2017
DOI: 10.1016/j.ins.2017.05.031
|View full text |Cite
|
Sign up to set email alerts
|

Insight of the protection for data security under selective opening attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(42 citation statements)
references
References 7 publications
0
42
0
Order By: Relevance
“…The fundamental concept of privacy preservation schemes in VANET is to periodically change the pseudonyms. There exists many schemes that have been proposed by researchers in which the concept of changing pseudonym is used to preserve the privacy of user [28][29][30][31][32][33][34][35][36]. Data owners often suppress their data for an untrusted trainer to train a classifier due to privacy concerns.…”
Section: Vanet Security Requirementsmentioning
confidence: 99%
“…The fundamental concept of privacy preservation schemes in VANET is to periodically change the pseudonyms. There exists many schemes that have been proposed by researchers in which the concept of changing pseudonym is used to preserve the privacy of user [28][29][30][31][32][33][34][35][36]. Data owners often suppress their data for an untrusted trainer to train a classifier due to privacy concerns.…”
Section: Vanet Security Requirementsmentioning
confidence: 99%
“…We turn to consider the performance of the second step in (15), given that is selected. The scenarios of successful secrecy transmission can be divided into two cases as follows.…”
Section: Exact Expression On Secrecy Outagementioning
confidence: 99%
“…Due to the broadcast nature of wireless transmission, it is of vital importance to guarantee the transmission security from the application layer [15][16][17][18][19] to physical layer [20,21]. The authors in [22] provided the framework of wiretap channels, which gives a general way to analyze and design the secure physical-layer security.…”
Section: Introductionmentioning
confidence: 99%
“…Using information gained from the IoT could make the environment around us be better cognized [4]. On the other hand, the IoT consists of devices that generate, process, and exchange vast amounts of critical security and safety data as well as privacy-sensitive information and hence are appealing targets for cyberattacks [5][6][7][8]. The task of affordably supporting security and privacy is quite challenging because many new networkable devices, which constitute the IoT, require less energy, are lightweight and have less memory [9].…”
Section: Introductionmentioning
confidence: 99%