[HTML][HTML] A review on fog computing: issues, characteristics, challenges, and potential applications
Fog computing is a paradigm that utilizes the advantages of both the cloud and the edge
devices providing quality services, reducing latency, providing mobility support, multi …
devices providing quality services, reducing latency, providing mobility support, multi …
An overview of fog computing and edge computing security and privacy issues
AM Alwakeel - Sensors, 2021 - mdpi.com
With the advancement of different technologies such as 5G networks and IoT the use of
different cloud computing technologies became essential. Cloud computing allowed …
different cloud computing technologies became essential. Cloud computing allowed …
Is it really easy to detect sybil attacks in c-its environments: a position paper
B Hammi, YM Idir, S Zeadally… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS)
represent one of the main use case scenarios that aim to improve peoples' daily lives. Thus …
represent one of the main use case scenarios that aim to improve peoples' daily lives. Thus …
Detecting sybil attacks in vehicular fog networks using RSSI and blockchain
S Benadla, OR Merad-Boudia… - … on Network and …, 2022 - ieeexplore.ieee.org
Vehicular Fog Computing (VFC) is a paradigm of vehicular networks that has a set of
advantages such as agility, efficiency, and reduced latency. The VFC is vulnerable to a …
advantages such as agility, efficiency, and reduced latency. The VFC is vulnerable to a …
The impact of sybil attacks on vehicular fog networks
S Benadla, OR Merad-Boudia - 2021 International Conference …, 2021 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is a network that considers vehicles as intelligent machines.
They interact and communicate with each other to improve the performance and safety of …
They interact and communicate with each other to improve the performance and safety of …
A secure framework to prevent three-tier cloud architecture from malicious malware injection attacks
The concept of cloud computing makes it possible to have a shared pool of reconfigurable
computing resources that can be deployed and released with little involvement from …
computing resources that can be deployed and released with little involvement from …
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations
Vehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication
between vehicles and road side units (RSU) to exchange safety and alert messages …
between vehicles and road side units (RSU) to exchange safety and alert messages …
A dynamic threat prevention framework for autonomous vehicle networks based on ruin-theoretic security risk assessment
A Anwar, T Halabi, M Zulkernine - Journal on Autonomous …, 2023 - dl.acm.org
In recent years, Autonomous Vehicle Networks (AVNs) have gained significant attention for
their potential to make transportation safer and more efficient. These networks rely on …
their potential to make transportation safer and more efficient. These networks rely on …
[PDF][PDF] Cooperative and Decentralized Defense in Autonomous Vehicle Networks
A Anwar - 2023 - qspace.library.queensu.ca
In the era of the transportation revolution, the emergence of Autonomous Vehicle Networks
(AVNs) represents a remarkable feat of technological sophistication. It embodies a …
(AVNs) represents a remarkable feat of technological sophistication. It embodies a …
TTSASA: Three Tier Security against Sybil Attack
M Bharti, S Rani, P Singh - Journal of Algebraic Statistics, 2022 - publishoa.com
As there are limited resources in Mobile Adhoc Network (MANET) and in absence of a
centralized system, security is a major concern. In a Sybil attack, intruders use multiple …
centralized system, security is a major concern. In a Sybil attack, intruders use multiple …