SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained m...

متن کامل

Efficient authentication and access control of message dissemination over vehicular ad hoc network

Recently, security and privacy have been one of the main concerns that impedes the development of vehicular ad hoc networks (VANETs). In this paper, we put forward an access control with authentication scheme for disseminated messages in VANETs. In the scheme, we integrate pseudonym with identity based signature (IBS) which could not only authenticate the messages in vehicular communication, bu...

متن کامل

A Secure Aggregated Message Authentication Scheme for Vehicular

Vehicular ad hoc networks (VANETs) are an emerging area of interest for the security community. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, security issues of VANETs are very challenging, especially on how to ensure the authenticity of emergency messages efficiently. In this paper, we propose a secure a...

متن کامل

A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation

A Secure cloud computing is been proposed using access control which is attribute based encryption along with unspecified authentication of the user from security point of view and user revocation. In proposed system two key distribution centers are used and number of KDC can be increased depending on how many users are there. Decentralized approach is used in this paper as this approach proves...

متن کامل

Two Factor Authentication Access Control for Web Based Cloud Computing

1PG Student, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India 2Assistant Professor, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India 3Professor, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India 4Professor & HOD, Department of CSE, Global Academy of Technology, Bengaluru, Karnataka, India ------------------------...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2018

ISSN: 1424-8220

DOI: 10.3390/s18020666