[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …

Blockchain-based dynamic key management for heterogeneous intelligent transportation systems

A Lei, H Cruickshank, Y Cao, P Asuquo… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
As modern vehicle and communication technologies advanced apace, people begin to
believe that the Intelligent Transportation System (ITS) would be achievable in one decade …

TRM-IoT: A trust management model based on fuzzy reputation for internet of things

D Chen, G Chang, D Sun, J Li, J Jia… - Computer Science and …, 2011 - doiserbia.nb.rs
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into
Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is …

Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks

P Sakarindr, N Ansari - IEEE Wireless Communications, 2007 - ieeexplore.ieee.org
Group communications in wireless networks has been facilitating many emerging
applications that require packet delivery from one or more sender (s) to multiple receivers …

Real-time-based E-health systems: Design and implementation of a lightweight key management protocol for securing sensitive information of patients

S Iqbal, MLM Kiah, AA Zaidan, BB Zaidan… - Health and …, 2019 - Springer
Group-based systems, such as e-health systems, have been introduced since the last few
decades. E-health systems can be used anytime and anywhere for patient monitoring …

Dynamic balanced key tree management for secure multicast communications

WHD Ng, M Howarth, Z Sun… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
A secure multicast communication is important for applications such as pay-per-view and
secure videoconferencing. A key tree approach has been proposed by other authors to …

Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges

B Daghighi, MLM Kiah, S Shamshirband… - Journal of Network and …, 2015 - Elsevier
Group communication has been increasingly used as an efficient communication
mechanism for facilitating emerging applications that require packet delivery from one or …

Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs

BJ Chang, SL Kuo - IEEE Transactions on Vehicular …, 2008 - ieeexplore.ieee.org
To increase efficiency in mobile ad hoc networks (MANETs), the multicast MANET is
proposed for a sender that sends packets to several receivers through a multicast session. In …

A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls

G Uçtu, M Alkan, İA Doğru, M Dörterler - Future Generation Computer …, 2021 - Elsevier
Although security have to be a key issue for systems carrying intelligence such as
surveillance system, it is still overshadowed by bandwidth utilization in multicast networks …

Hierarchical group access control for secure multicast communications

Y Sun, KJR Liu - IEEE/ACM Transactions On Networking, 2007 - ieeexplore.ieee.org
Many group communications require a security infrastructure that ensures multiple levels of
access control for group members. While most existing group key management schemes are …