2019
DOI: 10.1109/mce.2019.2892285
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…The physical interface should be protected to software access to hardware. D2D system should be protected using intrusion detection systems by Flooding attacks, like, sleep deprivation attacks at multiple levels [108], [109]. In mid-level solutions, replication attacks are avoided by presenting time stamp and section check through the hash chain.…”
Section: Countermeasures Solutions To Security Threats In Ddmentioning
confidence: 99%
See 1 more Smart Citation
“…The physical interface should be protected to software access to hardware. D2D system should be protected using intrusion detection systems by Flooding attacks, like, sleep deprivation attacks at multiple levels [108], [109]. In mid-level solutions, replication attacks are avoided by presenting time stamp and section check through the hash chain.…”
Section: Countermeasures Solutions To Security Threats In Ddmentioning
confidence: 99%
“…In [109], authors suggested encoding authentication solution and architecture. The suggested solution are centralized cloud server included authentication, edge devices supported authentication, and network access devices assisted authentication.…”
Section: A Encoding Authentication In Discoverymentioning
confidence: 99%
“…Based on literature [9,27], we propose a distributed fine-grained access control scheme with outsourced computation in fog computing for electronic health records. Gope et al [28] proposed a new secure communication architecture for fog computing. The authors introduced an extended concept of fog computing.…”
Section: Introductionmentioning
confidence: 99%
“…Edge device and fog device were regarded as extensive fog computing layer. Moreover, the scheme in literature [28] can reduce the communication cost. The proposed scheme in literature [28] is suitable for resourcelimited IOT device because they use lightweight cryptographic operations, such as one-way hash function and xor operations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation