作者:
Yu ZhangXiangyu BaiCollege of Computer
Inner Mongolia University Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
Vehicle Ad Hoc Network (VANET) is a kind of vehicular self-organizing network. The communication mode of VANET mainly includes V2V, V2I and I2V. VANET has the unique characteristics of changeable network topology, fre...
详细信息
ISBN:
(数字)9781728146539
ISBN:
(纸本)9781728146546
Vehicle Ad Hoc Network (VANET) is a kind of vehicular self-organizing network. The communication mode of VANET mainly includes V2V, V2I and I2V. VANET has the unique characteristics of changeable network topology, frequent exchange of messages between nodes and unstable channel resources. With the in-depth study of vehicular network, more and more security problems have emerged, and the safety of vehicular network is one of the important factors affecting the overall development of vehicular network. More and more scholars have studied and discussed this issue. This paper summarizes the research work on VANET security authentication in recent years. Firstly, an overview of the mathematical tools, cryptography basics, and cybersecurity knowledge used to build a secure authentication scheme; Then, several types of security authentication methods are introduced from the key technologies of authentication; Finally, it makes a comparative analysis of the existing work and summarizes the prospects.
The Delay Tolerant Network (DTN) is suitable for post-disaster environments where infrastructure is scarce. Search and rescue operations require network deployment in areas not covered by infrastructure. In the post-d...
详细信息
ISBN:
(数字)9781728146539
ISBN:
(纸本)9781728146546
The Delay Tolerant Network (DTN) is suitable for post-disaster environments where infrastructure is scarce. Search and rescue operations require network deployment in areas not covered by infrastructure. In the post-disaster DTN environment, UAVs are introduced as ferry nodes for message-passing and it is a popular practice recently. This paper introduces the application of Delay Tolerant Network in post-disaster environments and introduces message-passing through ferry nodes in DTN. Next, this paper analyzes the UAV's ferry algorithms from the perspectives of UAV network architecture, node routing algorithm, node deployment, node trajectory optimization, node energy optimization and node storage allocation optimization in DTN. The application of UAV ferry algorithm in post-disaster DTN environment is analyzed, and the performance evaluation as well as the comparison of different algorithms are given. Finally, this paper looks forward to the future research direction of UAV ferry algorithm in DTN environment.
Vehicular Ad-hoc Networks (VANETs) is a traditional mobile ad hoc network (MANET) used on traffic roads and it is a special mobile ad hoc network. As an intelligent transportation system, VANETs can solve driving safe...
详细信息
ISBN:
(数字)9781728146539
ISBN:
(纸本)9781728146546
Vehicular Ad-hoc Networks (VANETs) is a traditional mobile ad hoc network (MANET) used on traffic roads and it is a special mobile ad hoc network. As an intelligent transportation system, VANETs can solve driving safety and provide value-added services. Therefore, the application of VANETs can improve the safety and efficiency of road traffic. Location services are in a crucial position for the development of VANETs. VANETs has the characteristics of open access and wireless communication. Malicious node attacks may lead to the leakage of user privacy in VANETs, thus seriously affecting the use of VANETs. Therefore, the location privacy issue of VANETs cannot be ignored. This paper classifies the attack methods in VANETs, and summarizes and compares the location privacy protection techniques proposed in the existing research.
With the frequent occurrence of traffic accidents, the timely acquisition of traffic images using Vehicular Ad Hoc Network (VANET) technology is of great significance for traffic rescue and evidence preservation. Howe...
详细信息
ISBN:
(数字)9781728143286
ISBN:
(纸本)9781728143293
With the frequent occurrence of traffic accidents, the timely acquisition of traffic images using Vehicular Ad Hoc Network (VANET) technology is of great significance for traffic rescue and evidence preservation. However, due to the limited bandwidth of VANET, the amount of data transmitted is limited. In response to this problem, this paper designs an image acquisition algorithm. The algorithm selects several images from the driving recorder of the vehicles around the accident. These images are transmitted to the traffic management department. In addition, the selected images have strong temporal and spatial correlation, so they can be compressed by compressed sensing technology to further reduce the amount of data. Therefore, the method of processing images on the vehicle node using compressed sensing technology are proposed. Finally, the effectiveness of the image acquisition algorithm is verified by simulation experiments.
In this paper, the fuzzy association algorithm based on Load Classifier is proposed to study the fuzzy association rules of numerical data flow. A method of dynamic partitioning of data blocks by load classifier for d...
详细信息
Nowadays the composition and structure of the manufacturing industry supply chain have become increasingly complex. The loss and not-in-time transmission of the supply chain information have aggravated the bullwhip ef...
详细信息
The rapid development of mobile networks has revolutionized the way of accessing the Internet. The exponential growth of mobile subscribers, devices and various applications frequently brings about excessive traffic i...
详细信息
The rapid development of mobile networks has revolutionized the way of accessing the Internet. The exponential growth of mobile subscribers, devices and various applications frequently brings about excessive traffic in mobile networks. The demand for higher data rates, lower latency and seamless handover further drive the demand for the improved mobile network design. However, traditional methods can no longer offer cost-efficient solutions for better user quality of experience with fast time-to-market. Recent work adopts SDN in LTE core networks to meet the requirement. In these software defined LTE core networks, scalability and security become important design issues that must be considered seriously. In this paper, we propose a scalable channel security scheme for the software defined LTE core network. It applies the VxLAN for scalable tunnel establishment and MACsec for security enhancement. According to our evaluation, the proposed scheme not only enhances the security of the channel communication between different network components, but also improves the flexibility and scalability of the core network with little performance penalty. Moreover, it can also shed light on the design of the next generation cellular network.
暂无评论