2022
DOI: 10.1109/jiot.2021.3065970
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Personalized Edge Computing Services in 6G Heterogeneous Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 64 publications
(24 citation statements)
references
References 39 publications
0
24
0
Order By: Relevance
“…In [23], the authors explore the application of Blockchain (BC) technology alongside ML in order to protect vehicular networks from cyber attacks. Similarly, in [24] the authors use a smart contract architecture in heterogeneous vehicular networks for collaboratively performing tasks between moving vehicles and parked vehicles. The smart transactions consider the characteristics of both the network and the attack models for improving security.…”
Section: Securitymentioning
confidence: 99%
“…In [23], the authors explore the application of Blockchain (BC) technology alongside ML in order to protect vehicular networks from cyber attacks. Similarly, in [24] the authors use a smart contract architecture in heterogeneous vehicular networks for collaboratively performing tasks between moving vehicles and parked vehicles. The smart transactions consider the characteristics of both the network and the attack models for improving security.…”
Section: Securitymentioning
confidence: 99%
“…Moreover, given little vision of 6G concepts at the time of the studies of [21], [22], many predictions on the security issues for next-generation networks favor referring to conventional threats such as side-channel attacks and Distributed Denial-of-Service (DDoS) attacks. Several field surveys such as security in 6G heterogeneous vehicular networks [23], tactile Internet [20], security in edge-computing-assisted IoT networks [24] indicate that ultra-high reliability and real-time protection will be key requirements of many applications in future networks. However, 6G communication models and security architecture are not explicitly included in the discussions of the surveys.…”
Section: Structure Of the Papermentioning
confidence: 99%
“…However, since vehicles can dynamically and independently move, the direct transmission is very challenging. Thus, routing protocol is considered as one of the possible solutions to establish the route in vehicular ad-hoc networks (VANETs) [ 3 , 4 , 5 ]. In addition, the clustering protocols can enhance the stability of networks by making the clustering and electing the cluster head that can communicate with different cluster heads [ 6 ].…”
Section: Introductionmentioning
confidence: 99%