[go: up one dir, main page]

Ali, 2018 - Google Patents

GVANET project: an efficient deployment of a self‐powered, reliable and secured VANET infrastructure

Ali, 2018

View PDF @Full View
Document ID
8254214092950133761
Author
Ali Q
Publication year
Publication venue
IET Wireless Sensor Systems

External Links

Snippet

The aim of this study is to describe the authors' efforts to accomplish the green vehicular ad hoc network (GVANET) project. The goal is to realise the concept of a self 'renewably'powered communication infrastructure appropriate for intelligent transportation …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Bhatia et al. Software defined vehicular networks: A comprehensive review
Aliyu et al. Cloud computing in VANETs: architecture, taxonomy, and challenges
Yu et al. A survey on the edge computing for the Internet of Things
Saied et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach
Ali GVANET project: an efficient deployment of a self‐powered, reliable and secured VANET infrastructure
Abduvaliyev et al. On the vital areas of intrusion detection systems in wireless sensor networks
Sharma et al. A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions
Khan et al. Routing protocols & unmanned aerial vehicles autonomous localization in flying networks
Bhardwaj et al. SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks
Memon et al. Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology
Sharma et al. Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes
Balouchzahi et al. Optimal road side units placement model based on binary integer programming for efficient traffic information advertisement and discovery in vehicular environment
Ali Securing solar energy‐harvesting road‐side unit using an embedded cooperative‐hybrid intrusion detection system
Almuzaini et al. Optimization of the operational state's routing for mobile wireless sensor networks
Sangwan et al. A classification of misbehavior detection schemes for VANETs: a survey
Kandhoul et al. T_CAFE: a trust based security approach for opportunistic IoT
Kerrache et al. RITA: RIsk‐aware Trust‐based Architecture for collaborative multi‐hop vehicular communications
Satyanarayana et al. A new algorithm for detection of nodes failures and enhancement of network coverage and energy usage in wireless sensor networks
Vamsi et al. Trust and location-aware routing protocol for wireless sensor networks
Lahane et al. Secured cross‐layer cross‐domain routing in dense wireless sensor network: A new hybrid based clustering approach
Gong An application of meta‐heuristic and nature‐inspired algorithms for designing reliable networks based on the Internet of things: A systematic literature review
Wu et al. A dynamic trust model exploiting the time slice in WSNs
Boualouache et al. Federated learning-based inter-slice attack detection for 5G-V2X sliced networks
Safa et al. An opportunistic resource management model to overcome resource‐constraint in the Internet of Things
Shanmugapriya et al. Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of Things