2018
DOI: 10.1109/access.2017.2778502
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…Part of the aim of privacy and security researchers in this area is to ensure "privacy-by-design" [39]. End-to-end (E2E) encryption [40,41] is vital to harden communications across the network, so malicious actors cannot passively collect information in transit. In addition to E2E encryption, obfuscation techniques related to the location metadata of the data collection agent [42][43][44][45] are necessary when the data is being processed at the end of its journey through the communications network.…”
Section: Security and Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…Part of the aim of privacy and security researchers in this area is to ensure "privacy-by-design" [39]. End-to-end (E2E) encryption [40,41] is vital to harden communications across the network, so malicious actors cannot passively collect information in transit. In addition to E2E encryption, obfuscation techniques related to the location metadata of the data collection agent [42][43][44][45] are necessary when the data is being processed at the end of its journey through the communications network.…”
Section: Security and Privacymentioning
confidence: 99%
“…Mobile Spatial Automated Sensing Task Recruitment [38,47] Advanced routing strategies beyond minimizing time traveled; powered through crowd-sourced data X X X [30] Spectrum sensing assignment X [11] Multi-objective task allocation X X [31] Ratings system for crowdsourced workers X [36] Spatial Crowdsourcing Task assignment survey X X [37] Crowdsourcing assignment for mobile crowdsensing X Edge Computing [33,48] Edge computing architectures for mobile crowdsensing X [10,49] Efficient data processing and handling on the edge X [27] Survey of IoT; discussion of edge computing X X X Security/Privacy [40,41] End-to-end encrypted mobile crowdsourcing X [42][43][44][45] Obfuscation of identifying information of crowdsourcing by reducing granularity of data X X X [46] Obfuscation of data in edge computing servers X [39] Perspectives and suggestions of engineering "privacy by design" in smart vehicles X…”
Section: Concept Reference(s) Contribution Crowdsourcing Variantmentioning
confidence: 99%
See 1 more Smart Citation
“…C. Li, S. Gong, X. Wang, L. Wang, Q. Jiang, and K. Okamura [15] used a new Crowd-sourced Vehicular Content-Centric Networking (CVCCN) approach for secure and efficient content distribution. The developed methodology enabled the nearby vehicles in order to crowd-source the radio links and caching resources for cooperative content distribution.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [30], a crowd-sourced vehicular content-centric networking (CVCCN) framework is proposed to improve efficiency in content distribution. Identity-based proxy reencryption and named function networking are incorporated in this framework to improve security in content sharing and to preserve privacy of the vehicles.…”
Section: Related Workmentioning
confidence: 99%