Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c...
详细信息
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy *** address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed ***,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many *** such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)*** formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably *** proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and ***,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and *** the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security ***,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.
The problem of inadequate and class imbalanced data is one of the major problems in the classification tasks. Therefore applying synthetic data generation (SDG) approaches to handle class imbalances can be useful in i...
详细信息
Queuing delay is the waiting time for the packets in the queue before processing. It significantly impacts the network compared to processing, and transmission delays. The delay occurs when a packet suddenly arrives f...
详细信息
In natural language processing, data acquisition and preprocessing techniques are significant for experiments involving training models on cleaned data. This paper describes the formation of a dataset of ugly and dero...
详细信息
Clustering, an unsupervised machine learning technique with numerous practical applications, has received a great deal of research attention. Along with deterministic and probabilistic approaches, fuzzy C-means cluste...
详细信息
Sarcasm-also termed as verbal irony, when the speaker presents something in a mocking or humorous way such that he or she actually conveys the opposite of what they seem to say. This article has a detailed analysis of...
详细信息
The ayurvedic medicines have played a crucial role in health system, only a few experts could identify the herbs and know the ayurvedic properties of these herbs. These medicines prepared from the herbs having less si...
详细信息
This study presents an integrated system devised to combat plastic pollution in lakes autonomously, eliminating the need for human intervention. Utilizing sensor data and camera imagery processed through the YOLO algo...
详细信息
Crop diseases have become more dangerous for farmers, reducing agriculture growth globally. Improving crop disease detection based on affected regions is very important. The proposed approach combines image processing...
详细信息
Sentiment analysis (SA) has been used to monitor social media, help customers, perform market research, and gauge client sentiment to improve businesses' products and services over time. The conventional approach ...
详细信息
暂无评论