2021
DOI: 10.1109/tvt.2021.3051258
|View full text |Cite
|
Sign up to set email alerts
|

BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach

Abstract: Passing through a rural area with a limited network infrastructure may disrupt fog computing support for vehicles. As a result, some applications on vehicles may turn off and bother the performance of the vehicular systems. In order to escape from this kind of situation, vehicular fog computing is discussed in recent times as an alternative of fog computing support while passing through a blank spot of network infrastructure. However, it is not feasible to establish a trusted vehicular fog computing service am… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 38 publications
0
7
0
1
Order By: Relevance
“…One such use is the deployment of Blockchain in IoTbased smart home networks, where an attacker can compromise the majority of devices that connect and share data with one another [183]. As a result, establishing mutual trust among network nodes through a secure and efficient consensus protocol is a critical requirement for the majority of Blockchain-based applications [184,185]. • Private Key Compromise: Private key protection is a critical requirement for practically all applications that rely on cryptography operations to secure their communication.…”
Section: Security Requirementsmentioning
confidence: 99%
“…One such use is the deployment of Blockchain in IoTbased smart home networks, where an attacker can compromise the majority of devices that connect and share data with one another [183]. As a result, establishing mutual trust among network nodes through a secure and efficient consensus protocol is a critical requirement for the majority of Blockchain-based applications [184,185]. • Private Key Compromise: Private key protection is a critical requirement for practically all applications that rely on cryptography operations to secure their communication.…”
Section: Security Requirementsmentioning
confidence: 99%
“…Selain itu, banyaknya ancaman serangan siber di internet menyebabkan pengelolaan database terpusat menjadi kurang aman. Sebagai solusinya, teknologi blockchain saat ini banyak diusulkan sebagai salah satu solusi untuk menambah keamanan, yakni dengan mendistribusikan database ke semua ledger dan juga dengan tambahan hash yang saling terhubung dengan blok data sebelumnya, sebagaimana dibahas di penelitian [4] [5].…”
Section: Pendahuluanunclassified
“…The data information on the blockchain is encrypted into ciphertext with homomorphic encryption algorithm. The smart contract on the blockchain can process ciphertext without knowing the plaintext information, which significantly improves the security of user data privacy [ 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%