[1] |
K. Golestan, R. Soua, F. Karray, M. S. Kamel , “Situation awareness within the context of connected cars: A comprehensive review and recent trends,” Information Fusion, vol. 29, pp. 68-83, May 2016. doi: 10.1016/j.inffus.2015.08.001.
|
[2] |
F. Bonomi , “The smart and connected vehicle and the internet of things,” Invited Talk, Workshop on Synchronization in Telecommunication Systems, 2013.
|
[3] |
J. Contreras, S. Zeadally, J. A. Guerrero-Ibanez , “Internet of vehicles: architecture, protocols, and security,” IEEE Internet of Things Journal, vol. PP, no. 99, pp. 1-1, Apr. 2017. doi: 10.1109/JIOT.2017.2690902.
|
[4] |
R. Chellappa , “Intermediaries in cloud-computing: a new computing paradigm,” in INFORMS Annual Meeting, Dallas, USA, Oct. 1997.
|
[5] |
F. Bonomi, R. Milito, J. Zhu, S. Addepalli , “Fog computing and its role in the internet of things,” in Proc. First Edition of MCC workshop on Mobile cloud computing, Helsinki, Finland, 2012, pp. 13-16. doi: 10.1145/2342509.2342513.
|
[6] |
K. Shenoy, P. Bhokare, U. Pai , “Fog computing future of cloud computing,” International Journal of Science and Research, vol. 4, no. 6, pp. 55-56, Jun. 2015.
|
[7] |
W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu , “Edge computing: vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5 pp. 637-646, Oct. 2016. doi: 10.1109/JIOT.2016.2579198.
|
[8] |
J. Cheng, J. Cheng, M. Zhou , et al., “Routing in internet of vehicles: a review,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 5, pp. 2339-2352, Oct. 2015. doi: 10.1109/TITS.2015.2423667.
|
[9] |
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash , “Internet of things: a survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015. doi: 10.1109/COMST.2015.2444095.
|
[10] |
B. Mokhtar, M. Azab , “Survey on security issues in vehicular ad hoc networks,” Alexandria Engineering Journal, vol. 54, no. 4, pp. 1115-1126, Dec. 2015. doi: 10.1016/j.aej.2015.07.011.
|
[11] |
C. Chen, X. Wang, W. Han, B. Zang , “A robust detection of the sybil attack in urban vanets,” in 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, Canada, 2009. doi: 10.1109/ICDCSW.2009.48.
|
[12] |
S. Park, B. Aslam, D. Turgut, C. C. Zou , “Defense against sybil attack in vehicular ad hoc network based on roadside unit support,” in IEEE Military Communications Conference, Boston, USA, 2009. doi: 10.1109/MILCOM.2009.5379844.
|
[13] |
S. Chang, Y. Qi, H. Zhu, J. Zhao, X. Shen , “Footprint: Detecting sybil attacks in urban vehicular networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 1103-1114, Jun. 2012. doi: 10.1109/TPDS.2011.263.
|
[14] |
Z. Zhang , et al., “Study on location privacy protection technology of VANET,” Journal on Communications, vol. 33, no. 8, pp. 180-189, 2012.
|
[15] |
A. R. Beresford and F. Stajano , “Mix zones: user privacy in location-aware services,” in Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, USA, 2004. doi: 10.1109/PERCOMW.2004.1276918.
|
[16] |
H. Xiong, Z. Chen, F. Li , “Efficient and multi-level privacy-preserving communication protocol for VANET,” Computers & Electrical Engineering, vol. 38, no. 3, pp. 573-581, May 2012. doi: 10.1016/j.compeleceng.2011.11.009.
|
[17] |
J. Chen, M. S. I. Mamun, and A. Miyaji , “An efficient batch verification system and its effect in a real time VANET environment,” Security and Communication Networks, vol. 8, no. 2, pp. 298-310, 2015. doi: 10.1002/sec.980.
|
[18] |
Lin Xiaodong , et al. “GSIS: a secure and privacy-preserving protocol for vehicular communications,” IEEE Transactions on vehicular technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007. doi: 10.1109/TVT.2007.906878.
|
[19] |
J. Zhang and Y. Xu , “Privacy- preserving authentication protocols with efficient verification in VANETs,” International Journal of Communication Systems, vol. 27, no. 12, pp. 3676-3692, 2014. doi: 10.1002/dac.2566.
|
[20] |
G. Yan, D. Wen, S. Olariu, M. C. Weigle , “Security challenges in vehicular cloud computing,” IEEE Transactions on Intelligent Transportation Systems, vol. 14, no. 1, pp. 284-294, Mar. 2013. doi: 10.1109/TITS.2012.2211870.
|
[21] |
J. P. Hubaux, S. Capkun, J. Luo , “The security and privacy of smart vehicles,” IEEE Security & Privacy, vol. 2, no. 3, pp. 49-55, May-Jun. 2004. doi: 10.1109/MSP.2004.26.
|
[22] |
K. Skala, D. Davidovic, E. Afgan, I. Sovic, Z. Sojat , “Scalable distributed computing hierarchy: cloud, fog and dew computing,” Open Journal of Cloud Computing , vol. 2, no. 1, pp. 16-24, 2015.
|
[23] |
T. Bhatia and A. K. Verma , “Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues,” The Journal of Supercomputing, vol. 73, no. 6, pp. 2558-2631, Jun. 2017. doi: 10.1007/s11227-016-1945-y.
|
[24] |
A. Alrawais, A. Alhothaily, C. Hu, X. Cheng , “Fog computing for the internet of things: security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, Mar.-Apr. 2017. doi: 10.1109/MIC.2017.37.
|
[25] |
A. Rindos and Y. Wang . “Dew computing: the complementary piece of cloud computing,” IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom), Atlanta, USA, 2016. doi: 10.1109/BDCloud-SocialCom-SustainCom.2016.14.
|