2016
DOI: 10.1109/tvt.2016.2541862
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks

Abstract: Abstract-Vehicular networks are one of the main technologies that will be leveraged by the arrival of the future fifth generation (5G) mobile cellular networks. While scalability and latency are the major drawbacks of IEEE 802.11p and 4G LTE enabled vehicular communications, respectively, the 5G technology is a promising solution to empower the real-time services offered by vehicular networks. However, the security and privacy of such services in 5G enabled vehicular networks need to be addressed first. In thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 108 publications
(32 citation statements)
references
References 37 publications
0
32
0
Order By: Relevance
“…However, all the afore-mentioned protocols are not based on HetNet architecture such as 5G-enabled vehicular network, where our protocol is built upon. Recently, researchers in [18,19] introduced secure and privacy aware cloud-assisted video reporting service in 5G-Enabled vehicular network. However, as noted in Section 1, their protocols have some limitations.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, all the afore-mentioned protocols are not based on HetNet architecture such as 5G-enabled vehicular network, where our protocol is built upon. Recently, researchers in [18,19] introduced secure and privacy aware cloud-assisted video reporting service in 5G-Enabled vehicular network. However, as noted in Section 1, their protocols have some limitations.…”
Section: Related Workmentioning
confidence: 99%
“…We also use CP-ABE toolkit [54] along with MIRACL [55] library to benchmark the performance of attribute-based encryption. We set the attribution number to 4 by following the reference [18]. The overall operation involved for signing and verifying is illustrated in Table 3.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to Bluetooth and Wi-Fi Direct, D2D has been adopted in the 4G LTE-Advanced standard in 3GPP Release 12 under close proximity services (ProSe) [6,7]. Moreover, D2D is expected to be among the main concepts used in the Fifth Generation (5G) cellular networks [8].…”
Section: Introductionmentioning
confidence: 99%