Machine learning and blockchain technologies for cybersecurity in connected vehicles
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …
for their everyday functions on the road so that safety of passengers and vehicles can be …
Smart applications in edge computing: Overview on authentication and data security
As a new computing paradigm, edge computing has appeared in the public field of vision
recently. Owing to its advantages of low delay and fast response, edge computing has …
recently. Owing to its advantages of low delay and fast response, edge computing has …
Secure and lightweight user authentication scheme for cloud-assisted internet of things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …
Joint computation offloading and resource allocation for edge-cloud collaboration in internet of vehicles via deep reinforcement learning
Mobile edge computing (MEC) and cloud computing (CC) have been considered as the key
technologies to improve the task processing efficiency for Internet of Vehicles (IoV). In this …
technologies to improve the task processing efficiency for Internet of Vehicles (IoV). In this …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Class-imbalance privacy-preserving federated learning for decentralized fault diagnosis with biometric authentication
S Lu, Z Gao, Q Xu, C Jiang, A Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy protection as a major concern of the industrial big data enabling entities makes the
massive safety-critical operation data of a wind turbine unable to exert its great value …
massive safety-critical operation data of a wind turbine unable to exert its great value …
Attacks on self-driving cars and their countermeasures: A survey
Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …
connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …
Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …
economy due to its share in the Gross Domestic Product (GDP) and as a source of …
On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system
Internet of Vehicles (IoV), a distributed network involving connected vehicles and Vehicular
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …
Secure and efficient blockchain-assisted authentication for edge-integrated Internet-of-Vehicles
Edge-Integrated Internet-of-Vehicles (IoV) sinks service to edge nodes, which responses
quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the …
quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the …