Differential privacy for industrial internet of things: Opportunities, applications, and challenges
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
A comprehensive review of authentication schemes in vehicular ad-hoc network
F Azam, SK Yadav, N Priyadarshi… - IEEE …, 2021 - ieeexplore.ieee.org
Vehicular ad-hoc network (VANET) has been gaining importance due to the fast growing
technology as well as its requirements in intelligent transportation systems (ITS) and …
technology as well as its requirements in intelligent transportation systems (ITS) and …
COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing
MA Al-Shareeda, S Manickam - International journal of environmental …, 2022 - mdpi.com
The COVID-19 pandemic is currently having disastrous effects on every part of human life
everywhere in the world. There have been terrible losses for the entire human race in all …
everywhere in the world. There have been terrible losses for the entire human race in all …
FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks
BA Mohammed, MA Al-Shareeda, S Manickam… - IEEE …, 2023 - ieeexplore.ieee.org
The fifth-generation (5G) technology-enabled vehicular network has been widely used in
intelligent transportation in recent years. Since messages shared among vehicles are …
intelligent transportation in recent years. Since messages shared among vehicles are …
Secure and efficient blockchain-assisted authentication for edge-integrated Internet-of-Vehicles
Edge-Integrated Internet-of-Vehicles (IoV) sinks service to edge nodes, which responses
quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the …
quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the …
Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks
MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …
Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment
A Shahidinejad, M Ghobaei-Arani… - IEEE consumer …, 2021 - ieeexplore.ieee.org
Due to the ever-growing use of active Internet devices, the Internet has achieved good
popularity at present. The smart devices could connect to the Internet and communicate …
popularity at present. The smart devices could connect to the Internet and communicate …
Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks
ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Electronics, 2023 - mdpi.com
The privacy and security of the information exchanged between automobiles in 5G-enabled
vehicular networks is at risk. Several academics have offered a solution to these problems in …
vehicular networks is at risk. Several academics have offered a solution to these problems in …
Efficient authentication scheme for 5G-enabled vehicular networks using fog computing
ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Sensors, 2023 - mdpi.com
Several researchers have proposed secure authentication techniques for addressing
privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …
privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To …
Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks
MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2022 - mdpi.com
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …