2020
DOI: 10.1109/access.2020.2969715
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Access Control Model With Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles

Abstract: Secure localization of vehicles is gaining the attention of researchers from both academia and industry especially due to the emergence of internet of things (IoT). The modern vehicles are usually equipped with circuitries that gives connectivity with other vehicles and with cellular networks such as 4G/Fifth generation cellar network (5G). The challenge of secure localization and positioning is magnified further with the invention of technologies such as autonomous or driverless vehicles based on IoT, satelli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 49 publications
0
19
0
Order By: Relevance
“…9C . Moreover, the permission assignment time is compared with other similar models such as permission-based dynamic RBAC (PDRBAC) ( Aftab et al, 2019 ) and hybrid access control model (HAC) ( Aftab et al, 2020 ). The variable permission assignment time of PDRBAC (blue bars) is comparatively better than the HAC model (brown bars).…”
Section: Simulation and Discussionmentioning
confidence: 99%
“…9C . Moreover, the permission assignment time is compared with other similar models such as permission-based dynamic RBAC (PDRBAC) ( Aftab et al, 2019 ) and hybrid access control model (HAC) ( Aftab et al, 2020 ). The variable permission assignment time of PDRBAC (blue bars) is comparatively better than the HAC model (brown bars).…”
Section: Simulation and Discussionmentioning
confidence: 99%
“…The suggested technique reduces overall response time and lowers the total cost significantly. Cache management strategies are designed and evaluated in few publications [155][156][157][158]. A probability-based scoring method, a hierarchical or tiered, approach, and improvements to previously existing approaches are among the algorithms.…”
Section: Resource Allocationmentioning
confidence: 99%
“…e same is true for studies on end-to-end security framework development of the Constrained Application Protocol (CoAP) [93][94][95] and on frameworks in which smart-object users designate privacy preferences to protect personal information generated and consumed by smart objects [96]. Smart objects that have recently attracted attention are vehicles that are equipped with various sensor devices, actuators, GPS (global positioning system) receivers, and micro-embedded computers to collect, process, and transmit vast amounts of data [97,98]. Vehicular sensor networks provide connected sensor devices that collect data and enable safer and more fluid road traffic [99].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%