[HTML][HTML] A review on fog computing: issues, characteristics, challenges, and potential applications

R Das, MM Inuwa - Telematics and Informatics Reports, 2023 - Elsevier
Fog computing is a paradigm that utilizes the advantages of both the cloud and the edge
devices providing quality services, reducing latency, providing mobility support, multi …

An overview of fog computing and edge computing security and privacy issues

AM Alwakeel - Sensors, 2021 - mdpi.com
With the advancement of different technologies such as 5G networks and IoT the use of
different cloud computing technologies became essential. Cloud computing allowed …

Is it really easy to detect sybil attacks in c-its environments: a position paper

B Hammi, YM Idir, S Zeadally… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS)
represent one of the main use case scenarios that aim to improve peoples' daily lives. Thus …

Detecting sybil attacks in vehicular fog networks using RSSI and blockchain

S Benadla, OR Merad-Boudia… - … on Network and …, 2022 - ieeexplore.ieee.org
Vehicular Fog Computing (VFC) is a paradigm of vehicular networks that has a set of
advantages such as agility, efficiency, and reduced latency. The VFC is vulnerable to a …

The impact of sybil attacks on vehicular fog networks

S Benadla, OR Merad-Boudia - 2021 International Conference …, 2021 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is a network that considers vehicles as intelligent machines.
They interact and communicate with each other to improve the performance and safety of …

A secure framework to prevent three-tier cloud architecture from malicious malware injection attacks

BVS Rao, V Sharma, N Rathore, D Prasad… - International Journal of …, 2023 - igi-global.com
The concept of cloud computing makes it possible to have a shared pool of reconfigurable
computing resources that can be deployed and released with little involvement from …

Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations

R Sultana, J Grover, M Tripathi, MS Sachdev… - Journal of Network and …, 2024 - Springer
Vehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication
between vehicles and road side units (RSU) to exchange safety and alert messages …

A dynamic threat prevention framework for autonomous vehicle networks based on ruin-theoretic security risk assessment

A Anwar, T Halabi, M Zulkernine - Journal on Autonomous …, 2023 - dl.acm.org
In recent years, Autonomous Vehicle Networks (AVNs) have gained significant attention for
their potential to make transportation safer and more efficient. These networks rely on …

[PDF][PDF] Cooperative and Decentralized Defense in Autonomous Vehicle Networks

A Anwar - 2023 - qspace.library.queensu.ca
In the era of the transportation revolution, the emergence of Autonomous Vehicle Networks
(AVNs) represents a remarkable feat of technological sophistication. It embodies a …

TTSASA: Three Tier Security against Sybil Attack

M Bharti, S Rani, P Singh - Journal of Algebraic Statistics, 2022 - publishoa.com
As there are limited resources in Mobile Adhoc Network (MANET) and in absence of a
centralized system, security is a major concern. In a Sybil attack, intruders use multiple …