2021
DOI: 10.1109/tits.2020.3034197
|View full text |Cite
|
Sign up to set email alerts
|

Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 81 publications
(50 citation statements)
references
References 32 publications
0
43
0
Order By: Relevance
“…WSNs are used in various applications due to its advantages of flexibility to the environment, cost saving on long distance wires and data security during transmission [17][18][19]. Bhuiyan et al implemented the WSN to monitor the heath and operation status for structures [20].…”
Section: Related Workmentioning
confidence: 99%
“…WSNs are used in various applications due to its advantages of flexibility to the environment, cost saving on long distance wires and data security during transmission [17][18][19]. Bhuiyan et al implemented the WSN to monitor the heath and operation status for structures [20].…”
Section: Related Workmentioning
confidence: 99%
“…Next, we use less-sensitive (TIVA, TEVA) and (TIVB, TEVB) to judge whether the club income and expense can balance well. In concrete, we execute Step 1 and Step 2 repeatedly so that we get R mapping tables (i.e., T1, …, TR) as shown in (13).…”
Section: Solution: Tptelsh+bmentioning
confidence: 99%
“…For example, some football clubs have taken part in the illegal laundering money crime activities through modifying the transfer fees of a player in player transfer events. Such illegal and non-transparent business activities have disturbed the normal sport activities and done harm to the fans or spectators of involved clubs significantly [10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…By deploying a UAV-assisted MEC system, end devices can efficiently complete delay-sensitive applications. In [14][15][16][17][18][19][20], the secure data offloading mechanisms were investigated along with the research on UAV-assisted MEC systems [21][22][23][24]. Physical layer security has become one of the constraints when data offloading occurs in the MEC system.…”
Section: Researchmentioning
confidence: 99%
“…In [14], the researchers investigated a new MEC framework achieving secure communication for IoT applications. It exploits the key for achieving a reliable connection between the mobile users and the servers.…”
Section: Related Workmentioning
confidence: 99%