Secure intelligent traffic light control using fog computing

As the number of vehicles grows, traffic efficiency is becoming a worldwide problem. Intelligent transportation system aims to improve the traffic efficiency, where intelligent traffic light control is an important component. Existing intelligent traffic light control systems face some challenges, e...

Full description

Saved in:
Bibliographic Details
Published inFuture generation computer systems Vol. 78; pp. 817 - 824
Main Authors Liu, Jian, Li, Jiangtao, Zhang, Lei, Dai, Feifei, Zhang, Yuanfei, Meng, Xinyu, Shen, Jian
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.01.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract As the number of vehicles grows, traffic efficiency is becoming a worldwide problem. Intelligent transportation system aims to improve the traffic efficiency, where intelligent traffic light control is an important component. Existing intelligent traffic light control systems face some challenges, e.g., avoiding heavy roadside sensors, resisting malicious vehicles and avoiding single-point failure. To cope with those challenges, we propose two secure intelligent traffic light control schemes using fog computing whose security are based on the hardness of the computational Diffie–Hellman puzzle and the hash collision puzzle respectively. The two schemes assume the traffic lights are fog devices. The first scheme is a simple extension of a recent scheme for defending denial-of-service attacks. We show this simple extension is not efficient when the vehicle density is high. The second scheme is much more efficient and is fog device friendly. Even the vehicle density is high, the traffic light may verify the validity of the vehicles efficiently. •Our schemes may resist the attacks from malicious vehicles.•Our schemes can avoid the problem of single-point failure.•Our improved scheme is fog device friendly.
AbstractList As the number of vehicles grows, traffic efficiency is becoming a worldwide problem. Intelligent transportation system aims to improve the traffic efficiency, where intelligent traffic light control is an important component. Existing intelligent traffic light control systems face some challenges, e.g., avoiding heavy roadside sensors, resisting malicious vehicles and avoiding single-point failure. To cope with those challenges, we propose two secure intelligent traffic light control schemes using fog computing whose security are based on the hardness of the computational Diffie–Hellman puzzle and the hash collision puzzle respectively. The two schemes assume the traffic lights are fog devices. The first scheme is a simple extension of a recent scheme for defending denial-of-service attacks. We show this simple extension is not efficient when the vehicle density is high. The second scheme is much more efficient and is fog device friendly. Even the vehicle density is high, the traffic light may verify the validity of the vehicles efficiently. •Our schemes may resist the attacks from malicious vehicles.•Our schemes can avoid the problem of single-point failure.•Our improved scheme is fog device friendly.
Author Shen, Jian
Dai, Feifei
Liu, Jian
Zhang, Yuanfei
Li, Jiangtao
Zhang, Lei
Meng, Xinyu
Author_xml – sequence: 1
  givenname: Jian
  orcidid: 0000-0002-0482-8951
  surname: Liu
  fullname: Liu, Jian
  organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, China
– sequence: 2
  givenname: Jiangtao
  surname: Li
  fullname: Li, Jiangtao
  organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, China
– sequence: 3
  givenname: Lei
  surname: Zhang
  fullname: Zhang, Lei
  email: leizhang@sei.ecnu.edu.cn
  organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, China
– sequence: 4
  givenname: Feifei
  surname: Dai
  fullname: Dai, Feifei
  organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, China
– sequence: 5
  givenname: Yuanfei
  surname: Zhang
  fullname: Zhang, Yuanfei
  organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, China
– sequence: 6
  givenname: Xinyu
  surname: Meng
  fullname: Meng, Xinyu
  organization: Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, China
– sequence: 7
  givenname: Jian
  surname: Shen
  fullname: Shen, Jian
  organization: School of Computer and Software, Nanjing University of Information Science and Technology, China
BookMark eNp9UE1LAzEUDFLBtvoPPOwf2DUv2W6yIIIUv6DgQQVvIZt9qSnbbEmygv_elHr2NMxjZngzCzLzo0dCroFWQKG52VV2SlPAilEQFWVVhjMyBylYKQBWMzLPMlEK3n5ekEWMO0qzhMOc3L6hyc7C-YTD4LboU5GCttaZItOvVJjRpzAOxRSd3xZ23ObL_jClzC7JudVDxKs_XJKPx4f39XO5eX16Wd9vSsNpk0roDHLWad1QDSCMbVpB6arWkq90K3nfSNA97WxrsAbZdVRI3QCTvNOsbpAvSX3KNWGMMaBVh-D2OvwooOq4gNqp0wLquICiTB3rLcndyYb5t2-HQUXj0BvsXUCTVD-6_wN-AaE-aRQ
CitedBy_id crossref_primary_10_32604_iasc_2022_026331
crossref_primary_10_1016_j_comnet_2021_108676
crossref_primary_10_1016_j_future_2017_09_014
crossref_primary_10_1016_j_vehcom_2019_02_002
crossref_primary_10_3390_math10081298
crossref_primary_10_3390_electronics10101171
crossref_primary_10_1109_TVT_2020_3005363
crossref_primary_10_1016_j_future_2018_12_031
crossref_primary_10_1007_s11042_018_7051_9
crossref_primary_10_3390_info11020119
crossref_primary_10_1109_ACCESS_2023_3294479
crossref_primary_10_3390_app13020695
crossref_primary_10_1016_j_future_2018_05_008
crossref_primary_10_1016_j_future_2021_04_018
crossref_primary_10_1142_S0129054119400161
crossref_primary_10_1016_j_comcom_2024_02_024
crossref_primary_10_1177_03611981221076426
crossref_primary_10_1016_j_vehcom_2023_100604
crossref_primary_10_1109_ACCESS_2021_3125521
crossref_primary_10_1007_s00607_023_01196_4
crossref_primary_10_3390_a12100201
crossref_primary_10_1016_j_comcom_2021_09_003
crossref_primary_10_1080_15472450_2023_2245750
crossref_primary_10_1016_j_jisa_2024_103830
crossref_primary_10_1016_j_treng_2024_100252
crossref_primary_10_1155_2019_1798391
crossref_primary_10_1088_1742_6596_1378_4_042079
crossref_primary_10_1016_j_cosrev_2021_100411
crossref_primary_10_1016_j_jisa_2020_102519
crossref_primary_10_1109_TDSC_2018_2797190
crossref_primary_10_1016_j_gltp_2021_08_001
crossref_primary_10_1109_TSC_2023_3250705
crossref_primary_10_1109_TVT_2022_3189540
crossref_primary_10_3233_JIFS_18077
crossref_primary_10_46300_91015_2020_14_24
crossref_primary_10_1016_j_comcom_2021_05_014
crossref_primary_10_1016_j_simpat_2020_102194
crossref_primary_10_3390_wevj15030117
crossref_primary_10_1109_ACCESS_2019_2903302
crossref_primary_10_1016_j_simpat_2021_102336
crossref_primary_10_1177_1550147719850767
crossref_primary_10_1002_cpe_7686
crossref_primary_10_3390_s22041340
crossref_primary_10_1109_ACCESS_2018_2868920
crossref_primary_10_3390_s21155028
crossref_primary_10_3390_fi13040096
crossref_primary_10_1088_1742_6596_1979_1_012035
crossref_primary_10_3390_electronics8040455
crossref_primary_10_1016_j_cosrev_2021_100421
crossref_primary_10_1016_j_vehcom_2019_100179
crossref_primary_10_1109_JIOT_2020_3022699
crossref_primary_10_1002_spy2_72
crossref_primary_10_1007_s11042_022_12300_9
crossref_primary_10_1007_s11227_020_03443_3
crossref_primary_10_1051_matecconf_201929203014
crossref_primary_10_1007_s11042_018_7008_z
crossref_primary_10_1016_j_adhoc_2023_103224
crossref_primary_10_1088_1742_6596_1524_1_012016
crossref_primary_10_1016_j_vehcom_2024_100784
crossref_primary_10_1109_ACCESS_2020_3037705
crossref_primary_10_3390_s18103191
crossref_primary_10_1002_cpe_4776
crossref_primary_10_1016_j_iswa_2023_200228
crossref_primary_10_1155_2021_8251697
crossref_primary_10_1109_TIFS_2022_3140657
crossref_primary_10_1016_j_ins_2019_12_007
crossref_primary_10_1007_s11227_018_2701_2
crossref_primary_10_1109_TIFS_2023_3287731
crossref_primary_10_1155_2018_5176569
crossref_primary_10_1016_j_future_2019_06_012
crossref_primary_10_1109_TIFS_2017_2730479
crossref_primary_10_1109_JIOT_2019_2948622
crossref_primary_10_1016_j_tele_2019_01_001
crossref_primary_10_1109_TDSC_2020_3047872
crossref_primary_10_1016_j_future_2022_11_012
crossref_primary_10_1109_ACCESS_2020_2972968
crossref_primary_10_1016_j_jnca_2018_12_013
crossref_primary_10_1109_ACCESS_2020_2972606
crossref_primary_10_1109_COMST_2017_2762345
crossref_primary_10_4018_IJFC_2020010105
crossref_primary_10_1007_s13177_022_00334_0
crossref_primary_10_1186_s13638_018_1289_9
crossref_primary_10_1002_dac_4181
crossref_primary_10_1016_j_iot_2024_101257
crossref_primary_10_1016_j_vehcom_2019_03_003
crossref_primary_10_1016_j_future_2020_09_039
crossref_primary_10_2139_ssrn_4096383
crossref_primary_10_1109_ACCESS_2017_2749422
crossref_primary_10_1109_TCC_2019_2903254
crossref_primary_10_3390_s22114019
crossref_primary_10_3390_su11051262
crossref_primary_10_3390_s19040965
crossref_primary_10_1109_TSC_2023_3239667
crossref_primary_10_1145_3474554
crossref_primary_10_1109_TIFS_2024_3356809
crossref_primary_10_1155_2021_6679654
Cites_doi 10.1007/978-3-642-18134-4_110
10.1371/journal.pone.0116709
10.1109/TC.2015.2485225
10.1109/ITSC.2009.5309870
10.1109/MOBHOC.2009.5336914
10.1109/IWCMC.2013.6583651
10.1007/978-3-540-72905-1_4
10.1016/j.adhoc.2016.02.018
10.1109/TIFS.2016.2587242
10.1145/1030083.1030117
10.1016/j.comcom.2015.08.005
10.15439/2014F503
10.1109/TVT.2009.2038222
10.1007/978-3-319-23802-9_21
10.1371/journal.pone.0152727
10.1016/S0198-9715(00)00002-8
10.1109/TVT.2013.2241460
10.1145/2342509.2342513
10.1109/TITS.2005.858786
10.1109/TITS.2004.838219
10.1016/S1361-3723(97)82613-9
10.1109/NatPC.2011.6136433
10.1049/cp:19980161
10.1007/3-540-44810-1_22
10.1007/978-3-319-28865-9_43
ContentType Journal Article
Copyright 2017 Elsevier B.V.
Copyright_xml – notice: 2017 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.future.2017.02.017
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7115
EndPage 824
ExternalDocumentID 10_1016_j_future_2017_02_017
S0167739X17302157
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29H
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
UHS
WUQ
XPP
ZMT
~G-
AAXKI
AAYXX
AFJKZ
CITATION
ID FETCH-LOGICAL-c306t-1bce32baa60a117cf6970054a835a983d681ad0bf9ce418bb078a61283ba246e3
IEDL.DBID AIKHN
ISSN 0167-739X
IngestDate Thu Sep 26 19:54:27 EDT 2024
Fri Feb 23 02:30:17 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords VANET
Traffic light control
Puzzle
Intelligent transportation system
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c306t-1bce32baa60a117cf6970054a835a983d681ad0bf9ce418bb078a61283ba246e3
ORCID 0000-0002-0482-8951
PageCount 8
ParticipantIDs crossref_primary_10_1016_j_future_2017_02_017
elsevier_sciencedirect_doi_10_1016_j_future_2017_02_017
PublicationCentury 2000
PublicationDate January 2018
2018-01-00
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: January 2018
PublicationDecade 2010
PublicationTitle Future generation computer systems
PublicationYear 2018
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Li, Zhang, Liu, Qian, Dong (br000050) 2016; 11
K.K.R. Choo, A domain-based multi-cluster SIP solution for mobile ad hoc network, in: Int. Conf. Security Privacy Commun. Syst., 2014, pp. 267–281.
N. Hounsell, J. Landles, R. Bretherton, K. Gardener, Intelligent systems for priority at traffic signals in London: The INCOME project, in: Proc. 9th Int. Conf. Road Transp. Inf. Control, RTIC, 1998, pp. 90–94.
Nam, Choo, Han, Kim, Paik, Won (br000055) 2015; 10
S. Kwatirayo, J. Almhana, Z. Liu, Adaptive traffic light control using VANET: A case study, in: Proc. 9th Int. Wireless Commun. Mobile Comput. Conf., IWCMC, 2013, pp. 752–757.
Y. Lai, Y. Zheng, J. Cao, Protocols for traffic safety using wireless sensor network, in: Proc. 7th Int. Conf. Alg. Archi. Par. Process., IC3PP, 2007, pp. 37–48.
Denning, MacDoran (br000130) 1996; 1996
Deniz, Bagci, Korpeoglu, Yaz (br000070) 2016
Zhang, Wu, Solanas, Domingo-Ferrer (br000090) 2010; 59
Guberinic, Senborn, Lazic (br000005) 2008
Zhang, Wu, Domingo-Ferrer, Qin, Hu (br000085) 2016
Pandit, Ghosal, Zhang (br000110) 2013; 62
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of things, in: Proc. 1st ed Workshop Mobile Cloud Comput., MCC, 2012, pp. 13–16.
Kumar, Ranganath, Huang, Sengupta (br000040) 2005; 6
Zhang, Hu, Wu, Domingo-Ferrer, Qin (br000095) 2016; 65
Qureshi, Noor, Shamim, Shamshirband, Choo (br000080) 2016; 11
T. Aura, P. Nikander, J. Leiwo, DOS-resistant authentication with client puzzles, in: Proc. 8th Int. Workshop Security Prot., SPW 2000, pp. 170–177.
L. Scott, D. Denning, A location based encryption technique and some of its applications, in: Proc. Inst. Navigation Nat. Tech. Meeting, 2003, pp. 734–740.
B. Waters, A. Juels, J. Halderman, E. Felten, New client puzzle outsourcing techniques for DoS resistance, in: Proc. 11th ACM Conf. Comput. Commun. Security, CCS, 2004, pp. 246–256.
G. Yan, S. Olariu, An efficient geographic location-based security mechanism for vehicular adhoc networks, in: Proc. 6th Int. Conf. Mobile Adhoc Sensor Syst., MASS, 2009, pp. 804–809.
M. Besley, R. Akcelik, E. Chung, An evaluation of SCATS master isolated control, in: Proc. 19th ARRB Transp. Res. Conf., TRC, 1998, pp. 1–24.
G. Yan, J. Lin, D. Rawat, W. Yang, A geographic location-based security mechanism for intelligent vehicular networks, in: Proc. Intell. Comput. Inform. Sci., ICICIS, 2011, pp. 693–698.
Zhang, Wu, Qin, Domingo-Ferrer, Liu (br000160) 2015; 71
Atev, Arumugam, Masoud, Janardan, Papanikolopoulos (br000035) 2005; 6
I. Stojmenovic, S. Wen, The Fog computing paradigm: Scenarios and security issues, in: Proc. Comput. Sci. Inform. Syst., FedCSIS, 2014, September 2014, pp. 1–8.
M. Younes, A. Boukerche, An intelligent traffic light scheduling algorithm through VANETs, in: 39th Conf. Local Comput. Networks, LCN, 2014, pp. 637–642.
Robertson (br000020) 1969; 11
W. Chen, L. Chen, Z. Chen, T. Shiliang, A realtime dynamic traffic control system based on wireless sensor network, in: Proc. 34th Int. Conf. Par. Process., ICPP, 2005, pp. 258–264.
M. Abbas, M. Karsiti, M. Napiah, B. Samir, Traffic light control using VANET system architecture, in: Proc. Nat. Postgraduate Conf., NPC, 2011, pp. 1–6.
C. Priemer, B. Friedrich, A decentralized adaptive traffic signal control using V2I communication data, in: Proc. 12th Int. IEEE Conf. Intell. Transp. Syst., ITS, 2009, pp. 1–6.
Wey (br000015) 2000; 24
W.J. Seo, R. Islam, M.K. Khan, K.K.R. Choo, A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering, in: Int. Conf. Security Privacy Commun. Syst., 2015, pp. 649–664.
Wey (10.1016/j.future.2017.02.017_br000015) 2000; 24
Zhang (10.1016/j.future.2017.02.017_br000160) 2015; 71
Denning (10.1016/j.future.2017.02.017_br000130) 1996; 1996
Kumar (10.1016/j.future.2017.02.017_br000040) 2005; 6
10.1016/j.future.2017.02.017_br000105
Robertson (10.1016/j.future.2017.02.017_br000020) 1969; 11
10.1016/j.future.2017.02.017_br000125
10.1016/j.future.2017.02.017_br000145
10.1016/j.future.2017.02.017_br000025
10.1016/j.future.2017.02.017_br000045
10.1016/j.future.2017.02.017_br000100
10.1016/j.future.2017.02.017_br000065
10.1016/j.future.2017.02.017_br000120
Li (10.1016/j.future.2017.02.017_br000050) 2016; 11
10.1016/j.future.2017.02.017_br000140
Nam (10.1016/j.future.2017.02.017_br000055) 2015; 10
10.1016/j.future.2017.02.017_br000060
Guberinic (10.1016/j.future.2017.02.017_br000005) 2008
Zhang (10.1016/j.future.2017.02.017_br000095) 2016; 65
Atev (10.1016/j.future.2017.02.017_br000035) 2005; 6
Zhang (10.1016/j.future.2017.02.017_br000090) 2010; 59
Zhang (10.1016/j.future.2017.02.017_br000085) 2016
10.1016/j.future.2017.02.017_br000115
10.1016/j.future.2017.02.017_br000135
Qureshi (10.1016/j.future.2017.02.017_br000080) 2016; 11
10.1016/j.future.2017.02.017_br000155
10.1016/j.future.2017.02.017_br000075
10.1016/j.future.2017.02.017_br000010
Pandit (10.1016/j.future.2017.02.017_br000110) 2013; 62
Deniz (10.1016/j.future.2017.02.017_br000070) 2016
10.1016/j.future.2017.02.017_br000150
10.1016/j.future.2017.02.017_br000030
References_xml – year: 2008
  ident: br000005
  article-title: Optimal Traffic Control: Urban Intersections
  contributor:
    fullname: Lazic
– start-page: 104
  year: 2016
  end-page: 117
  ident: br000070
  article-title: An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
  publication-title: Ad Hoc Networks
  contributor:
    fullname: Yaz
– volume: 11
  start-page: 2572
  year: 2016
  end-page: 2583
  ident: br000050
  article-title: Privacy-preserving public auditing protocol for low performance end devices in cloud
  publication-title: IEEE Trans. Inf. Forensics Secur.
  contributor:
    fullname: Dong
– volume: 62
  start-page: 1459
  year: 2013
  end-page: 1471
  ident: br000110
  article-title: Adaptive traffic signal control with vehicular ad hoc networks
  publication-title: IEEE Trans. Veh. Technol.
  contributor:
    fullname: Zhang
– volume: 1996
  start-page: 12
  year: 1996
  end-page: 16
  ident: br000130
  article-title: Location-based authentication: Grounding cyberspace for better security
  publication-title: Comput. Fraud Secur.
  contributor:
    fullname: MacDoran
– year: 2016
  ident: br000085
  article-title: Distributed aggregate privacy-preserving authentication in VANETs
  publication-title: IEEE Trans. Intell. Transp. Syst.
  contributor:
    fullname: Hu
– volume: 6
  start-page: 416
  year: 2005
  end-page: 423
  ident: br000035
  article-title: A visionbased approach to collision prediction at traffic intersections
  publication-title: IEEE Trans. Intell. Transp. Syst.
  contributor:
    fullname: Papanikolopoulos
– volume: 6
  start-page: 43
  year: 2005
  end-page: 53
  ident: br000040
  article-title: Framework for real-time behavior interpretation from traffic video
  publication-title: IEEE Trans. Intell. Transp. Syst.
  contributor:
    fullname: Sengupta
– volume: 11
  start-page: e0152727
  year: 2016
  ident: br000080
  article-title: A lightweight radio propagation model for vehicular communication in road tunnels
  publication-title: PLoS One
  contributor:
    fullname: Choo
– volume: 24
  start-page: 355
  year: 2000
  end-page: 378
  ident: br000015
  article-title: Model formulation and solution algorithm of traffic signal control in an urban network
  publication-title: Comput. Environ. Urban Syst.
  contributor:
    fullname: Wey
– volume: 59
  start-page: 1606
  year: 2010
  end-page: 1617
  ident: br000090
  article-title: A scalable robust authentication protocol for secure vehicular communications
  publication-title: IEEE Trans. Veh. Technol.
  contributor:
    fullname: Domingo-Ferrer
– volume: 11
  start-page: 276
  year: 1969
  end-page: 281
  ident: br000020
  article-title: TRANSYT method for area traffic control
  publication-title: Traffic Eng. Control
  contributor:
    fullname: Robertson
– volume: 65
  start-page: 2562
  year: 2016
  end-page: 2574
  ident: br000095
  article-title: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response
  publication-title: IEEE Trans. Comput.
  contributor:
    fullname: Qin
– volume: 71
  start-page: 50
  year: 2015
  end-page: 60
  ident: br000160
  article-title: Practical secure and privacy-preserving scheme for value-added applications in VANETs
  publication-title: Comput. Commun.
  contributor:
    fullname: Liu
– volume: 10
  start-page: e0116709
  year: 2015
  ident: br000055
  article-title: Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation
  publication-title: PLoS One
  contributor:
    fullname: Won
– ident: 10.1016/j.future.2017.02.017_br000140
  doi: 10.1007/978-3-642-18134-4_110
– volume: 10
  start-page: e0116709
  issue: 4
  year: 2015
  ident: 10.1016/j.future.2017.02.017_br000055
  article-title: Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation
  publication-title: PLoS One
  doi: 10.1371/journal.pone.0116709
  contributor:
    fullname: Nam
– volume: 65
  start-page: 2562
  issue: 8
  year: 2016
  ident: 10.1016/j.future.2017.02.017_br000095
  article-title: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2015.2485225
  contributor:
    fullname: Zhang
– year: 2016
  ident: 10.1016/j.future.2017.02.017_br000085
  article-title: Distributed aggregate privacy-preserving authentication in VANETs
  publication-title: IEEE Trans. Intell. Transp. Syst.
  contributor:
    fullname: Zhang
– ident: 10.1016/j.future.2017.02.017_br000010
  doi: 10.1109/ITSC.2009.5309870
– ident: 10.1016/j.future.2017.02.017_br000025
– ident: 10.1016/j.future.2017.02.017_br000155
– ident: 10.1016/j.future.2017.02.017_br000145
  doi: 10.1109/MOBHOC.2009.5336914
– ident: 10.1016/j.future.2017.02.017_br000105
  doi: 10.1109/IWCMC.2013.6583651
– ident: 10.1016/j.future.2017.02.017_br000075
  doi: 10.1007/978-3-540-72905-1_4
– volume: 11
  start-page: 276
  issue: 6
  year: 1969
  ident: 10.1016/j.future.2017.02.017_br000020
  article-title: TRANSYT method for area traffic control
  publication-title: Traffic Eng. Control
  contributor:
    fullname: Robertson
– start-page: 104
  year: 2016
  ident: 10.1016/j.future.2017.02.017_br000070
  article-title: An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2016.02.018
  contributor:
    fullname: Deniz
– volume: 11
  start-page: 2572
  issue: 11
  year: 2016
  ident: 10.1016/j.future.2017.02.017_br000050
  article-title: Privacy-preserving public auditing protocol for low performance end devices in cloud
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2587242
  contributor:
    fullname: Li
– ident: 10.1016/j.future.2017.02.017_br000125
  doi: 10.1145/1030083.1030117
– year: 2008
  ident: 10.1016/j.future.2017.02.017_br000005
  contributor:
    fullname: Guberinic
– volume: 71
  start-page: 50
  year: 2015
  ident: 10.1016/j.future.2017.02.017_br000160
  article-title: Practical secure and privacy-preserving scheme for value-added applications in VANETs
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2015.08.005
  contributor:
    fullname: Zhang
– ident: 10.1016/j.future.2017.02.017_br000120
  doi: 10.15439/2014F503
– volume: 59
  start-page: 1606
  issue: 4
  year: 2010
  ident: 10.1016/j.future.2017.02.017_br000090
  article-title: A scalable robust authentication protocol for secure vehicular communications
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2009.2038222
  contributor:
    fullname: Zhang
– ident: 10.1016/j.future.2017.02.017_br000045
  doi: 10.1007/978-3-319-23802-9_21
– volume: 11
  start-page: e0152727
  issue: 3
  year: 2016
  ident: 10.1016/j.future.2017.02.017_br000080
  article-title: A lightweight radio propagation model for vehicular communication in road tunnels
  publication-title: PLoS One
  doi: 10.1371/journal.pone.0152727
  contributor:
    fullname: Qureshi
– ident: 10.1016/j.future.2017.02.017_br000135
– volume: 24
  start-page: 355
  issue: 4
  year: 2000
  ident: 10.1016/j.future.2017.02.017_br000015
  article-title: Model formulation and solution algorithm of traffic signal control in an urban network
  publication-title: Comput. Environ. Urban Syst.
  doi: 10.1016/S0198-9715(00)00002-8
  contributor:
    fullname: Wey
– volume: 62
  start-page: 1459
  issue: 4
  year: 2013
  ident: 10.1016/j.future.2017.02.017_br000110
  article-title: Adaptive traffic signal control with vehicular ad hoc networks
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2013.2241460
  contributor:
    fullname: Pandit
– ident: 10.1016/j.future.2017.02.017_br000115
  doi: 10.1145/2342509.2342513
– volume: 6
  start-page: 416
  issue: 4
  year: 2005
  ident: 10.1016/j.future.2017.02.017_br000035
  article-title: A visionbased approach to collision prediction at traffic intersections
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2005.858786
  contributor:
    fullname: Atev
– volume: 6
  start-page: 43
  issue: 4
  year: 2005
  ident: 10.1016/j.future.2017.02.017_br000040
  article-title: Framework for real-time behavior interpretation from traffic video
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2004.838219
  contributor:
    fullname: Kumar
– ident: 10.1016/j.future.2017.02.017_br000065
– volume: 1996
  start-page: 12
  issue: 2
  year: 1996
  ident: 10.1016/j.future.2017.02.017_br000130
  article-title: Location-based authentication: Grounding cyberspace for better security
  publication-title: Comput. Fraud Secur.
  doi: 10.1016/S1361-3723(97)82613-9
  contributor:
    fullname: Denning
– ident: 10.1016/j.future.2017.02.017_br000100
  doi: 10.1109/NatPC.2011.6136433
– ident: 10.1016/j.future.2017.02.017_br000030
  doi: 10.1049/cp:19980161
– ident: 10.1016/j.future.2017.02.017_br000150
  doi: 10.1007/3-540-44810-1_22
– ident: 10.1016/j.future.2017.02.017_br000060
  doi: 10.1007/978-3-319-28865-9_43
SSID ssj0001731
Score 2.567878
Snippet As the number of vehicles grows, traffic efficiency is becoming a worldwide problem. Intelligent transportation system aims to improve the traffic efficiency,...
SourceID crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 817
SubjectTerms Intelligent transportation system
Puzzle
Traffic light control
VANET
Title Secure intelligent traffic light control using fog computing
URI https://dx.doi.org/10.1016/j.future.2017.02.017
Volume 78
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07a8MwED7yWLr0XZo-goauaizLsWzoEkKD29IsbSCbkGw5pJQkBHftb-_JlkILpUMnI-Mz5iTffXd8-gRwI3iuEGcENCq4phHPY4ooxMpWmgKLMZx2Y1sDz9M4m0WP8-G8BWO_F8bSKl3sb2J6Ha3dnYHz5mCzXA5eLIFe8HTOcJFi4hJt6GI6CpMOdEcPT9l0F5DxAeYlvq2B30FX07wa6Q7L8RK1eGd9ctkvGepb1pkcwr6Di2TUfNERtMzqGA78UQzE_ZkncFf3zQ1Z7hQ2K1JtldWHIO-2_iaOk04s0X1ByvWC5PVbcHQKs8n96zij7mAEmiPCryjTueGhVioOFGMiL-NUWOylEE6pNOFFnDBVBLpMcxOxRGvEAQqhTMK1CqPY8DPorNYrcw5EBSoYlkOhdYqFEUa_SBusoZQuNBqXRQ-od4bcNPoX0hPD3mTjPGmdJ4NQ4qUHwntM_phHiSH6T8uLf1tewh6OkqYxcgWdavthrhEqVLoP7dtP1ncL4gua-r50
link.rule.ids 315,783,787,4509,24128,27936,27937,45597,45691
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07a8MwED7SZGiXvkvTp4auJlbkWDZ0CaHBaR5LE8gmJFkOKcUJwf3_PdlyaKF06GT8OCNO0um749MngCfOtESc4XtBypQXMB16iEKsbKVJMRnDbje2NDCdhckieF32lg0Y1HthLK3Sxf4qppfR2j3pOG92tut1580S6DmLlxQHKS5c_ABaiAZinJ2t_miczPYBGT-gtcS3Nah30JU0r0q6w3K8eCneWZ5c9ssK9W3VGZ7CsYOLpF-16AwaJj-Hk_ooBuJm5gU8l3VzQ9Z7hc2CFDtp9SHIh82_ieOkE0t0X5FssyK6_AveXcJi-DIfJJ47GMHTiPALjyptWFdJGfqSUq6zMOYWe0mEUzKOWBpGVKa-ymJtAhophThAIpSJmJLdIDTsCpr5JjfXQKQv_V7W40rFmBhh9AuUwRxKqlShcZa2waudIbaV_oWoiWHvonKesM4TflfgpQ289pj40Y8CQ_Sfljf_tnyEw2Q-nYjJaDa-hSN8E1VFkjtoFrtPc4-woVAPblh8ATwQwGg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+intelligent+traffic+light+control+using+fog+computing&rft.jtitle=Future+generation+computer+systems&rft.au=Liu%2C+Jian&rft.au=Li%2C+Jiangtao&rft.au=Zhang%2C+Lei&rft.au=Dai%2C+Feifei&rft.date=2018-01-01&rft.issn=0167-739X&rft.volume=78&rft.spage=817&rft.epage=824&rft_id=info:doi/10.1016%2Fj.future.2017.02.017&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_future_2017_02_017
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon