Secure operations of connected and autonomous vehicles

J Han, Z Ju, X Chen, M Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With features of collaborative interaction and autonomous decision-making, connected and
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …

Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures

S Jain, S Gupta, KK Sreelakshmi, JJPC Rodrigues - Cluster Computing, 2022 - Springer
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards
a more automated lifestyle. A significant amount of IoT devices is expected to join the …

Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment

A Shahidinejad, M Ghobaei-Arani… - IEEE consumer …, 2021 - ieeexplore.ieee.org
Due to the ever-growing use of active Internet devices, the Internet has achieved good
popularity at present. The smart devices could connect to the Internet and communicate …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

PALK: Password-based anonymous lightweight key agreement framework for smart grid

AA Khan, V Kumar, M Ahmad, S Rana… - International Journal of …, 2020 - Elsevier
Smart grid (SG) is a highly efficient and more reliable framework that controls the computer,
automation, new technologies and equipment. In SG, electricity utilization and …

5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions

M Adil, H Song, MK Khan, A Farouk, Z Jin - Journal of Network and …, 2024 - Elsevier
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing

W Akram, K Mahmood, X Li, M Sadiq, Z Lv… - Computer Networks, 2022 - Elsevier
Abstract Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the
Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers …

A secure, privacy-preserving, and lightweight Authentication scheme for VANETs

T Nandy, MYI Idris, RM Noor, AWA Wahab… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
The vehicular network is a collection of vehicles and other components facilitated with
versatile sensors to communicate, which is backboned by authentication. Present …

PPRP: Preserving-privacy route planning scheme in VANETs

Y Liang, Y Liu, BB Gupta - ACM Transactions on Internet Technology, 2022 - dl.acm.org
Route planning helps a vehicle to share a message with the roadside units (RSUs) on its
path in advance, which greatly speeds the authentication between the vehicle and the RSUs …

RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure

V Kumar, MS Mahmoud, A Alkhayyat, J Srinivas… - The Journal of …, 2022 - Springer
With the fast growth of technologies like cloud computing, big data, the Internet of Things,
artificial intelligence, and cyber-physical systems, the demand for data security and privacy …