Track topics on Twitter Track topics that are important to you
Privacy protection in vehicular ad hoc networks (VANETs) has always been a research hotspot, especially the issue of vehicle authentication, which is critical to ensure the safe communication of vehicles. However, using the real identity in the process of authentication can easily result in a leak of the privacy information of the vehicles. Therefore, most existing privacy-protection schemes use anonymous authentication and require one-to-one communication between vehicles and the trusted authority (TA). However, when the number of vehicles is too large, network congestion can take place. In addition, the process of updating the anonymous by the TA or the vehicle itself, can result in both poor real-time performance and leakage of the system master key. To solve these problems, this study proposes a fog-computing-based anonymous-authentication scheme for VANETs; the scheme reduces the communication burden of the TA by enabling self-authentication between vehicles and road-side units (RSUs), thus improving the vehicle-authentication efficiency. For updating the anonymous, we design a fog-computing-based pseudonym-updating and -tracking strategy, which guarantees real-time communication and reduces the instances of re-authentication interactions for legitimate vehicles. The experimental results show that the scheme not only meets the privacy-protection requirements of VANETs but also offers better performance than that of the existing anonymous-authentication schemes.
This article was published in the following journal.
Name: PloS one
With the current advancement in technology, the use of Wireless Body Area Networks (WBANs) has become popular in the healthcare management. They provide a mechanism to collect and transmit physiologic...
Wireless sensor network-based remote health-care systems are becoming popular day by day with the rapid growth of Internet technologies and the proliferation of Internet-based application. A remote ...
Mobile Edge-Cloud Network is a new network structure after fog-cloud computing, where service and data computing are scattered in the most logical, nearby and efficient place. It provides better servi...
Nowadays, counterfeit medicines have become very popular due to the extension of the Internet. Broad-spectrum antibiotics with similar effect, but different prices, provide a gold opportunity for ille...
The article Chemometric tools for the authentication of cod liver oil based on nuclear magnetic resonance and infrared spectroscopy data, written by Editha Giese, Sascha Rohn and Jan Fritsche.
The study will evaluate the effectiveness of a co-developed exercise referral scheme. Participants will be recruited to one of three groups 1. Co-developed exercise referral scheme, 2. Usu...
The government of Burundi is implementing a new financing scheme in health centres. The objective is to provide additional financial compensations to health centres on the basis of their p...
The aim of this study is to investigate whether an incentive scheme is a feasible approach to increase walking/cycling to school.
This is the Phase 3 of a 3 phase study to determine the feasibility, acceptability and effectiveness of a health microinsurance scheme in improving health equity and clinical outcomes for ...
Ghana, a Low-Middle Income Country (LMIC) situated in the heart of West Africa started a national health insurance scheme in 2003.The scheme was designed to provide a comprehensive benefit...
A scheme which provides reimbursement for the health services rendered, generally by an institution, and which provides added financial rewards if certain conditions are met. Such a scheme is intended to promote and reward increased efficiency and cost containment, with better care, or at least without adverse effect on the quality of the care rendered.
Transferases are enzymes transferring a group, for example, the methyl group or a glycosyl group, from one compound (generally regarded as donor) to another compound (generally regarded as acceptor). The classification is based on the scheme "donor:acceptor group transferase". (Enzyme Nomenclature, 1992) EC 2.
Cell-surface proteins that bind epinephrine and/or norepinephrine with high affinity and trigger intracellular changes. The two major classes of adrenergic receptors, alpha and beta, were originally discriminated based on their cellular actions but now are distinguished by their relative affinity for characteristic synthetic ligands. Adrenergic receptors may also be classified according to the subtypes of G-proteins with which they bind; this scheme does not respect the alpha-beta distinction.
Computer-assisted analysis and processing of problems in a particular area.
Storing and processing data on multiple servers that can be accessed through the Internet.