International Journal of Vehicle Information and Communication Systems最新文献

筛选
英文 中文
Collaboration of UAV and HetNet for better QoS: a comparative study 无人机与HetNet协同提高服务质量的比较研究
International Journal of Vehicle Information and Communication Systems Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10031861
Akshita Gupta, Shriya Sundhan, S. Gupta, S. Alsamhi, M. Rashid
{"title":"Collaboration of UAV and HetNet for better QoS: a comparative study","authors":"Akshita Gupta, Shriya Sundhan, S. Gupta, S. Alsamhi, M. Rashid","doi":"10.1504/ijvics.2020.10031861","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031861","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Impact of wormhole attack on AODV routing protocol in vehicular ad-hoc network over real map with detection and prevention approach 基于实景地图的车载自组网AODV路由协议的虫洞攻击及其检测与预防方法
International Journal of Vehicle Information and Communication Systems Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10031863
Shahjahan Ali, P. Nand, S. Tiwari
{"title":"Impact of wormhole attack on AODV routing protocol in vehicular ad-hoc network over real map with detection and prevention approach","authors":"Shahjahan Ali, P. Nand, S. Tiwari","doi":"10.1504/ijvics.2020.10031863","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031863","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent traffic light design and control in smart cities: a survey on techniques and methodologies 智慧城市中智能交通灯的设计与控制:技术与方法综述
International Journal of Vehicle Information and Communication Systems Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10033552
Aditi Agrawal, Rajeev Paulus
{"title":"Intelligent traffic light design and control in smart cities: a survey on techniques and methodologies","authors":"Aditi Agrawal, Rajeev Paulus","doi":"10.1504/ijvics.2020.10033552","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033552","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Range frequency based distance computation technique for positioning in VANET 基于距离频率的VANET定位距离计算技术
International Journal of Vehicle Information and Communication Systems Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10033540
P. Shakeel, S. Baskar
{"title":"Range frequency based distance computation technique for positioning in VANET","authors":"P. Shakeel, S. Baskar","doi":"10.1504/ijvics.2020.10033540","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033540","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of electric vehicle converter configurations, control methods and charging techniques 概述电动汽车转换器的配置,控制方法和充电技术
International Journal of Vehicle Information and Communication Systems Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10033551
P. Manimekalai, V. Indragandhi, V. Subramaniyaswamy, Logesh Ravi, V. Vijayakumar
{"title":"An overview of electric vehicle converter configurations, control methods and charging techniques","authors":"P. Manimekalai, V. Indragandhi, V. Subramaniyaswamy, Logesh Ravi, V. Vijayakumar","doi":"10.1504/ijvics.2020.10033551","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10033551","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A scheduling heuristic in mobile distributed real-time database systems 移动分布式实时数据库系统中的调度启发式算法
International Journal of Vehicle Information and Communication Systems Pub Date : 2020-01-01 DOI: 10.1504/ijvics.2020.10031859
P. Singh
{"title":"A scheduling heuristic in mobile distributed real-time database systems","authors":"P. Singh","doi":"10.1504/ijvics.2020.10031859","DOIUrl":"https://doi.org/10.1504/ijvics.2020.10031859","url":null,"abstract":"","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66683421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable white list management technique for warned nodes in MANET MANET中告警节点的可靠白名单管理技术
International Journal of Vehicle Information and Communication Systems Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025630
E. Jayanthi, M. Hussain
{"title":"Reliable white list management technique for warned nodes in MANET","authors":"E. Jayanthi, M. Hussain","doi":"10.1504/ijvics.2019.10025630","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025630","url":null,"abstract":"Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving nodes. In the previous papers the nodes are inserted in black list and white list based on voting and non-voting based mechanism. The nodes in the white list are deprived of accusing the malicious nodes in the network. To enhance reliability, we remove the warned nodes from the white list and make them eligible to accuse other nodes using threshold value calculated by a certificate authority and trust-based mechanism. Increased number of normal nodes in the network has been achieved with whitelist management technique using network simulator-2.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42748859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cluster-based secured data transmission protocol for efficient data gathering in WSN 一种用于WSN中高效数据采集的基于集群的安全数据传输协议
International Journal of Vehicle Information and Communication Systems Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025632
P. Sharmila, A. Priyadharson
{"title":"A cluster-based secured data transmission protocol for efficient data gathering in WSN","authors":"P. Sharmila, A. Priyadharson","doi":"10.1504/ijvics.2019.10025632","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025632","url":null,"abstract":"Nowadays, Wireless Sensor Networks (WSNs) are widely used in all surveillance and domestic applications. Secure data gathering is a major concern in WSN in the presence of intruders. In existing works, secured data transmission was achieved through symmetric or asymmetric cryptographic schemes. However, it has high overhead and less confidentiality. In the proposed research, Cluster-based Secured Data Transmission Protocol (CSDTP) is developed to provide efficient data gathering. This protocol contains three modules. In the first module, cluster-based secure routing is implemented by route request, route reply and route assign phase. In the second module, data transmission is initiated. High packet delivery is achieved during this module. In the third module, secure data gathering is implemented using symmetric key encryption and decryption algorithm. The results of the simulation show that the CSDTP provides high data gathering ratio, more packet delivery ratio, less end to end delay, high packet integrity ratio and less overhead than existing schemes.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43349462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity verification-based cryptography for detecting intrusion in wireless sensor networks 基于身份验证的无线传感器网络入侵检测密码学
International Journal of Vehicle Information and Communication Systems Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025635
D. Rajan, E. R. Naganathan
{"title":"Identity verification-based cryptography for detecting intrusion in wireless sensor networks","authors":"D. Rajan, E. R. Naganathan","doi":"10.1504/ijvics.2019.10025635","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025635","url":null,"abstract":"Identity Verification Based Cryptosystem (IDVBC) mechanism is implemented here for providing a novel and secure data transmission among nodes. Here, token-based node identity verification along with certificates and data encoding mechanism is carried out to reduce the complexity in wireless networks. By applying local identity verification scheme, the communication overheads get reduced and hence the certificate management process is simplified. Each sensor owns a local private key and should get matched with the public key generated by the base station. Encoding process uses hash signature schemes for enhancing the security measures in the network. Source node sends the encrypted or encoded data with the generated local private key and labelled token ID. Once the token ID verification is done and the key matches with the global private key generated by the BS, the decrypted or decoded data is received by the receiver. The proposed IDVBC scheme has the ability to detect malicious activity of the node, to provide high-level security and able to tolerate several security attacks. Proposed scheme is improved with 39% efficiency better than the conventional method in terms of secured data transmission.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42508361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective utilisation of cloud data centre and allocating user demands to virtual machines using LMRO algorithm 有效利用云数据中心,并使用LMRO算法将用户需求分配给虚拟机
International Journal of Vehicle Information and Communication Systems Pub Date : 2019-12-02 DOI: 10.1504/ijvics.2019.10025631
D. Banu, S. Aranganathan
{"title":"Effective utilisation of cloud data centre and allocating user demands to virtual machines using LMRO algorithm","authors":"D. Banu, S. Aranganathan","doi":"10.1504/ijvics.2019.10025631","DOIUrl":"https://doi.org/10.1504/ijvics.2019.10025631","url":null,"abstract":"Cloud computing is a recent trend for modifying the computing technique strongly. The cloud storage assets will be recurrently accessed. The method works based on a black box method that has difficulty to correlate acquired data for internal resource management techniques. The simulation is not permitted to conduct comparative analysis due to huge amount of features required. The Load Maintenance and Resource Optimisation (LMRO) algorithm proposes utilisation of cloud data centres and allocates user demands to Virtual Machines (VMs). The load balancer keeps track of cloudlets processed by every virtual machine and tries to balance the active load. The method has a main data centre controller and load balancers to collect and analyse the information. Based on experimental evaluation, proposed LMRO techniques reduces 0.065 seconds Task Request Time (TRT), 0.20 seconds Data centre Processing Time (DPT), 0.0125 $ Virtual Machine Cost (VMC) and improves 19.25% Throughput (TRP) as compared to the conventional techniques.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47929400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信