[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …
(VANETs). Today car manufacturers have already started to equip vehicles with …
Blockchain-based dynamic key management for heterogeneous intelligent transportation systems
As modern vehicle and communication technologies advanced apace, people begin to
believe that the Intelligent Transportation System (ITS) would be achievable in one decade …
believe that the Intelligent Transportation System (ITS) would be achievable in one decade …
TRM-IoT: A trust management model based on fuzzy reputation for internet of things
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into
Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is …
Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is …
Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks
P Sakarindr, N Ansari - IEEE Wireless Communications, 2007 - ieeexplore.ieee.org
Group communications in wireless networks has been facilitating many emerging
applications that require packet delivery from one or more sender (s) to multiple receivers …
applications that require packet delivery from one or more sender (s) to multiple receivers …
Real-time-based E-health systems: Design and implementation of a lightweight key management protocol for securing sensitive information of patients
Group-based systems, such as e-health systems, have been introduced since the last few
decades. E-health systems can be used anytime and anywhere for patient monitoring …
decades. E-health systems can be used anytime and anywhere for patient monitoring …
Dynamic balanced key tree management for secure multicast communications
A secure multicast communication is important for applications such as pay-per-view and
secure videoconferencing. A key tree approach has been proposed by other authors to …
secure videoconferencing. A key tree approach has been proposed by other authors to …
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges
Group communication has been increasingly used as an efficient communication
mechanism for facilitating emerging applications that require packet delivery from one or …
mechanism for facilitating emerging applications that require packet delivery from one or …
Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs
BJ Chang, SL Kuo - IEEE Transactions on Vehicular …, 2008 - ieeexplore.ieee.org
To increase efficiency in mobile ad hoc networks (MANETs), the multicast MANET is
proposed for a sender that sends packets to several receivers through a multicast session. In …
proposed for a sender that sends packets to several receivers through a multicast session. In …
A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls
Although security have to be a key issue for systems carrying intelligence such as
surveillance system, it is still overshadowed by bandwidth utilization in multicast networks …
surveillance system, it is still overshadowed by bandwidth utilization in multicast networks …
Hierarchical group access control for secure multicast communications
Many group communications require a security infrastructure that ensures multiple levels of
access control for group members. While most existing group key management schemes are …
access control for group members. While most existing group key management schemes are …