Secure operations of connected and autonomous vehicles
J Han, Z Ju, X Chen, M Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With features of collaborative interaction and autonomous decision-making, connected and
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards
a more automated lifestyle. A significant amount of IoT devices is expected to join the …
a more automated lifestyle. A significant amount of IoT devices is expected to join the …
Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment
A Shahidinejad, M Ghobaei-Arani… - IEEE consumer …, 2021 - ieeexplore.ieee.org
Due to the ever-growing use of active Internet devices, the Internet has achieved good
popularity at present. The smart devices could connect to the Internet and communicate …
popularity at present. The smart devices could connect to the Internet and communicate …
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
PALK: Password-based anonymous lightweight key agreement framework for smart grid
Smart grid (SG) is a highly efficient and more reliable framework that controls the computer,
automation, new technologies and equipment. In SG, electricity utilization and …
automation, new technologies and equipment. In SG, electricity utilization and …
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …
have given humans access to interact virtually with objects. Until now, numerous virtual …
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
Abstract Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the
Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers …
Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers …
A secure, privacy-preserving, and lightweight Authentication scheme for VANETs
The vehicular network is a collection of vehicles and other components facilitated with
versatile sensors to communicate, which is backboned by authentication. Present …
versatile sensors to communicate, which is backboned by authentication. Present …
PPRP: Preserving-privacy route planning scheme in VANETs
Route planning helps a vehicle to share a message with the roadside units (RSUs) on its
path in advance, which greatly speeds the authentication between the vehicle and the RSUs …
path in advance, which greatly speeds the authentication between the vehicle and the RSUs …
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
With the fast growth of technologies like cloud computing, big data, the Internet of Things,
artificial intelligence, and cyber-physical systems, the demand for data security and privacy …
artificial intelligence, and cyber-physical systems, the demand for data security and privacy …