Reliable artificial intelligence (AI) systems not only propose a challenge on providing intelligent services with high quality for customers but also require customers' privacy to be protected as much as possible ...
详细信息
The rapid growth of electric vehicles (EVs) globally and in Malaysia has raised significant concerns regarding the adequacy and spatial imbalance of charging infrastructure. Despite government incentives and policy su...
详细信息
The rapid growth of electric vehicle and autonomous vehicle populations has led to explosive expansion of IoV data being transmitted in the wireless communication infrastructure. Advances in IoV technologies also resu...
详细信息
Due to the exposure of transmitted messages in public channels within Vehicular Ad-Hoc Network (VANET), many authentication schemes have been proposed to safeguard security and privacy. And in existing schemes, to exp...
详细信息
The emergence of new machine learning methods has led to their widespread application across various domains, significantly advancing the field of artificial intelligence. However, the process of training and inferrin...
详细信息
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com...
详细信息
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain *** research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP *** this paper,we propose a blockchain-based trust model for inter-domain *** model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the *** BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective *** incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing *** forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing *** use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust *** with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.
The advancement of YOLO and similar computer vision models represents a technological era that could revolutionize numerous aspects of day-to-day life, including traffic management. This study explores the feasibility...
详细信息
In wireless body sensor networks (WBSNs), ensuring secure and efficient key distribution is critical, particularly given the limited computational and energy resources of the sensors. Existing methods often struggle t...
详细信息
Examinations are fundamental to education, yet conducting secure computer-based exams in disrupted environments presents significant challenges. This research introduces a Secure by Design protocol leveraging Delay To...
详细信息
暂无评论