2023
DOI: 10.11591/ijeecs.v30.i2.pp1021-1028
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning algorithms for privacy preserving in vehicular ad hoc network

Abstract: Machine learning (ML) will improve the outcomes through the use of methods that categorize the information into the predetermined set. This work is to present an estimation and assessment of machine learning techniques for achieving privacy preservation in vehicular ad hoc networks (VANETs). This method generates two distinct group keys for prime and secondary users. Road side units (RSUs) are deployed to broadcast one group key from the trusted authority (TA) to the primary users, and secondary users are util… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Cloud computingsecurity encompasses several challenges, including multi-tenancy, data loss [7] and leakage, ease of accessibility, identity management, unsafe APIs, inconsistencies in service level agreements, patch management, and internal threats. Enforcing security measures that provide to the diverse needs of all cloud users is challenging, as different users have varying security demands based on their objectives for using cloud services [8]. While previous research in cloud computing has predominantly focused on aspects such as technological architecture, distinguishing features from similar technologies, and security concerns, the paramount criterion that drives adoption remains security.…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computingsecurity encompasses several challenges, including multi-tenancy, data loss [7] and leakage, ease of accessibility, identity management, unsafe APIs, inconsistencies in service level agreements, patch management, and internal threats. Enforcing security measures that provide to the diverse needs of all cloud users is challenging, as different users have varying security demands based on their objectives for using cloud services [8]. While previous research in cloud computing has predominantly focused on aspects such as technological architecture, distinguishing features from similar technologies, and security concerns, the paramount criterion that drives adoption remains security.…”
Section: Introductionmentioning
confidence: 99%
“…Global food security is threatened by plant diseases, causing severe consequences for small farmers whose lifestyle is based on healthy crops. Smallholder farmers contribute over 80% of the agricultural output, yet 50% to 60% of the yield is wasted due to pests and diseases [1]. Agricultural organisations and institutions consult with many domain experts to prevent/reduce crop loss.…”
Section: Introductionmentioning
confidence: 99%
“…In the subsequent testing stage, the trained model is utilized to make predictions or generate outputs based on new, unseen data. This two-step process allows us to harness the power of machine learning to address complex problems that were traditionally difficult to solve [23]- [27].…”
Section: Introductionmentioning
confidence: 99%