期刊文献+
共找到281篇文章
< 1 2 15 >
每页显示 20 50 100
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
1
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ECC) PRIVACY SECURITY vehicular ad hoc network(vanet)
下载PDF
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
2
作者 Bruno Macena Celio Albuquerque Raphael Machado 《Advances in Internet of Things》 2023年第4期109-118,共10页
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe... As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles. 展开更多
关键词 vehicular ad-hoc networks (vanets) Privacy and Data Protection CYBERSECURITY Pseudonymization Schemes Internet of Vehicles (IoV)
下载PDF
VANET中隐私保护的格基异构签密方案
3
作者 崔剑阳 蔡英 +1 位作者 张宇 范艳芳 《小型微型计算机系统》 CSCD 北大核心 2024年第9期2269-2277,共9页
针对车载自组织网络(Vehicular Ad hoc Network,VANET)中车辆跨密码系统通信过程中的隐私泄露问题,提出了一种格基异构签密方案.首先,方案实现了无证书密码系统(Certificateless Cryptosystem,CLC)的车辆与基于身份密码系统(Identity-Ba... 针对车载自组织网络(Vehicular Ad hoc Network,VANET)中车辆跨密码系统通信过程中的隐私泄露问题,提出了一种格基异构签密方案.首先,方案实现了无证书密码系统(Certificateless Cryptosystem,CLC)的车辆与基于身份密码系统(Identity-Based Cryptosystem,IBC)的车辆相互通信;其次利用签密的机密性和可认证性防止车辆用户在跨密码系统通信过程中发生隐私泄露,并实现了接收方对消息完整性以及发送方身份合法性的认证;最后在随机预言机模型下证明了方案在适应性选择密文攻击下具有不可区分性(Indistinguishability against adaptive Chosen Cipher Text Attack,IND-CCA2),在适应性选择消息攻击下具有存在性不可伪造性(Existential Unforgeability against adaptive Chosen Messages Attack,EUF-CMA).性能分析表明,与其他方案相比,本文方案在计算开销、通信开销和安全性方面具有一定优势,适用于车辆跨密码系统通信的场景. 展开更多
关键词 车载自组织网络 隐私保护 可认证性 异构签密
下载PDF
Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks 被引量:32
4
作者 Xiaohua Ge Shunyuan Xiao +2 位作者 Qing-Long Han Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第1期31-46,共16页
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr... This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency. 展开更多
关键词 Automated vehicles dynamic event-triggered communication information flow topology platooning control vehicular ad-hoc networks(vanets)
下载PDF
Performance of beacon safety message dissemination in Vehicular Ad hoc NETworks (VANETs) 被引量:4
5
作者 YOUSEFI Saleh FATHY Mahmood BENSLIMANE Abderrahim 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第12期1990-2004,共15页
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio... Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications. 展开更多
关键词 Safety applications Inter-vehicle communications vehicular Ad hoc networks vanets) Application level QoS Effective range
下载PDF
Power Allocation for Cooperative Communications in Non-Orthogonal Cognitive Radio Vehicular Ad-Hoc Networks 被引量:1
6
作者 Yancheng Ji Dan Sun +1 位作者 Xiaojun Zhu Danfeng Dong 《China Communications》 SCIE CSCD 2020年第11期91-99,共9页
To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to... To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to the main system in a controllable range.We propose a three-slot one-way vehicle system model where the mobile vehicle nodes complete information interaction with the assistance of other independent nodes by borrowing the unused radio spectrum with the primary networks.The end-to-end SNR relationship in overlay and underlay cognitive communication system mode are analyzed by using two forwarding protocol,namely,decode-and-forward(DF)protocol and amplify-and-forward(AF)protocol,respectively.The system outage probability is derived and the optimal power allocation factor is obtained via seeking the minimum value of the approximation of system outage probability.The analytical results have been confirmed by means of Monte Carlo simulations.Simulation results show that the proposed system performance in terms of outage under the optimal power allocation is superior to that under the average power allocation,and is also better than that under other power allocation systems. 展开更多
关键词 DECODE-AND-FORWARD AMPLIFY-AND-FORWARD outage probability optimal power allocation cooperative communication cognitive radio vehicular ad-hoc networks
下载PDF
A reliable and high throughput hybrid routing protocol for vehicular ad-hoc network 被引量:1
7
作者 郭庆 杨明川 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期87-92,共6页
Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Establis... Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Established routes frequently become stale, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper we propose a novel hybrid routing protocol, which is the combined between of the table-driven routing and on-demand routing in VANET. It makes fast convergence in routing process, minimal drop links, making more reliable links, and adaptive with changing of VANET topology. With neighbor table is updated instantaneously, and using strong neighbor for routing process makes route discovery process start whenever it received requirement, and through using route mechanism appropriately it reduces significantly route overhead at each node. The simulation results illustrate the outstanding properties of our proposed routing protocol. 展开更多
关键词 vehicular ad-hoc network Routing protocol HYBRID table-driven routing protocol on-demand routing orotocol
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
8
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
A Review on the Recent Trends of Image Steganography for VANET Applications
9
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(vanet) transportation system
下载PDF
Vehicle Positioning Method Based on RFID in Vehicular Ad-Hoc Networks
10
作者 于德新 郑坤 张伟 《Journal of Donghua University(English Edition)》 EI CAS 2015年第5期800-806,共7页
With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accurac... With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs. 展开更多
关键词 vehicular ad-hoc network(vanet) radio frequency identification(RFID) vehicle positioning fuzzy technology
下载PDF
Effective Life and Area Based Data Storing and Deployment in Vehicular Ad-Hoc Networks
11
作者 Hirokazu Miura Hideki Tode Hirokazu Taki 《Communications and Network》 2015年第3期146-157,共12页
In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehic... In vehicular ad-hoc networks (VANETs), store-carry-forward approach may be used for data sharing, where moving vehicles carry and exchange data when they go by each other. In this approach, storage resource in a vehicle is generally limited. Therefore, attributes of data that have to be stored in vehicles are an important factor in order to efficiently distribute desired data. In VANETs, there are different types of data which depend on the time and location. Such kind of data cannot be deployed adequately to the requesting vehicles only by popularity-based rule. In this paper, we propose a data distribution method that takes into account the effective life and area in addition to popularity of data. Our extensive simulation results demonstrate drastic improvements on acquisition performance of the time and area specific data. 展开更多
关键词 vehicular ad-hoc networks (vanets) POPULARITY EFFECTIVE LIFE EFFECTIVE Area Data DEPLOYMENT
下载PDF
Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
12
作者 Arif Sari Onder Onursal Murat Akkaya 《International Journal of Communications, Network and System Sciences》 2015年第13期552-566,共15页
There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network ... There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network (VANET) due to the increase in vehicular traffic/congestions around us. Vehicular communication is very important as technology has evolved. The research of VANET and development of proposed systems and implementation would increase safety among road users and improve the comfort for the corresponding passengers, drivers and also other road users, and a great improvement in the traffic efficiency would be achieved. This research paper investigates the current and existing security issues associated with the VANET and exposes any slack amongst them in order to lighten possible problem domains in this field. 展开更多
关键词 vehicular Ad HOC network (vanet) MANET Vehicle-to-Vehicle (V2V) COMMUNICATION Vehicle-to-Infrastructure (V2I) COMMUNICATION
下载PDF
An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
13
作者 Tao Xu Cheng Xu Zisang Xu 《China Communications》 SCIE CSCD 2021年第12期315-331,共17页
As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicl... As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicles need to be authen-ticated before accessing the network.Most existing authentication protocols in VANET adopt the Trusted Authority(TA)with centralized structure which is re-sponsible for the authentication tasks of all vehicles.However,the large-scale network consume a lot of computing resources,which leads to unacceptable de-lay in message transmission in VANET.For reducing the computational cost of TA,an efficient three-factor privacy-preserving authentication and key agreement protocol was proposed in our paper.Different from before,the RoadSide Unit(RSU)no longer acts as an intermediate node but is responsible for assisting user authentication,which lead to the computational cost of TA is very low.Through formal and informal analysis,our protocol demonstrates excellent security.Com-pared with previous studies,our work emerges advan-tages and superiorities in the following aspects:com-putational cost,communication cost,security proper-ties and functions,message loss ratio,and message de-lay.These data and evidence indicate that our protocol is an ideal choice for large-scale VANET. 展开更多
关键词 AUTHENTICATION vehicular ad-hoc network SECURITY three-factor
下载PDF
Quantitative and qualitative correlation analysis of optimal route discovery for vehicular ad-hoc networks
14
作者 MUKUND B.Wagh GOMATHI N. 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第7期1732-1745,共14页
Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments ... Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments have been performed in the region of VANET improvement. A familiar challenge that occurs is obtaining various constrained quality of service (QoS) metrics. For resolving this issue, this study obtains a cost design for the vehicle routing issue by focusing on the QoS metrics such as collision, travel cost, awareness, and congestion. The awareness of QoS is fuzzified into a price design that comprises the entire cost of routing. As the genetic algorithm (GA) endures from the most significant challenges such as complexity, unassisted issues in mutation, detecting slow convergence, global maxima, multifaceted features under genetic coding, and better fitting, the currently established lion algorithm (LA) is employed. The computation is analyzed by deploying three well-known studies such as cost analysis, convergence analysis, and complexity investigations. A numerical analysis with quantitative outcome has also been studied based on the obtained correlation analysis among various cost functions. It is found that LA performs better than GA with a reduction in complexity and routing cost. 展开更多
关键词 vehicular ad-hoc network lion algorithm fuzzy quality of service ROUTING
下载PDF
Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks
15
作者 M.Almutiq L.Sellami B.Alaya 《Computers, Materials & Continua》 SCIE EI 2022年第8期3493-3510,共18页
Nowadays,video streaming applications are becoming one of the tendencies driving vehicular network users.In this work,considering the unpredictable vehicle density,the unexpected acceleration or deceleration of the di... Nowadays,video streaming applications are becoming one of the tendencies driving vehicular network users.In this work,considering the unpredictable vehicle density,the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load,and the limited radio range of the employed communication scheme,we introduce the“Dynamic Vehicular Clustering”(DVC)algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks(VANET).The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls,inspired by the different features and the performance of the Long Term Evolution(LTE)-Advanced network.Vehicles are clustered together to form dynamically ad-hoc sub-networks included in the vehicular network.The goal of our clustering algorithm is to take into account several characteristics,such as the vehicle’s position and acceleration to reduce latency and packet loss.Therefore,each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.Based on the exceptional features of the LTE-Advanced network(small cells and wireless backhauls)the DVC algorithm is a promising scheme for video streaming services over VANET systems.Experiments were carried out with a virtual topology of the VANET network created with four clusters to implement the DVC algorithm.The results were compared with other algorithms such as Virtual Trust-ability Data transmission(VTD),Named Data Networking(NDN),and Socially Aware Security Message Forwarding(SASMF).Our algorithm can effectively improve the transmission rate of data packets at the expense of a slight increase in end-to-end delay and control overhead. 展开更多
关键词 5G VIDEO-ON-DEMAND vehicular ad-hoc network MOBILITY vehicular traffic load small cell wireless backhaul LTE-ADVANCED LATENCY packet loss
下载PDF
Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
16
作者 Pino Caballero-Gil Francisco Martín-Fernández Cándido Caballero-Gil 《Journal of Computer and Communications》 2014年第9期14-21,共8页
This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless au... This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless authentication, membership revocation is not a trivial problem. Thus, in order to improve the performance of revocation in such networks, the use of a dynamic authenticated data structure based on perfect k-ary hash trees combined with a duplex version of the new standard SHA-3 is here presented. Efficient algorithms in the used revocation trees allow reaching a refresh rate of at most simple updates per inserted node. Consequently, the proposal is especially useful for situations with frequent revocations, which are foreseeable when vehicular ad- hoc networks are widely deployed. 展开更多
关键词 K-Ary TREE IDENTITY-BASED Cryptography REVOCATION Hash Function vehicular ad-hoc network
下载PDF
VANET随机部署环境下基于改进型共享最近邻密度峰聚类的快速分簇算法
17
作者 陈靖宇 徐志林 《计算机测量与控制》 2023年第9期174-182,共9页
针对车辆高速移动场景下,网络拓扑变化过大导致网络分簇结果不稳定的问题,提出一种基于改进型共享最近邻密度峰聚类的快速成簇算法SNNCA(shared nearest neighbor clustering algorithm);通过综合考虑节点的链路生存周期和移动相似性,... 针对车辆高速移动场景下,网络拓扑变化过大导致网络分簇结果不稳定的问题,提出一种基于改进型共享最近邻密度峰聚类的快速成簇算法SNNCA(shared nearest neighbor clustering algorithm);通过综合考虑节点的链路生存周期和移动相似性,提出一种全新的节点连接稳定程度评估指标,并将该评估指标应用于节点共享最近邻的计算过程,以组织网络节点为划分合理的多跳簇结构;为适应网络环境的动态变化,提出一种簇维护策略,其中每个层级的簇成员承担着维护下一层级簇成员的任务,该策略能够对簇成员进行批量分离或合并,从而实现了算法的分布式快速收敛;根据随机部署场景中进行的仿真实验结果显示,相比其他较新算法,SNNCA算法降低了74%的簇数量,并且簇成员的平均存活时间增加了近1倍,表现出更好的网络稳定性和健壮性。 展开更多
关键词 车载自组织网络 快速分簇算法 共享最近邻 密度峰聚类 随机部署场景 多跳簇结构
下载PDF
A Novel Routing Algorithm for Vehicular Sensor Networks 被引量:1
18
作者 Mohammad Jalil Piran Garimella Rama Murthy 《Wireless Sensor Network》 2010年第12期919-923,共5页
Recent advances in wireless communications are diffusing into many new applications. The tiny sensor node, which consists of sensing, data processing and communicating components, led to the idea of sensor networks. A... Recent advances in wireless communications are diffusing into many new applications. The tiny sensor node, which consists of sensing, data processing and communicating components, led to the idea of sensor networks. A sensor network composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it. The applications envisioned for sensor networks vary from monitoring inhospitable habitats and disaster areas to operating indoors for intrusion detection and equipment monitoring. In most cases the network designer would have little control over the exact deployment of the network. Nowadays Vehicular Networks are drawing lots of attention due to the wide variety of applications that they can provide. These applications include traffic monitoring, positioning, security etc. A lot of research work is being conducted to define the standard for vehicular communication. These include frequency allocation, standards for physical and link layers, routing algorithms, security issues and new applications. In this paper we discuss the disadvantages of the traffic monitoring by traditional methods and by using GPS equipped sensors. Then we propose a new routing protocol for a fixed topology containing both stationary and mobile nodes. We also try to optimize the energy of the sensor nodes. We simulate our routing algorithm in MATLAB and evaluate it for different possible cases. 展开更多
关键词 Wireless SENSOR networkS vehicular SENSOR networkS vanetS Routing Global POSITIONING System (GPS) network LIFETIME
下载PDF
Real traffic-data based evaluation of vehicular traffic environment and state- of-the-art with future issues in location-centric data dissemination for VANETs 被引量:1
19
作者 Abdul Hafidz Abdul Hanan Mohd. Yazid Idris +2 位作者 Omprakash Kaiwartya Mukesh Prasad Rajiv Ratn Shah 《Digital Communications and Networks》 SCIE 2017年第3期195-210,共16页
Extensive investigation has been performed in location-centric or geocast routing protocols for reliable and efficient dissemination of information in Vehicular Adhoc Networks (VANETs). Various location-centric rout... Extensive investigation has been performed in location-centric or geocast routing protocols for reliable and efficient dissemination of information in Vehicular Adhoc Networks (VANETs). Various location-centric routing protocols have been suggested in literature for road safety ITS applications considering urban and highway traffic environment. This paper characterizes vehicular environments based on real traffic data and investigates the evolution of location-centric data dissemination. The current study is carded out with three main objectives: (i) to analyze the impact of dynamic traffic environment on the design of data dissemination techniques, (ii) to characterize location-centric data dissemination in terms of functional and qualitative behavior of protocols, properties, and strengths and weaknesses, and (iii) to find some future research directions in information dissemination based on location. Vehicular traffic environments have been classified into three categories based on physical characteristics such as speed, inter-vehicular distance, neighborhood stability, traffic volume, etc. Real traffic data is considered to analyze on-road traffic environments based on the measurement of physical parameters and weather conditions. Design issues are identified in incorporating physical parameters and weather conditions into data dissemination. Functional and qualitative characteristics of location-centric techniques are explored considering urban and highway environments. Comparative analysis of location-centric techniques is carded out for both urban and highway environments individually based on some unique and common characteristics of the environments. Finally, some future research directions are identified in the area based on the detailed investigation of traffic environments and location-centric data dissemination techniques. 展开更多
关键词 location-centric data dissemination Geocast routing vehicular ad hoc networks Analysis of real traffic data vanets survey Evolution of geocast routing
下载PDF
基于区块链的VANET无证书聚合签名方案
20
作者 崔贵焕 柳毅 《计算机技术与发展》 2023年第10期66-72,127,共8页
车载自组网(VANET)中频繁的通信和海量数据交互更易泄露车辆身份、位置、行驶路线等信息,交互验证的过程中证书开销会越来越大而且更容易遭受恶意攻击。为了解决以上问题,提出了基于区块链的VANET无证书聚合签名方案,消除证书开销,使用... 车载自组网(VANET)中频繁的通信和海量数据交互更易泄露车辆身份、位置、行驶路线等信息,交互验证的过程中证书开销会越来越大而且更容易遭受恶意攻击。为了解决以上问题,提出了基于区块链的VANET无证书聚合签名方案,消除证书开销,使用假名保护用户身份隐私。使用椭圆曲线加密算法实现无证书聚合签名,结合区块链的分布式存储实现信息共享、道路信息透明以及对恶意参与者的追踪。搭建以太坊私有链进行仿真,利用智能合约实现访问控制和交易,实验结果表明,在实现强匿名性、不可链接性、消息完整性、不可否认、可追踪、防篡改的安全性能的同时,通信开销相比同类方案中使用双线性配对方法降低了至少85.8%。 展开更多
关键词 车载自组网 区块链 无证书聚合签名 隐私保护 智能合约
下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部