2019
DOI: 10.1109/jiot.2019.2927497
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

5
5

Authors

Journals

citations
Cited by 78 publications
(34 citation statements)
references
References 36 publications
0
34
0
Order By: Relevance
“…By combining two consensus mechanisms, proof of work (PoW) and proof of stake (PoS), the difficulty of mining nodes can be changed dynamically, so the consensus can be reached more efficiently. Reference [16] proposed an efficient and safe road condition monitoring authentication scheme based on fog computing. In reference [17], a kind of Edge-chain was proposed, which used the currency system of blockchain to link the edge computing resources with the resource usage between accounts and IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…By combining two consensus mechanisms, proof of work (PoW) and proof of stake (PoS), the difficulty of mining nodes can be changed dynamically, so the consensus can be reached more efficiently. Reference [16] proposed an efficient and safe road condition monitoring authentication scheme based on fog computing. In reference [17], a kind of Edge-chain was proposed, which used the currency system of blockchain to link the edge computing resources with the resource usage between accounts and IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…is distributed for it. Each user's private key is also formed by the serial number and randomization parameters, so that at the time of decryption, each user's private key is embedded with a different random value [11]. During encryption, the encryption exponent s, the random numbers λ, λ n and the weighted split set parameter x are all embedded in different ciphertext segments.…”
Section: Security Analysismentioning
confidence: 99%
“…Typical direct-ranging-methods include strength indication of received signal (RSSI) [ 12 , 13 ], time difference of arrival (TDOA) [ 14 ], time of arrival (TOA) [ 15 , 16 ], angle of arrival (AOA) [ 17 , 18 ], and so forth. Indirect-ranging-method mainly uses geometric relationship between nodes, hop-count value and energy loss between nodes, network connectivity and other aspects to estimate the location of unknown nodes [ 19 ]. It includes DV-Hop [ 20 ], perfect point in triangulation test (APIT) [ 21 , 22 ], centroid algorithm [ 23 , 24 ], and so forth.…”
Section: Introductionmentioning
confidence: 99%