2019
DOI: 10.1016/j.future.2017.12.003
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-preserving sensory data sharing scheme in Internet of Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
57
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 71 publications
(59 citation statements)
references
References 26 publications
0
57
0
Order By: Relevance
“…However, their approach did not consider the problem of protecting information security or reliable transmission of incident flow. e approaches in [19][20][21][22] achieve a reasonable level of privacy protection. In these studies, vehicles are issued pseudonym certificates, and certificate generation and provisioning are divided among multiple organisations.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, their approach did not consider the problem of protecting information security or reliable transmission of incident flow. e approaches in [19][20][21][22] achieve a reasonable level of privacy protection. In these studies, vehicles are issued pseudonym certificates, and certificate generation and provisioning are divided among multiple organisations.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, in Figure 15, we plot and compare the computation cost of RSU in the three schemes in terms of the data dimension that ranges from 5 to 40, during the data acquisition phase. e comparison results show that compared with the [22] scheme and traditional scheme, STEIM can greatly reduce the computation complexity of the involved entities.…”
Section: Performance Analysismentioning
confidence: 99%
“…Some works closely related to this paper are briefly reviewed below. In F-VSNs, massive sensory data is produced in each data dimension, and needs to be uploaded for further processing and analysis; data aggregation schemes [16][17][18][19][20][21][22][23] have received considerable attention recently, and are roughly classified into two categories: single-dimensional data aggregation [16][17][18][19] and multi-dimensional data aggregation [20][21][22][23]. Zhuo et al [16] introduced a data aggregation scheme, which protects each involved entity's identity privacy, and allows the requester to examine the correctness of the obtained results.…”
Section: Related Workmentioning
confidence: 99%
“…However, using the existing data aggregation schemes [16][17][18][19][20][21][22] cannot determine the number of data reports produced in each road segment, and cannot compute the average sensory data in each road segment. To solve the problem, the scheme [23] exploits the Chinese remainder theorem and Paillier cryptosystem to calculate the average sensory data in each segments; however, it brings heavy computation and communication costs. In addition, to choose an optimal route, vehicles often query about the road conditions of the potential moving routes, but the query reports uploaded by vehicles are tightly associated with the query location, and thus the query location could be disclosed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation