2019
DOI: 10.1109/jiot.2019.2916349
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Estimation of $k$ -Persistent Traffic in Vehicular Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…It focuses on the management of access privileges which allow or deny access depending on user context, with access control policies that deny access to the data stored in the network for unauthorized users. To that end they analyzed a previously-studied context data access control scheme based on CP-ABE, included dynamic situations within the scope of context data and proposed an extended access control policy that reflects extended multi-dimensional context attributes [18][19][20][21].…”
Section: Figure 1 Concept Map Of Cyber-physical Systemmentioning
confidence: 99%
“…It focuses on the management of access privileges which allow or deny access depending on user context, with access control policies that deny access to the data stored in the network for unauthorized users. To that end they analyzed a previously-studied context data access control scheme based on CP-ABE, included dynamic situations within the scope of context data and proposed an extended access control policy that reflects extended multi-dimensional context attributes [18][19][20][21].…”
Section: Figure 1 Concept Map Of Cyber-physical Systemmentioning
confidence: 99%
“…e current state-of-the-art protocols for privacy-preserving traffic data collection are due to Zhou et al [12,13] and Sun et al [25,26], which provide privacy without the use of cryptographic techniques. Specifically, in their methods, every receiver maintains a physical bit array of size m (similar to a Bloom filter), and each passing vehicle sets one of the bits to "1".…”
Section: Related Workmentioning
confidence: 99%
“…Using the same data collection approach, Sun et al [25] computed the number of vehicles that persistently (in every measurement period) travel on a given road network edge. Furthermore, the same authors [26] also analyzed the number of vehicles that travel x out of T measurement periods on the network edge.…”
Section: Related Workmentioning
confidence: 99%