با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks
یک طرح جامع تغییر نام مستعار برای بهبود حریم خصوصی مکان در شبکه های وسایل نقلیه-2022 In an Intelligent Transportation System (ITS), many applications, such as collision avoidance
and lane change warning, require real-time information from vehicles on the road. This typically
includes detailed status information such as location, speed, heading and a vehicle identifier,
which can be used to infer precise movement patterns leading to long-term driver profiling
and vehicle tracking. The use of pseudonyms, instead of actual vehicle IDs, allows vehicles
to protect their privacy while sharing relevant information. A pseudonym changing scheme
(PCS) determines when and how a vehicle should change its pseudonyms to maintain an
appropriate privacy level. In this paper, we propose a new comprehensive PCS that utilizes
vehicle context and current traffic patterns to leverage the optimum situation for changing
pseudonyms. Simulation results indicate that the proposed PCS outperforms existing approaches
both in terms of user-centric and adversary-centric performance metrics.
Keywords: Location privacy | Pseudonym changing scheme | VANET | V2V communication | Context-aware |
مقاله انگلیسی |
2 |
VANet security challenges and solutions: A survey
چالش ها و راه حل های امنیتی VANet: یک نظرسنجی-2017 Article history:Received 16 September 2016Received in revised form 28 November 2016 Accepted 20 January 2017Available online 27 January 2017Keywords:VANETSecurity challenges Attacks classification V2V communication Security solutionsVANET is an emergent technology with promising future as well as great challenges especially in its security. In this paper, we focus on VANET security frameworks presented in three parts. The first presents an extensive overview of VANET security characteristics and challenges as well as requirements. These requirements should be taken into consideration to enable the implementation of secure VANET infrastructure with efficient communication between parties. We give the details of the recent security architectures and the well-known security standards protocols. The second focuses on a novel classification of the different attacks known in the VANET literature and their related solutions. The third is a comparison between some of these solutions based on well-known security criteria in VANET. Then we draw attention to different open issues and technical challenges related to VANET security, which can help researchers for future use. 2017 Elsevier Inc. All rights reserved. Keywords:VANET | Security challenges | Attacks classification | V2V communication | Security solutions |
مقاله انگلیسی |
3 |
Analytical model for information flow propagation wave under an information relay control strategy in a congested vehicle-to-vehicle communication environment
مدل تحلیلی برای موج انتشار جریان اطلاعات تحت استراتژی کنترل رله اطلاعات در یک محیط ارتباطی بین خودرو و وسایل نقلیه-2017 Vehicular traffic congestion in a vehicle-to-vehicle (V2V) communication environment can lead to congestion effects for
information flow propagation. Such congestion effects can impact whether a specific information packet of interest can reach a
desired location, and if so, in a timely manner to influence the traffic system performance. Motivated by the usefulness and
timeliness of information propagation, this paper aims to characterize the information flow propagation wave (IFPW) for an
information packet in a congested V2V communication environment under an information relay control strategy. This strategy
seeks to exclude information that is dated in the communication buffer under a first-in, first-out queue discipline, from being
relayed if the information flow regime is congested. It trades off the need to enable the dissemination of every information packet
as far as possible, against the congestion effects that accrue because of the presence of multiple information packets. A
macroscopic two-layer model is proposed to characterize the IFPW. The upper layer is formulated as integro-differential
equations to characterize the information dissemination in space and time under this control strategy. The lower layer adopts the
Lighthill-Whitham-Richards model to capture the traffic flow dynamics. Based on the upper layer model, a necessary condition is
derived which quantifies the expected time length that needs to be reserved for broadcasting the information packet of interest so
as to ensure the formation of an IFPW under a given density of V2V-equipped vehicles. When the necessary condition is satisfied
under homogeneous conditions, it is shown that the information packet can be propagated at an asymptotic speed whose value
can be derived analytically. Besides, under the proposed control strategy, only a proportion of vehicles (labeled asymptotic
density of informed vehicles) can receive the specific information packet, which can be estimated by solving a nonlinear
equation. The asymptotic IFPW speed, the asymptotic density of informed vehicles, and the necessary condition for the IFPW,
help in evaluating the timeliness of information propagation and the influence of traffic dynamics on information propagation. In
addition, the proposed model can be used to numerically estimate the IFPW speed for heterogeneous conditions, which can aid
in the design of traffic management strategies built upon the timely propagation of information through V2V communication.
Keywords: V2V communication | information flow propagation wave | information relay control strategy | epidemic model |
مقاله انگلیسی |