Secure Intelligent Vehicular Network Using Fog Computing
نویسندگان
چکیده
منابع مشابه
Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, th...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملSecure Authentication for Vehicular Ad Hoc Network
Security is an important issue in ad hoc networks, especially fo r security sensitive applicat ions. This paper main ly focus the authentication based on the group signature for providing the security and privacy in vehicular ad hoc networks (VANET). In VANETs, g roup signature is widely used for vehicles to achieve unauthenticated vehicles. A group signature scheme allows members of a group to...
متن کاملSecure Relative Location Determination in Vehicular Network
Relative location information is very useful in vehicular networks although it is vulnerable to various attacks. Many techniques have been proposed for relative positioning and location verification. Due to the high speed and the strict security requirements, the existing relative positioning and location verification techniques are not directly applicable to vehicular networks. Hence we presen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2019
ISSN: 2079-9292
DOI: 10.3390/electronics8040455