al. | Secure user authentication and key agreement scheme for IoT device access control based smart home communications | |
Salek et al. | A review on cybersecurity of cloud computing for supporting connected vehicle applications | |
Puthal et al. | Decision tree based user-centric security solution for critical IoT infrastructure | |
Thakur et al. | Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection | |
Agrawal et al. | Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm | |
Idrissi et al. | Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems | |
Kashif et al. | EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things | |
Pathak et al. | Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard | |
Jog et al. | A critical analysis on the security architectures of internet of things: The road ahead | |
Khan et al. | An ECC-based mutual data access control protocol for next-generation public cloud | |
Chen et al. | An improved anonymous DoS-resistant authentication protocol in smart city | |
Haqani et al. | A decentralised blockchain-based secure authentication scheme for IoT devices |