Mobility management in 5G-enabled vehicular networks: Models, protocols, and classification
Over the past few years, the next generation of vehicular networks is envisioned to play an
essential part in autonomous driving, traffic management, and infotainment applications. The …
essential part in autonomous driving, traffic management, and infotainment applications. The …
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles
The Internet of connected vehicles (IoV) is employed to collect real-time traffic conditions for
transportation control systems, and the computing tasks are available to be offloaded from …
transportation control systems, and the computing tasks are available to be offloaded from …
An overview of risk estimation techniques in risk-based access control for the internet of things
The Internet of Things (IoT) represents a modern approach where boundaries between real
and digital domains are progressively eliminated by changing over consistently every …
and digital domains are progressively eliminated by changing over consistently every …
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …
Lightweight mutual authentication for IoT and its applications
The Internet of Things (IoT) provides transparent and seamless incorporation of
heterogeneous and different end systems. It has been widely used in many applications …
heterogeneous and different end systems. It has been widely used in many applications …
Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach
VO Nyangaresi - Proceedings of Third International Conference on …, 2023 - Springer
Abstract The 3rd Generation Partnership Project (3GPP) has specified the 5G Authentication
and Key Agreement (5G AKA) protocol for handover authentication. However, this protocol is …
and Key Agreement (5G AKA) protocol for handover authentication. However, this protocol is …
5G-enabled Hierarchical architecture for software-defined intelligent transportation system
With the rapid advancement of technology, an increasing number of devices are being
connected to the Internet and getting smart. Such advancement brings new challenges in …
connected to the Internet and getting smart. Such advancement brings new challenges in …
Multi-objective computation offloading for internet of vehicles in cloud-edge computing
Abstract The Internet of Vehicles (IoV) has gained worldwide attentions as it provides the
service of collecting real-time traffic information to improve the road safety. The IoV users …
service of collecting real-time traffic information to improve the road safety. The IoV users …
Task offloading decision in fog computing system
Q Zhu, B Si, F Yang, Y Ma - China Communications, 2017 - ieeexplore.ieee.org
Fog computing is an emerging paradigm of cloud computing which to meet the growing
computation demand of mobile application. It can help mobile devices to overcome resource …
computation demand of mobile application. It can help mobile devices to overcome resource …
Spatiotemporal congestion-aware path planning toward intelligent transportation systems in software-defined smart city IoT
In smart cities, urban intelligent transportation systems (ITSs) are highly anticipated to
improve transportation efficiency, decrease traffic congestion, and promote sustainable …
improve transportation efficiency, decrease traffic congestion, and promote sustainable …