Towards a secure ITS: Overview, challenges and solutions
Abstract Intelligent Transportation Systems (ITS), the heart of the new revolution of smart
transport, has evolved from the well-known Vehicular Ad hoc Networks (VANETs) to become …
transport, has evolved from the well-known Vehicular Ad hoc Networks (VANETs) to become …
A Systematic Literature Map** on Using Blockchain Technology in Identity Management
TTT Ngo, TA Dang, VV Huynh, TC Le - IEEE Access, 2023 - ieeexplore.ieee.org
Although blockchain is an emerging technology, it has been applied in a lot of domains by
leveraging its features. Traditional identity management systems have many issues …
leveraging its features. Traditional identity management systems have many issues …
Big Data and development of Smart City: System architecture and practical public safety example
Abstract The concept of Smart City started its development path around two to three decades
ago; it has been mainly influenced and driven by radical changes in technological, social …
ago; it has been mainly influenced and driven by radical changes in technological, social …
IoT: A Universal Dynamic Gateway
The use of IoT devices and services in consumer applications and industry has dramatically
increased recently. The rapid technological innovations in sensors and other networks have …
increased recently. The rapid technological innovations in sensors and other networks have …
Physical layer communication security in smart cities: Challenges and threats identification
Communication technologies will have tremendous presence in modern smart cities,
providing means for massive data collection, plethora of services and technical …
providing means for massive data collection, plethora of services and technical …
Identity of things (IdoT): a preliminary report on identity management solutions for IoT devices
M Misbahuddin, R Harish… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The Internet of Things poses some of the biggest security challenges in the present day.
Companies, users and infrastructures are constantly under attack by malicious actors …
Companies, users and infrastructures are constantly under attack by malicious actors …