Akshita Gupta, Shriya Sundhan, S. Gupta, S. Alsamhi, M. Rashid
{"title":"Collaboration of UAV and HetNet for better QoS: a comparative study","authors":"Akshita Gupta, Shriya Sundhan, S. Gupta, S. Alsamhi, M. Rashid","doi":"10.1504/ijvics.2020.10031861","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031861","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of wormhole attack on AODV routing protocol in vehicular ad-hoc network over real map with detection and prevention approach","authors":"Shahjahan Ali, P. Nand, S. Tiwari","doi":"10.1504/ijvics.2020.10031863","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031863","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent traffic light design and control in smart cities: a survey on techniques and methodologies","authors":"Aditi Agrawal, Rajeev Paulus","doi":"10.1504/ijvics.2020.10033552","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033552","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Range frequency based distance computation technique for positioning in VANET","authors":"P. Shakeel, S. Baskar","doi":"10.1504/ijvics.2020.10033540","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033540","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Manimekalai, V. Indragandhi, V. Subramaniyaswamy, Logesh Ravi, V. Vijayakumar
{"title":"An overview of electric vehicle converter configurations, control methods and charging techniques","authors":"P. Manimekalai, V. Indragandhi, V. Subramaniyaswamy, Logesh Ravi, V. Vijayakumar","doi":"10.1504/ijvics.2020.10033551","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033551","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scheduling heuristic in mobile distributed real-time database systems","authors":"P. Singh","doi":"10.1504/ijvics.2020.10031859","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031859","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable white list management technique for warned nodes in MANET","authors":"E. Jayanthi, M. Hussain","doi":"10.1504/ijvics.2019.10025630","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025630","url":null,"abstract":"Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving nodes. In the previous papers the nodes are inserted in black list and white list based on voting and non-voting based mechanism. The nodes in the white list are deprived of accusing the malicious nodes in the network. To enhance reliability, we remove the warned nodes from the white list and make them eligible to accuse other nodes using threshold value calculated by a certificate authority and trust-based mechanism. Increased number of normal nodes in the network has been achieved with whitelist management technique using network simulator-2.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42748859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cluster-based secured data transmission protocol for efficient data gathering in WSN","authors":"P. Sharmila, A. Priyadharson","doi":"10.1504/ijvics.2019.10025632","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025632","url":null,"abstract":"Nowadays, Wireless Sensor Networks (WSNs) are widely used in all surveillance and domestic applications. Secure data gathering is a major concern in WSN in the presence of intruders. In existing works, secured data transmission was achieved through symmetric or asymmetric cryptographic schemes. However, it has high overhead and less confidentiality. In the proposed research, Cluster-based Secured Data Transmission Protocol (CSDTP) is developed to provide efficient data gathering. This protocol contains three modules. In the first module, cluster-based secure routing is implemented by route request, route reply and route assign phase. In the second module, data transmission is initiated. High packet delivery is achieved during this module. In the third module, secure data gathering is implemented using symmetric key encryption and decryption algorithm. The results of the simulation show that the CSDTP provides high data gathering ratio, more packet delivery ratio, less end to end delay, high packet integrity ratio and less overhead than existing schemes.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43349462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity verification-based cryptography for detecting intrusion in wireless sensor networks","authors":"D. Rajan, E. R. Naganathan","doi":"10.1504/ijvics.2019.10025635","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025635","url":null,"abstract":"Identity Verification Based Cryptosystem (IDVBC) mechanism is implemented here for providing a novel and secure data transmission among nodes. Here, token-based node identity verification along with certificates and data encoding mechanism is carried out to reduce the complexity in wireless networks. By applying local identity verification scheme, the communication overheads get reduced and hence the certificate management process is simplified. Each sensor owns a local private key and should get matched with the public key generated by the base station. Encoding process uses hash signature schemes for enhancing the security measures in the network. Source node sends the encrypted or encoded data with the generated local private key and labelled token ID. Once the token ID verification is done and the key matches with the global private key generated by the BS, the decrypted or decoded data is received by the receiver. The proposed IDVBC scheme has the ability to detect malicious activity of the node, to provide high-level security and able to tolerate several security attacks. Proposed scheme is improved with 39% efficiency better than the conventional method in terms of secured data transmission.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42508361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective utilisation of cloud data centre and allocating user demands to virtual machines using LMRO algorithm","authors":"D. Banu, S. Aranganathan","doi":"10.1504/ijvics.2019.10025631","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025631","url":null,"abstract":"Cloud computing is a recent trend for modifying the computing technique strongly. The cloud storage assets will be recurrently accessed. The method works based on a black box method that has difficulty to correlate acquired data for internal resource management techniques. The simulation is not permitted to conduct comparative analysis due to huge amount of features required. The Load Maintenance and Resource Optimisation (LMRO) algorithm proposes utilisation of cloud data centres and allocates user demands to Virtual Machines (VMs). The load balancer keeps track of cloudlets processed by every virtual machine and tries to balance the active load. The method has a main data centre controller and load balancers to collect and analyse the information. Based on experimental evaluation, proposed LMRO techniques reduces 0.065 seconds Task Request Time (TRT), 0.20 seconds Data centre Processing Time (DPT), 0.0125 $ Virtual Machine Cost (VMC) and improves 19.25% Throughput (TRP) as compared to the conventional techniques.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47929400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}