The evolution of intelligent transport systems (ITS) has significantly enhanced driving experiences in vehicular ad-hoc networks (VANET), crucial for improving road safety and traffic efficiency. Despite these advance...
详细信息
ISBN:
(纸本)9798350373981;9798350373974
The evolution of intelligent transport systems (ITS) has significantly enhanced driving experiences in vehicular ad-hoc networks (VANET), crucial for improving road safety and traffic efficiency. Despite these advancements, challenges persist. Trust management solutions often assume user legitimacy without verification. Moreover, the need for reauthentication as vehicles move between RSUs adds computational complexity. VANET is relatively vulnerable to security threats from multiple parties given its highly dynamic topology and its wireless and heterogeneous communication mode. We have expanded upon Maria et al.'s schema by specifically targeting and resolving significant shortcomings in their research. More precisely, we improve the features related to confirming the identity of users, preventing vehicles from being used without authorization, and continuously monitoring their current location in order to strengthen the security of vehicles and increase user involvement. We suggest implementing a schema that utilizes QR code verification to authenticate vehicle users, specifically targeting these difficulties. In VANETs, blockchain has been adopted with the authentication process for fog computing. The result is that there is no need for trusted authority (TA) while achieving privacy within the blockchain network and ensuring of the vehicle user authentication and the integrity of messages. Several key benefits have been achieved, such as blocking malicious entities and the potential damage they cause, enabling the revocation of malicious vehicles by conditional anonymization, as well as simplifying conflict resolution. Likewise, the proposed work was characterized by achieving an effective balance between effectiveness and complexity, protecting privacy, conditional tracking, ensuring integrity, and anonymous authentication.
Mobile communication has evolved from 4G to 6G, and each stage has its unique computing form. In the 4G era, cloud computing empowered the rapid rise of mobile Internet. In the 5G era, edge computing supported the str...
详细信息
In the modern digital age, data security stands as a very important priority. The increasing need for lightweight devices and their resource-constrained environments calls for certain cryptographic solutions that can ...
详细信息
Parallel computing has become a cornerstone of modern computational systems, enabling the rapid processing of complex tasks by utilizing multiple processors simultaneously. However, the efficiency and reliability of t...
详细信息
Lately, worldwide, there is an increasing interest in the development of electric vehicles that can also have intelligent capabilities so that they can then be transformed into autonomous vehicles. In this context, th...
详细信息
The proceedings contain 45 papers. The special focus in this conference is on Information System Design and Intelligent Applications. The topics include: Denoising and Quality Enhancement of CT Scan/X-Ray Images of Lu...
ISBN:
(纸本)9789819786657
The proceedings contain 45 papers. The special focus in this conference is on Information System Design and Intelligent Applications. The topics include: Denoising and Quality Enhancement of CT Scan/X-Ray Images of Lung Disease for Enhanced Diagnosis;changing Paradigms in Dementia Care: Technology-Based Solutions;dead Drop Covert Channel Technique Using Windows Registry;A Comparison of LEACH-Like Protocols to Improve Power Consumption Efficiency in Wireless Sensor Networks;The Efficacy of α-Channels in PNG Image File Format for Covert communication;smartening Energy Consumption: A Comparative Study of Energy Optimization Strategies in IoT Environments;performance Evaluation of IoT-Fog-Cloud System for Data Storage, Analysis and Visualisations Using Retrial Queues Approach;investigation in Future Autonomous Transport;comparative Analysis of Simulation Tools and IoT Platforms for Middleware;dual Band Dual Polarized Coaxial Feed Microstrip Patch Antenna for Wireless Applications;enhancing E-Learning Interactivity with Haar Cascade User Detection;a Novel Method for Implementing the IoT-Based Hybrid Energy System with Pollution Monitoring and control in Coastal Roadways;A Novel Proportional Integral Derivative (PID) controller-Based control Strategy for a Formula Student Vehicle;a Bluetooth and Smartphone-Based Geofencing Solution For Monitoring Objects;performance Analysis of LoRa communication in Suburban Environments;LPWAN Technologies in Smart Cities: A Comparative Analysis of LoRa, Sigfox, and LTE-M;forewarning Disaster Alert Systems and Mitigation Response;optimizing Cloud computing Resource Allocation Through Intelligent Strategies;ioT-Enabled Neural Network Analysis for Early Detection and Prediction of Mental Depression;connecting IoT Sensors for Enhanced Dementia Disease Monitoring and Intervention;an Effective Exploration of Accessing 5G Mobile communication That Affects E-Commerce Using IoT;smart Agriculture Farming Using Drone automation Technology.
This paper addresses the secure leader-following consensus problem in networked multi-agent systems (MASs) subjected to distributed DoS attacks. We propose a robust consensus protocol, leveraging dual-terminal dynamic...
详细信息
The evolution of human-computer interaction (HCI), particularly in the era of the Internet of Things (IoT), demands innovative solutions that transcend traditional interfaces like keyboards and touchscreens. This stud...
详细信息
In flexible production systems with distributed control systems which communicate with each other via a real time network, changes in the requirements for real time communication during operation must not lead to a te...
详细信息
ISBN:
(数字)9781665499965
ISBN:
(纸本)9781665499965
In flexible production systems with distributed control systems which communicate with each other via a real time network, changes in the requirements for real time communication during operation must not lead to a temporary failure of the deterministic communication. Rather, the changes of the network configuration must become active at exactly predictable times in order to guarantee the functionality of the deterministic communication all the time. This paper shows a realization of how the configuration of a real time network schedule under Linux can be adjusted at predetermined times without interrupting the communication. For this purpose, the real time scheduler TAPRIO is integrated into the library libnl, and the performance of this extension is evaluated in a test case. It is shown that the modification of the network configuration is reliably possible in several successive communication cycles.
With the rapid development of the Industrial Internet of Things, a vast amount of data generates, collects, and processes, playing a crucial role in industrial production and operations. Addressing issues of privacy l...
详细信息
暂无评论