دانلود و نمایش مقالات مرتبط با VANETs::صفحه 1
بلافاصله پس از پرداخت دانلود کنید
نتیجه جستجو - VANETs

تعداد مقالات یافته شده: 27
ردیف عنوان نوع
1 به سوی تقسیم بندی شبکه 5G برای شبکه های ادهاک خودرویی: یک رویکرد انتها به انتها
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 16
شبکه های 5G نه تنها از افزایش نرخ داده ها پشتیبانی می کنند، بکه همچنین می بایست زیرساخت مشترکی را فراهم کنند که براساس آن سرویس های جدید همراه با نیازمندی های بسیار متفاوت کیفیت سرویس (QoS) شبکه با تاخیر کمتر ارائه شود. به طور دقیق تر، کاربردهای شبکه های خودرویی چند منظوره (VANET) که اساساً گرایش آن ها به مسائل ایمنی و سرگرمی است (مانند پخش ویدیویی و مرورگر وب) در حال افزایش است. بیشتر این کاربردها دارای محدودیت های جدی از نظر تاخیر در حد چند میلی ثانیه هستند و نیاز به اطمینان پذیری بالایی دارند. پلتفورم نسل پنجم برای بررسی چنین نیازهایی نیازمند ایجاد شبکه های مجازی برنامه پذیر و راهکارهای مختلف ترافیکی همانند تقسیم بندی (برش) شبکه است. به این منظور در این مقاله یک مکانیزم تقسیم بندی پویا و برنامه پذیر انتها به انتها در شبکه LTE مبتنی بر M-CORD پیشنهاد می دهیم. یکی از ویژگی های کلیدی M-CORD که مکانیزم پیشنهاد تقسیم بندی شبکه از آن استفاده می کند، EPC مجازی است که سفارشی سازی و اصلاح را امکان پذیر می سازد. M-CORD کارکرد ضروری را برای برنامه ریزی تعاریف تقسیم بندی فراهم می کند که در آن مکانیزم پیشنهادی به طور کامل از رویکرد تعریف شده نرم افزاری خود پیروی می کند. علاوه بر این، ما نشان می دهیم که چگونه دستگاه ها انتهایی قرار گرفته در بخش های مختلف براساس QoS های متفاوت براساس نوع کاربر انتهایی تخصیص داده می شوند. این نتایج نشان می دهند که مکانیزم پیشنهادی تقسیم بندی شبکه بخش های مناسب را انتخاب می کند و منابع را به کاربران براساس نیازها و نوع سرویس آن ها اختصاص می دهد.
کلمات کلیدی: تقسیم بندی شبکه | نسل پنجم (5G) | M-CORD | LTE | NSSF | VANET
مقاله ترجمه شده
2 روش ردیابی خودرو بهبود یافته برای IEEE 802:11p
سال انتشار: 2019 - تعداد صفحات فایل pdf انگلیسی: 5 - تعداد صفحات فایل doc فارسی: 10
توسعه روش های موقعیت یابی با قابلیت تحرک- بالا با استفاده از استاندارد IEEE 802.11p در شبکه های ادهاک وسایل نقلیه (VANETs) به دلیل نقاط ضعف در ناحیه های GNSS-dark مانند جنگل ها، تونل و غیره، و اشتباهات ناشی از GNSS-dark در نتایج ، ضروری است. برآورد زمان دقیق رسیدن(TOA) مبتنی بر مدل مسافت یابی ، به عنوان یکی از چالش های سیستم پیشگیری از برخورد اتومبیل ها، توجه زیادی را به خود جلب است. در این مقاله، روش پیشنهادی TOA یا روش تخمین مسافت با راهنمای کوتاه IEEE 802.11p پیشنهاد شد تا اثربخشی اندازه گیری های وسایل نقلیه چندکاره و نسبت نویز سیگنال کم (SNR) را کاهش دهد. ابتدا، TOA با استفاده از همبستگی خودکار و همبستگی-متقاطع برآورد شد. سپس، رویکرد sum برای یافتن مبدا دقیق زمان ارائه شد. نتایج شبیه سازی در کانال اتحادیه بین المللی مخابرات خودرو (ITUA) و کانال نویز گاوسی سفید افزایشی (AWGN)، برتری الگوریتم پیشنهادی را در شرایط SNR کم و محیط چندکاره ثابت می کند.
کليدواژه: برآورد TOA | IEEE 802.11p | VANETS | دامنه | همبستگی خودکار | همبستگی- متقابل
مقاله ترجمه شده
3 An Efficient Identity-Based Signature Scheme without Bilinear Pairing for Vehicle-To-Vehicle Communication in VANETs
یک طرح امضایی مبتنی بر هویت کارآمد و بدون جفت دو طرفه برای ارتباط وسیله نقلیه به وسیله نقلیه در VANET-2019
Vehicles exchange traffic-related messages with neighboring vehicles to aid passengers and provide efficient traffic management. This is done via wireless communication channels in Vehicular Ad Hoc Networks (VANETs). Security and privacy issues are a major concern in VANETs. A typical attack consists of a malicious third party modifying and retransmitting intercepted messages. Current state of the art solutions enable a verifier to authenticate the source of received messages as well as to check their integrity before accepting them. However, these solutions do not adequately address the efficiency with which multiple messages are verified in VANETs deployed in high traffic density areas. Due to this, the computational load on a verifier is increased. In this paper, an efficient Identity-Based Signature with Conditional Privacy-Preserving Authentication (IBS-CPPA) scheme based on the Elliptic Curve Cryptography (ECC) and general one-way hash functions for V2V communication is proposed. This scheme supports the batch signature verification method, which enables each vehicle to authenticate a large number of messages at the same time. We provide a security proof of the proposed IBS-CPPA scheme in the random oracle model. The performance evaluation indicates that our scheme is more efficient in terms of computational cost with respect to similar schemes.
Keywords: Privacy-preservation | Identity-based cryptography | Bilinear pairing | Computational cost
مقاله انگلیسی
4 A survey on internet of vehicles: Applications, security issues & solutions
بررسی اینترنت وسایل نقلیه: برنامه ها ، مسائل امنیتی و راه حل ها-2019
Internet of Vehicles (IoV) is an emerging concept in intelligent transportation systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet of Things (IoT). IoV has dominated the transportation systems due to numerous special traits like dynamic topological structures, huge network scale, reliable internet connection, compatibility with personal devices and high processing capability, etc. In this review, an in-depth survey of IoV is carried out by discussing the applications of IoV in different areas, as well as the comparative study of IoV and VANETs, is being done. Intelligent transportation system involves a huge amount of dynamic real-time critical data so its security is a major concern. Different security aspects of IoV are studied in this review which includes security requirements, security challenges, and security attacks. After this, existing security solutions of all attacks are elaborated and discussion section is provided to highlight the drawbacks of security solutions deployed for each attack as well as it emphasizes on the attacks for which no security solutions are available. Based on the extensive study conducted on this, it has been found that existing security solutions use conventional cryptographic techniques that affect the performance of the delay sensitive network i.e. IoV and VANETs. So, a lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has also been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment.
Keywords: Attacks | Applications | Cryptography | Internet of Vehicles (IoV) | Security | VANETs
مقاله انگلیسی
5 An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks
یک طرح امضایی جمع دارایی دارای قابلیت اطمینان بدون جفت شدن دوقطبی برای شبکه های ادهاک وسایل نقلیه-2019
Certificateless aggregate signature (CL-AS) is a digital signature technique used to achieve improved per- formance in resource-constrained environments like vehicular ad hoc networks (VANETs) by eliminating the certificate issue in the traditional public key cryptography (PKC), addressing the key escrow problem in identity-based PKC, and utilizing the efficiency benefits of aggregate signature. Recently, an efficient CL- AS scheme for VANETs was proposed which the authors claimed to be existentially secure against forgery attacks in the random oracle model. In this paper, the scheme was analyzed and found to be insecure under existing security model. Consequently, we propose a new efficient certificateless aggregate signa- ture scheme for VANETs applications based on elliptic curve cryptography. The proposed scheme does not only meet the privacy and security requirements for VANETs, but supports batch verification, auton- omy, and conditional privacy preservation. In addition, the proposed scheme is provably secure against existential forgery on adaptive chosen message attack in the random oracle model based on the hardness assumption of the elliptic curve discrete logarithm problem. Extensive efficiency analysis demonstrates that the performance of the proposed scheme exceeds those of the recent related schemes in terms of computation cost and communication overhead.
Keywords: Certificateless aggregate signature | Vehicular ad hoc networks (VANETs) | Random oracle | Elliptic curve cryptography | Conditional privacy | Batch verification
مقاله انگلیسی
6 Prediction-based protocols for vehicular Ad Hoc Networks: Survey and taxonomy
پروتکل های مبتنی بر پش بینی برای شبکه های تک کاره وسیله ای: بررسی و طبقه بندی-2018
The high mobility of vehicles as a major characteristic of Vehicular Ad Hoc Networks (VANETs) affects vividly the dynamic nature of the networks and results in additional overhead in terms of extra messages and time delay. The future movements of the vehicles are usually predictable. The predictability of the vehicles future movements is a result of the traffic conditions, the urban layout, and the driving requirements to observe the traffic constrains. Hence, predicting these future movements could play a considerable role for both building reliable vehicular communication protocols and solving several issues of intelligent transportation systems. In the literature, numerous prediction-based protocols are presented for VANETs. Therefore, this paper follows the guidelines of systematic literature reviews to provide a premier and unbiased survey of the existing prediction-based protocols and develop novel taxonomies of those protocols based on their main prediction applications and objectives. A discussion on each category of both taxonomies is presented, with a focus on the requirements, constrains, and challenges. Moreover, usage analysis and performance comparisons are investigated in order to derive the suitability of each prediction objective to the various applications. Also, the relevant challenges and open research areas are identified to guide the potential new directions of prediction-based research in VANETs. Throughout this paper, information is provided to developers and researchers to grasp the major contributions and challenges of the predictive protocols in order to pave the way for enhancing their reliability and robustness in VANETs.
keywords: Prediction Applications| Prediction Objectives| Prediction Techniques| Research| VANETs
مقاله انگلیسی
7 IoV distributed architecture for real-time traffic data analytics
معماری توزیع شده IoV را برای تحلیل داده های ترافیک در زمان واقعی-2018
In this paper, we present necessary premises for the deployment of the Internet of Vehicles (IoV) integrating Big Data analytics of road network traffic measurements of the city of Mohammedia, Morocco. Thus, we introduce an architecture based on three main layers such as IoV, Fog Computing and Cloud Computing Layer. We specifically put more focus on Fog Computing layer in which we develop a framework for a real-time collecting and processing events generated by intelligent vehicles as well as visualizing traffic state on each road section. Furthermore, we consider deployment and test of the proposed framework using events retrieved from a Vanets-type micro simulation. Finally, we present and discuss the first obtained results as well as the advantages and limitations of the proposed architecture.
Keywords: IoV, Big Data analytics, Fog computing, Real-time data analytics, Traffic control
مقاله انگلیسی
8 Internet of Vehicles in Big Data Era
اینترنت وسایل نقلیه در عصر داده های بزرگ-2018
As the rapid development of automotive telematics, modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding environment. By significantly expanding the network scale and conducting both real-time and long-term information processing, the traditional Vehicular AdHoc Networks (VANETs) are evolving to the Internet of Vehicles (IoV), which promises efficient and intelligent prospect for the future transportation system. On the other hand, vehicles are not only consuming but also generating a huge amount and enormous types of data, which is referred to as Big Data. In this article, we first investigate the relationship between IoV and big data in vehicular environment, mainly on how IoV supports the transmission, storage, computing of the big data, and how IoV benefits from big data in terms of IoV characterization, performance evaluation and big data assisted communication protocol design. We then investigate the application of IoV big data in autonomous vehicles. Finally, the emerging issues of the big data enabled IoV are discussed.
Index Terms: Autonomous vehicles, big data, big data applications, data communication, IoV, vehicular networks
مقاله انگلیسی
9 A survey on authentication schemes in VANETs for secured communication
یک نظرسنجی در مورد طرح های تأیید هویت در VANET برای برقراری ارتباط امن-2017
Article history:Received 5 January 2016Received in revised form 5 January 2017 Accepted 23 February 2017Available online 2 March 2017Keywords:Vehicular Ad Hoc Networks (VANETs) Dedicated Short Range Communications (DSRC)Vehicle to Vehicle (V2V) Vehicle to Infrastructure (V2I) SecurityAuthenticationA vehicular Ad Hoc Network (VANET) is a class of mobile ad hoc network (MANET) which supports, vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. The significant features of VANET includes, self-organization, distributed networking, and highly dynamic topology. The VANET features and its applications to road safety have attracted a lot of interest in industry and academia more so into the research on improvement of transportation systems for saving millions of lives. The transmission of messages in open-access environment like VANET leads to the most critical and challenging security issues. Authentication, data confidentiality, data integrity, data availability, and non- repudiation are crucial components of security in VANET. This paper focuses on the authentication schemes in VANET as it plays a important role in secured communication. The authentication schemes are basically classified into three categories: cryptography techniques, digital signatures, and message verification techniques. The main objective of this paper is to provide a taxonomy of authentication schemes, and discuss their mechanisms, advantages, disadvantages, performance and scope of research. Furthermore, the paper concludes with presentation of open security issues in VANET authentication. 2017 Elsevier Inc. All rights reserved.
Keywords:VehicularAd Hoc Networks (VANETs) | Dedicated Short Range Communications (DSRC) | Vehicle to Vehicle (V2V) | Vehicle to Infrastructure (V2I) | Security | Authentication
مقاله انگلیسی
10 VANet security challenges and solutions: A survey
چالش ها و راه حل های امنیتی VANet: یک نظرسنجی-2017
Article history:Received 16 September 2016Received in revised form 28 November 2016 Accepted 20 January 2017Available online 27 January 2017Keywords:VANETSecurity challenges Attacks classification V2V communication Security solutionsVANET is an emergent technology with promising future as well as great challenges especially in its security. In this paper, we focus on VANET security frameworks presented in three parts. The first presents an extensive overview of VANET security characteristics and challenges as well as requirements. These requirements should be taken into consideration to enable the implementation of secure VANET infrastructure with efficient communication between parties. We give the details of the recent security architectures and the well-known security standards protocols. The second focuses on a novel classification of the different attacks known in the VANET literature and their related solutions. The third is a comparison between some of these solutions based on well-known security criteria in VANET. Then we draw attention to different open issues and technical challenges related to VANET security, which can help researchers for future use. 2017 Elsevier Inc. All rights reserved.
Keywords:VANET | Security challenges | Attacks classification | V2V communication | Security solutions
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi