2016
DOI: 10.1007/s11227-016-1773-0
|View full text |Cite
|
Sign up to set email alerts
|

Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing

Abstract: Intelligent transportation systems seek to maximize the usage of data generated by the vehicles for road users assistance. Combining vehicular ad hoc network with cloud computing makes it easy for the fixed infrastructures along the roads to collect and analyze safety messages for the benefits of the road users and the transportation authorities. However, security features need to be fully assessed before the adoption of such applications. In this paper, we present a secure vehicle traffic data dissemination a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…It can help vehicles to judge whether an event message can be trusted or not, and it can help the reputation management center to calculate trust values of all vehicles. The authors in Reference [7] present a secure vehicle traffic data dissemination and analysis protocol in VCC, where they adopt the pseudonym technique to preserve vehicles privacy. An anonymous credential approach is used to generate vehicles' authorization.…”
Section: Lacks Of Messages Integritymentioning
confidence: 99%
“…It can help vehicles to judge whether an event message can be trusted or not, and it can help the reputation management center to calculate trust values of all vehicles. The authors in Reference [7] present a secure vehicle traffic data dissemination and analysis protocol in VCC, where they adopt the pseudonym technique to preserve vehicles privacy. An anonymous credential approach is used to generate vehicles' authorization.…”
Section: Lacks Of Messages Integritymentioning
confidence: 99%
“…The correctness of the proposed scheme is verified against various schemes. Similarly, ID-based signature technique for information verification in the VCC is developed in [28]. In the proposed scheme, the signature verification is carried out with the help of the pseudonymous revocation and batch verification techniques.…”
Section: Related Workmentioning
confidence: 99%
“…To deal with this, cloud computing is best suited for a vehicular network, but security for the flow of data between the cloud and roadside units is a challenge. Thus, secure vehicle traffic data dissemination and analysis for cloud-based VANETs were proposed [21]. The proposed scheme applies privacy to the identification of a vehicle and its data flow through a pseudonym mechanism.…”
Section: Related Workmentioning
confidence: 99%