2017
DOI: 10.3390/s17102191
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks

Abstract: In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is consi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 48 publications
0
6
0
Order By: Relevance
“…The current literature that addressed fog computing focuses on three main issues: (1) the quality of service (QoS) which is deemed to be used in order to measure the performance of different entities such as the mobile operators within the fog architecture; (2) the quality of experience (QoE) was also widely researched on to depict the experience met by the end-users on top of the quality of service; (3) the security, privacy challenges and access control issues were researched on for a range of applications from mobile, cloud and IoT based environments. Nevertheless, the majority of the existing work focus on vehicular communications, smart grids and others [19][20][21], there are limited work that address both access control, security, privacy preserving and fog-based scalability for the PHR systems. One of the relevant work in the domain was conducted by the authors in [5].…”
Section: Fog Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…The current literature that addressed fog computing focuses on three main issues: (1) the quality of service (QoS) which is deemed to be used in order to measure the performance of different entities such as the mobile operators within the fog architecture; (2) the quality of experience (QoE) was also widely researched on to depict the experience met by the end-users on top of the quality of service; (3) the security, privacy challenges and access control issues were researched on for a range of applications from mobile, cloud and IoT based environments. Nevertheless, the majority of the existing work focus on vehicular communications, smart grids and others [19][20][21], there are limited work that address both access control, security, privacy preserving and fog-based scalability for the PHR systems. One of the relevant work in the domain was conducted by the authors in [5].…”
Section: Fog Computingmentioning
confidence: 99%
“…We assume that 𝕋 is minimum cover set of T, and 𝕋 is set to contain several time intervals stated as Κ = (𝜅 1 , 𝜅 2 , , , , 𝜅 𝑛 ) . Therefore, practically, the private key can have a time validation such as 𝕋{(2020,06,20), (2020,06,21)…”
Section: Private Key Generationmentioning
confidence: 99%
“…For interactions between CAVs and RSUs , we utilize the IEEE802.11p communication standard which has been widely used to enable vehicle-to-vehicle and vehicle-to-infrastructure communications [4]. However, 5G is envisaged to bring about a new vehicular communication era with higher reliability, expedited data transmissions and reduced delay [5]. Also, we utilise PKI to issue identifiable digital identities to entities and establish secure communication channels for permissible communication.…”
Section: B Network Modelmentioning
confidence: 99%
“…5,600,0000 represents the number of cars in the state of New South Wales, according to www.abs.gov.au…”
mentioning
confidence: 99%
“…We compare computation overheads for the proposed system with related schemes [20,44,45], using the parameters from [46,47]. Bilinear pairing, Tbp=4.211 ms.Scalar multiplication with bilinear pairing,Tsm-bp=1.709 ms.Point addition with bilinear pairing, Tpa-bp=0.007 ms.Scalar multiplication with elliptic curve cryptography, Tsmecc=0.442 ms.Point addition with elliptic curve cryptography, Tpaecc=0.0018 ms.Encryption with elliptic curve cryptography, Tencecc=1.17 ms.Decryption with elliptic curve cryptography, Tdececc=0.61 ms.Hash, Th=0.0001 ms.Map-to-point,Tmtp=4.302 ms.…”
Section: Performance Analysismentioning
confidence: 99%