Mobility management in 5G-enabled vehicular networks: Models, protocols, and classification

N Aljeri, A Boukerche - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Over the past few years, the next generation of vehicular networks is envisioned to play an
essential part in autonomous driving, traffic management, and infotainment applications. The …

An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles

X Xu, Y Xue, L Qi, Y Yuan, X Zhang, T Umer… - Future Generation …, 2019 - Elsevier
The Internet of connected vehicles (IoV) is employed to collect real-time traffic conditions for
transportation control systems, and the computing tasks are available to be offloaded from …

An overview of risk estimation techniques in risk-based access control for the internet of things

H Atlam, A Alenezi, R Walters, G Wills - 2017 - eprints.soton.ac.uk
The Internet of Things (IoT) represents a modern approach where boundaries between real
and digital domains are progressively eliminated by changing over consistently every …

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

Lightweight mutual authentication for IoT and its applications

N Li, D Liu, S Nepal - IEEE Transactions on Sustainable …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) provides transparent and seamless incorporation of
heterogeneous and different end systems. It has been widely used in many applications …

Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach

VO Nyangaresi - Proceedings of Third International Conference on …, 2023 - Springer
Abstract The 3rd Generation Partnership Project (3GPP) has specified the 5G Authentication
and Key Agreement (5G AKA) protocol for handover authentication. However, this protocol is …

5G-enabled Hierarchical architecture for software-defined intelligent transportation system

S Din, A Paul, A Rehman - Computer Networks, 2019 - Elsevier
With the rapid advancement of technology, an increasing number of devices are being
connected to the Internet and getting smart. Such advancement brings new challenges in …

Multi-objective computation offloading for internet of vehicles in cloud-edge computing

X Xu, R Gu, F Dai, L Qi, S Wan - Wireless Networks, 2020 - Springer
Abstract The Internet of Vehicles (IoV) has gained worldwide attentions as it provides the
service of collecting real-time traffic information to improve the road safety. The IoV users …

Task offloading decision in fog computing system

Q Zhu, B Si, F Yang, Y Ma - China Communications, 2017 - ieeexplore.ieee.org
Fog computing is an emerging paradigm of cloud computing which to meet the growing
computation demand of mobile application. It can help mobile devices to overcome resource …

Spatiotemporal congestion-aware path planning toward intelligent transportation systems in software-defined smart city IoT

C Lin, G Han, J Du, T Xu, L Shu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In smart cities, urban intelligent transportation systems (ITSs) are highly anticipated to
improve transportation efficiency, decrease traffic congestion, and promote sustainable …