2017
DOI: 10.1109/tits.2017.2653103
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(66 citation statements)
references
References 40 publications
0
66
0
Order By: Relevance
“…It is worth noting here that the constraint of interference becomes a form of summation of simple variables. Thus, the SPI encryption method of interference quantization can be introduced to simplify the original data encryption interference problem [21][22][23][24][25][26].…”
Section: Security Encryption Methods Of Upimentioning
confidence: 99%
“…It is worth noting here that the constraint of interference becomes a form of summation of simple variables. Thus, the SPI encryption method of interference quantization can be introduced to simplify the original data encryption interference problem [21][22][23][24][25][26].…”
Section: Security Encryption Methods Of Upimentioning
confidence: 99%
“…In their scheme, the credentials of the malicious users cannot be revoked efficiently, and thus frequent attacks from malicious vehicles would decrease the efficiency of the scheme. Qin et al [18] adopted a secure RSU management to achieve pseudonyms control, and Xia et al [19] proposed a protocol on forwarding adaptive multimedia data with attribute-based encryption. However, it is an arduous task to design these protocols [18,19] so that the hundreds of original messages are concealed or encrypted by RSUs since the RSU is assumed as a light-hardware with a low-security level in traditional VANETs.…”
Section: A Threshold Authenticationmentioning
confidence: 99%
“…Qin et al [18] adopted a secure RSU management to achieve pseudonyms control, and Xia et al [19] proposed a protocol on forwarding adaptive multimedia data with attribute-based encryption. However, it is an arduous task to design these protocols [18,19] so that the hundreds of original messages are concealed or encrypted by RSUs since the RSU is assumed as a light-hardware with a low-security level in traditional VANETs. Zhang et al [20] leveraged group signature to solve linkability in vehicular announcement networks in VANETs.…”
Section: A Threshold Authenticationmentioning
confidence: 99%
“…The experimental vehicular channel measurement is used to estimate the path loss. A linear relationship between the path loss and the distance between sender and receiver V is discussed by [34][35][36]. Therefore, this path loss model is simplified but very accurate; it is expressed as follows:…”
Section: Part Amentioning
confidence: 99%