The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile *** allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different ...
详细信息
The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile *** allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity(Wi-Fi),Global System for Mobile Communication(GSM),Universal Mobile Telecommunications System(UMTS),Long Term Evolution(LTE)and Fifth Generation(5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase ***,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service(DoS),spoofing,Man in the Middle(MITM)and *** paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling *** with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.
Accurate identification of gemstones is crucial in various fields, including gemology research, jewelry appraisal, and consumer protection, where authenticity verification is paramount to prevent fraud and ensure trus...
详细信息
In corporate settings, conferences, or classrooms, an orator relies on manual slide transitions, which can disrupt their presentation flow. Presentation devices can be inaccessible due to the physical limitations of i...
详细信息
Sign gestures play a crucial role in communication for the deaf community, emphasizing the need for effective translation systems. Hand gestures convey thoughts more rapidly than other actions, making them essential f...
详细信息
Fraud detection in smart grids is critical to ensure reliable and efficient energy distribution, preventing significant financial losses and maintaining grid stability. This project presents an advanced fraud detectio...
详细信息
Effective management of semi-perishable food items is essential for minimising waste, maintaining food safety, and supporting sustainability efforts. This paper introduces the Responsibility Index for Sustainability a...
详细信息
With this work, a technical method for identifying Indian Sign Language is attempted to be developed. This work attempted to create a system for recognizing the hand movements from Indian Sign Language using machine l...
详细信息
The online food order and delivery service is becoming a very popular web-based application in Bangladesh. These days, a growing number of individuals are interested in ordering a variety of foods online. In addition,...
详细信息
Distributed network attacks are referred to, usually, as Distributed Denial of Service (DDoS) attacks. These attacks take advantage of specific limitations that apply to any arrangement asset, such as the framework of...
详细信息
This paper investigates a cooperative motion planning problem for large-scale connected autonomous vehicles (CAVs) under limited communications, which addresses the challenges of high communication and computing resou...
详细信息
This paper investigates a cooperative motion planning problem for large-scale connected autonomous vehicles (CAVs) under limited communications, which addresses the challenges of high communication and computing resource requirements. Our proposed methodology incorporates a parallel optimization algorithm with improved consensus ADMM considering a more realistic locally connected topology network, and time complexity of $\mathcal {O}(N)$ is achieved by exploiting the sparsity in the dual update process. To further enhance the computational efficiency, we employ a lightweight evolution strategy for the dynamic connectivity graph of CAVs, and each sub-problem split from the consensus ADMM only requires managing a small group of CAVs. The proposed method implemented with the receding horizon scheme is validated thoroughly, and comparisons with existing numerical solvers and approaches demonstrate the efficiency of our proposed algorithm. Also, simulations on large-scale cooperative driving tasks involving up to 100 vehicles are performed in the high-fidelity CARLA simulator, which highlights the remarkable computational efficiency, scalability, and effectiveness of our proposed development. Demonstration videos are available at https://***/icadmm_cmp_carla. IEEE
暂无评论