2014
DOI: 10.1016/j.jnca.2013.08.004
|View full text |Cite
|
Sign up to set email alerts
|

A survey on vehicular cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
341
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 656 publications
(343 citation statements)
references
References 62 publications
0
341
0
2
Order By: Relevance
“…All those can be considered as VANET-based cloud/edge computing. A recent survey paper on Vehicular cloud computing (VCC) technology introduced not only the applications for Intelligent Transport Systems such as safe-and eco-driving, efficient V2V communications, traffic congestion control, and parking resource management, but also other applications ranging from shopping mall data center to VCC technology in developing countries perspective [30]. Another report also classified the emerging VANET applications and provided a list of recent industrial and academic projects [18].…”
Section: Vanet Wsn and Scf Networkingmentioning
confidence: 99%
“…All those can be considered as VANET-based cloud/edge computing. A recent survey paper on Vehicular cloud computing (VCC) technology introduced not only the applications for Intelligent Transport Systems such as safe-and eco-driving, efficient V2V communications, traffic congestion control, and parking resource management, but also other applications ranging from shopping mall data center to VCC technology in developing countries perspective [30]. Another report also classified the emerging VANET applications and provided a list of recent industrial and academic projects [18].…”
Section: Vanet Wsn and Scf Networkingmentioning
confidence: 99%
“…On the other hand, a huge pool of smart vehicles is often left unexploited in the parking lot of shopping centers for extended period of time. These vehicles can be envisioned as auxiliary computing resource and can serve myriad of users [9].…”
Section: Introductionmentioning
confidence: 99%
“…The public key certificates are used in the public key encryptionbased communications [8], [9]. As the authors of [10] say, the most challenging part of cryptographic algorithms or applications in vehicular network is key management and the Vehicular Public Key Infrastructure (VPKI) is one of the most important schemes to provide key management among vehicles. Generally, to verify the validity of certificates, the certificate revocation list (CRL) is published by the certificate authority (CA).…”
Section: Introductionmentioning
confidence: 99%
“…The forwarders receive the CRL packets and broadcast them to the other forwarders and sinks by IVC [11], [12]. Although certificate revocation is one of the most significant ways to protect data against an attacker, CRL has several drawbacks: the length of list can be very long and the lifetime of certificates can be very short [10].…”
Section: Introductionmentioning
confidence: 99%