با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
LAMD: Location-based Alert Message Dissemination scheme for emerging infrastructure-based vehicular networks
LAMD: طرح انتشار پیام هشدار مبتنی بر مکان برای شبکههای خودرویی مبتنی بر زیرساخت در حال ظهور-2022 Requiring low dissemination delays and thorough vehicles coverage in the vicinity of an
emergency event, Vehicular Ad-hoc NETworks (VANETs) were considered as the most adapted
communication network to support alert messages dissemination. With the advent of Cooperative ITS services, emerging vehicular networks are expected to increasingly rely on Vehicle
to Infrastructure (V2I) communication links, which are expected to be nominally available,
with some transient and time-limited connectivity losses. The presence of V2I links paves
the way to centralized network control, which can leverage vehicle-related and contextual
information provided by the cloud to make more informed decisions. This paper proposes an
effective alert message dissemination procedure called LAMD (Location-based Alert Messages
Dissemination) for emerging vehicular networks that combines V2I broadcasts with selected V2V
(Vehicle to Vehicle) rebroadcasts. The originality of our scheme lies in the selection process of
V2V rebroadcasts, which is based on vehicles’ location regarding predefined rebroadcast points
selected by a centralized controller. This leads to very limited collisions, low delivery delays,
and high information coverage with insignificant signaling and network overhead compared to
legacy VANET based dissemination techniques.
keywords: ارتباطات وسایل نقلیه | انتشار پیام هشدار | برنامه های امن | Vehicular communications | Alert message dissemination | Safety applications | SDN |
مقاله انگلیسی |
2 |
CREASE: Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy in VANETs
CREASE: طرح احراز هویت مبتنی بر نام مستعار بدون گواهی و استفاده مجدد برای فعال کردن امنیت و حریم خصوصی در VANET-2022 Due to the customers’ growing interest in using various intelligent and connected devices, we
are surrounded by the Internet of Things (IoT). It is estimated that the number of IoT devices
will exceed 60 billion by 2025. One of the primary reasons for such rapid growth is the Internet
of Vehicles (IoV). Internet of Vehicles (IoV) has evolved into an emerging concept in intelligent
transportation systems (ITS) that integrates VANETs and the IoT to enhance their capabilities.
With the emergence of IoV and the interest shown by customers, Vehicular Ad hoc NETworks
(VANETs) are likely to be widely deployed in the near future. However, for this to happen, wide
participation of vehicle owners in VANET is needed. The primary concerns of vehicle owners
to participate in VANET are privacy and security. In this paper, we present a Certificateless and
REused-pseudonym based Authentication Scheme for Enabling security and privacy (CREASE) in
VANETs. One of the ways to preserve the privacy of vehicles/drivers is to allow vehicles/drivers
to use pseudo identities (pseudonyms) instead of their real identities (such as VIN number or
driving license number) in all communications. The pseudonym used by a vehicle needs to
be changed frequently to prevent the vehicle from being tracked. Our scheme uses Merkle
Hash Tree and Modified Merkle Patricia Trie to efficiently store and manage the pseudonyms
assigned to a vehicle. This enables a vehicle to pick and use a random pseudonym from a
given set of pseudonyms assigned to it as well as change its pseudonym frequently and securely
to ensure privacy. Unlike many of the existing schemes, our scheme does not use certificates
and certificate revocation lists for authentication. Moreover, it allows vehicles to get a set of
pseudonyms only once from the trusted authority. We present a formal proof of correctness of
our scheme and also compare our scheme with some of the other contemporary schemes to
show the effectiveness of our scheme.
Keywords: VANETs | Intelligent transportation systems | Authentication | Security | Privacy-preserving authentication |
مقاله انگلیسی |
3 |
انتشار پیامهای امنیتی به خودروها و بررسی با استفاده از چک کردن مدل در VANETs
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 21 بررسی مدلی یکی از تکنیکهای تایید رسمی است که به طور گسترده برای تایید و اصلاح خطاهای طراحی پروتکلهای ارتباطی استفاده میشود . بررسی مدل از الگوریتمها برای تایید درستی سیستم استفاده میکند . این مقاله یک توصیف کامل از روششناسی تایید پروتکلهای ارتباطی vanet با استفاده از جستجوگر مدل SPIN ارائه میکند . اکثر پروتکلهای ارتباطی vanet از واحدهای طرف جاده برای انتقال اطلاعات مربوط به ایمنی / ترافیک مربوط به وسایل نقلیه دور استفاده میکنند . این سیستم پیشنهادی یک سیستم تایید برای بررسی خطاهای طراحی و طراحی پروتکلهای ارتباطی vanet با استفاده از کنترلکننده مدل ارائه میکند . در نهایت , نتایج شبیهسازی و تایید ارائه میشوند .
. واژهای کاربردی: پروتکل ارتباطی | واحدهای طرف جاده | تایید رسمی | کنترلکننده مدل SPIN | اطلاعات ایمن |
مقاله ترجمه شده |
4 |
به سوی تقسیم بندی شبکه 5G برای شبکه های ادهاک خودرویی: یک رویکرد انتها به انتها
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 16 شبکه های 5G نه تنها از افزایش نرخ داده ها پشتیبانی می کنند، بکه همچنین می بایست زیرساخت مشترکی را فراهم کنند که براساس آن سرویس های جدید همراه با نیازمندی های بسیار متفاوت کیفیت سرویس (QoS) شبکه با تاخیر کمتر ارائه شود. به طور دقیق تر، کاربردهای شبکه های خودرویی چند منظوره (VANET) که اساساً گرایش آن ها به مسائل ایمنی و سرگرمی است (مانند پخش ویدیویی و مرورگر وب) در حال افزایش است. بیشتر این کاربردها دارای محدودیت های جدی از نظر تاخیر در حد چند میلی ثانیه هستند و نیاز به اطمینان پذیری بالایی دارند. پلتفورم نسل پنجم برای بررسی چنین نیازهایی نیازمند ایجاد شبکه های مجازی برنامه پذیر و راهکارهای مختلف ترافیکی همانند تقسیم بندی (برش) شبکه است. به این منظور در این مقاله یک مکانیزم تقسیم بندی پویا و برنامه پذیر انتها به انتها در شبکه LTE مبتنی بر M-CORD پیشنهاد می دهیم. یکی از ویژگی های کلیدی M-CORD که مکانیزم پیشنهاد تقسیم بندی شبکه از آن استفاده می کند، EPC مجازی است که سفارشی سازی و اصلاح را امکان پذیر می سازد. M-CORD کارکرد ضروری را برای برنامه ریزی تعاریف تقسیم بندی فراهم می کند که در آن مکانیزم پیشنهادی به طور کامل از رویکرد تعریف شده نرم افزاری خود پیروی می کند. علاوه بر این، ما نشان می دهیم که چگونه دستگاه ها انتهایی قرار گرفته در بخش های مختلف براساس QoS های متفاوت براساس نوع کاربر انتهایی تخصیص داده می شوند. این نتایج نشان می دهند که مکانیزم پیشنهادی تقسیم بندی شبکه بخش های مناسب را انتخاب می کند و منابع را به کاربران براساس نیازها و نوع سرویس آن ها اختصاص می دهد.
کلمات کلیدی: تقسیم بندی شبکه | نسل پنجم (5G) | M-CORD | LTE | NSSF | VANET |
مقاله ترجمه شده |
5 |
روش ردیابی خودرو بهبود یافته برای IEEE 802:11p
سال انتشار: 2019 - تعداد صفحات فایل pdf انگلیسی: 5 - تعداد صفحات فایل doc فارسی: 10 توسعه روش های موقعیت یابی با قابلیت تحرک- بالا با استفاده از استاندارد IEEE 802.11p در شبکه های ادهاک وسایل نقلیه (VANETs) به دلیل نقاط ضعف در ناحیه های GNSS-dark مانند جنگل ها، تونل و غیره، و اشتباهات ناشی از GNSS-dark در نتایج ، ضروری است. برآورد زمان دقیق رسیدن(TOA) مبتنی بر مدل مسافت یابی ، به عنوان یکی از چالش های سیستم پیشگیری از برخورد اتومبیل ها، توجه زیادی را به خود جلب است. در این مقاله، روش پیشنهادی TOA یا روش تخمین مسافت با راهنمای کوتاه IEEE 802.11p پیشنهاد شد تا اثربخشی اندازه گیری های وسایل نقلیه چندکاره و نسبت نویز سیگنال کم (SNR) را کاهش دهد. ابتدا، TOA با استفاده از همبستگی خودکار و همبستگی-متقاطع برآورد شد. سپس، رویکرد sum برای یافتن مبدا دقیق زمان ارائه شد. نتایج شبیه سازی در کانال اتحادیه بین المللی مخابرات خودرو (ITUA) و کانال نویز گاوسی سفید افزایشی (AWGN)، برتری الگوریتم پیشنهادی را در شرایط SNR کم و محیط چندکاره ثابت می کند.
کليدواژه: برآورد TOA | IEEE 802.11p | VANETS | دامنه | همبستگی خودکار | همبستگی- متقابل |
مقاله ترجمه شده |
6 |
An Efficient Identity-Based Signature Scheme without Bilinear Pairing for Vehicle-To-Vehicle Communication in VANETs
یک طرح امضایی مبتنی بر هویت کارآمد و بدون جفت دو طرفه برای ارتباط وسیله نقلیه به وسیله نقلیه در VANET-2019 Vehicles exchange traffic-related messages with neighboring vehicles to aid passengers
and provide efficient traffic management. This is done via wireless communication
channels in Vehicular Ad Hoc Networks (VANETs). Security and
privacy issues are a major concern in VANETs. A typical attack consists of a
malicious third party modifying and retransmitting intercepted messages. Current
state of the art solutions enable a verifier to authenticate the source of
received messages as well as to check their integrity before accepting them.
However, these solutions do not adequately address the efficiency with which
multiple messages are verified in VANETs deployed in high traffic density areas.
Due to this, the computational load on a verifier is increased. In this paper, an
efficient Identity-Based Signature with Conditional Privacy-Preserving Authentication
(IBS-CPPA) scheme based on the Elliptic Curve Cryptography (ECC)
and general one-way hash functions for V2V communication is proposed. This
scheme supports the batch signature verification method, which enables each
vehicle to authenticate a large number of messages at the same time. We provide
a security proof of the proposed IBS-CPPA scheme in the random oracle
model. The performance evaluation indicates that our scheme is more efficient
in terms of computational cost with respect to similar schemes. Keywords: Privacy-preservation | Identity-based cryptography | Bilinear pairing | Computational cost |
مقاله انگلیسی |
7 |
A survey on internet of vehicles: Applications, security issues & solutions
بررسی اینترنت وسایل نقلیه: برنامه ها ، مسائل امنیتی و راه حل ها-2019 Internet of Vehicles (IoV) is an emerging concept in intelligent transportation systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet of Things (IoT). IoV has dominated the transportation systems due to numerous special traits like dynamic topological structures, huge network scale, reliable internet connection, compatibility with personal devices and high processing capability, etc. In this review, an in-depth survey of IoV is carried out by discussing the applications of IoV in different areas, as well as the comparative study of IoV and VANETs, is being done. Intelligent transportation system involves a huge amount of dynamic real-time critical data so its security is a major concern. Different security aspects of IoV are studied in this review which includes security requirements, security challenges, and security attacks. After this, existing security solutions of all attacks are elaborated and discussion section is provided to highlight the drawbacks of security solutions deployed for each attack as well as it emphasizes on the attacks for which no security solutions are available. Based on the extensive study conducted on this, it has been found that existing security solutions use conventional cryptographic techniques that affect the performance of the delay sensitive network i.e. IoV and VANETs. So, a lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has also been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment. Keywords: Attacks | Applications | Cryptography | Internet of Vehicles (IoV) | Security | VANETs |
مقاله انگلیسی |
8 |
An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks
یک طرح امضایی جمع دارایی دارای قابلیت اطمینان بدون جفت شدن دوقطبی برای شبکه های ادهاک وسایل نقلیه-2019 Certificateless aggregate signature (CL-AS) is a digital signature technique used to achieve improved per- formance in resource-constrained environments like vehicular ad hoc networks (VANETs) by eliminating the certificate issue in the traditional public key cryptography (PKC), addressing the key escrow problem in identity-based PKC, and utilizing the efficiency benefits of aggregate signature. Recently, an efficient CL- AS scheme for VANETs was proposed which the authors claimed to be existentially secure against forgery attacks in the random oracle model. In this paper, the scheme was analyzed and found to be insecure under existing security model. Consequently, we propose a new efficient certificateless aggregate signa- ture scheme for VANETs applications based on elliptic curve cryptography. The proposed scheme does not only meet the privacy and security requirements for VANETs, but supports batch verification, auton- omy, and conditional privacy preservation. In addition, the proposed scheme is provably secure against existential forgery on adaptive chosen message attack in the random oracle model based on the hardness assumption of the elliptic curve discrete logarithm problem. Extensive efficiency analysis demonstrates that the performance of the proposed scheme exceeds those of the recent related schemes in terms of computation cost and communication overhead. Keywords: Certificateless aggregate signature | Vehicular ad hoc networks (VANETs) | Random oracle | Elliptic curve cryptography | Conditional privacy | Batch verification |
مقاله انگلیسی |
9 |
Prediction-based protocols for vehicular Ad Hoc Networks: Survey and taxonomy
پروتکل های مبتنی بر پش بینی برای شبکه های تک کاره وسیله ای: بررسی و طبقه بندی-2018 The high mobility of vehicles as a major characteristic of Vehicular Ad Hoc Networks (VANETs) affects vividly the dynamic nature of the networks and results in additional overhead in terms of extra messages and time delay. The future movements of the vehicles are usually predictable. The predictability of the vehicles future movements is a result of the traffic conditions, the urban layout, and the driving requirements to observe the traffic constrains. Hence, predicting these future movements could play a considerable role for both building reliable vehicular communication protocols and solving several issues of intelligent transportation systems. In the literature, numerous prediction-based protocols are presented for VANETs. Therefore, this paper follows the guidelines of systematic literature reviews to provide a premier and unbiased survey of the existing prediction-based protocols and develop novel taxonomies of those protocols based on their main prediction applications and objectives. A discussion on each category of both taxonomies is presented, with a focus on the requirements, constrains, and challenges. Moreover, usage analysis and performance comparisons are investigated in order to derive the suitability of each prediction objective to the various applications. Also, the relevant challenges and open research areas are identified to guide the potential new directions of prediction-based research in VANETs. Throughout this paper, information is provided to developers and researchers to grasp the major contributions and challenges of the predictive protocols in order to pave the way for enhancing their reliability and robustness in VANETs.
keywords: Prediction Applications| Prediction Objectives| Prediction Techniques| Research| VANETs |
مقاله انگلیسی |
10 |
IoV distributed architecture for real-time traffic data analytics
معماری توزیع شده IoV را برای تحلیل داده های ترافیک در زمان واقعی-2018 In this paper, we present necessary premises for the deployment of the Internet of Vehicles (IoV) integrating Big Data analytics
of road network traffic measurements of the city of Mohammedia, Morocco. Thus, we introduce an architecture based on three
main layers such as IoV, Fog Computing and Cloud Computing Layer. We specifically put more focus on Fog Computing layer
in which we develop a framework for a real-time collecting and processing events generated by intelligent vehicles as well as
visualizing traffic state on each road section. Furthermore, we consider deployment and test of the proposed framework using
events retrieved from a Vanets-type micro simulation. Finally, we present and discuss the first obtained results as well as the
advantages and limitations of the proposed architecture.
Keywords: IoV, Big Data analytics, Fog computing, Real-time data analytics, Traffic control |
مقاله انگلیسی |