2020
DOI: 10.1109/tvt.2020.2994144
|View full text |Cite
|
Sign up to set email alerts
|

Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
79
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 74 publications
(80 citation statements)
references
References 44 publications
1
79
0
Order By: Relevance
“…Zhang et al [51] have proposed an authentication scheme by employing 5G technology and edge computing. At first an edge computing vehicle is authenticated and selected using fuzzy logic rule.…”
Section: A 5g Network and 5g-sdn For Vanetmentioning
confidence: 99%
“…Zhang et al [51] have proposed an authentication scheme by employing 5G technology and edge computing. At first an edge computing vehicle is authenticated and selected using fuzzy logic rule.…”
Section: A 5g Network and 5g-sdn For Vanetmentioning
confidence: 99%
“…For the low frequency part of the signal (subband 1), because the energy change is not obvious, the detection function is defined by using the change of the spectral coefficient [11]:…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…e specific methods of privacy preserving are not the focus of this paper. Please refer to [18][19][20][21] for details. Because propagation speed of message is much faster than moving speed of vehicle, it ignores the time it takes to propagate messages from a vehicle to other vehicles.…”
Section: Network Model and Data Propagation Modelmentioning
confidence: 99%