Ali, 2018 - Google Patents
GVANET project: an efficient deployment of a self‐powered, reliable and secured VANET infrastructureAli, 2018
View PDF- Document ID
- 8254214092950133761
- Author
- Ali Q
- Publication year
- Publication venue
- IET Wireless Sensor Systems
External Links
Snippet
The aim of this study is to describe the authors' efforts to accomplish the green vehicular ad hoc network (GVANET) project. The goal is to realise the concept of a self 'renewably'powered communication infrastructure appropriate for intelligent transportation …
- 238000004891 communication 0 abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhatia et al. | Software defined vehicular networks: A comprehensive review | |
| Aliyu et al. | Cloud computing in VANETs: architecture, taxonomy, and challenges | |
| Yu et al. | A survey on the edge computing for the Internet of Things | |
| Saied et al. | Trust management system design for the Internet of Things: A context-aware and multi-service approach | |
| Ali | GVANET project: an efficient deployment of a self‐powered, reliable and secured VANET infrastructure | |
| Abduvaliyev et al. | On the vital areas of intrusion detection systems in wireless sensor networks | |
| Sharma et al. | A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions | |
| Khan et al. | Routing protocols & unmanned aerial vehicles autonomous localization in flying networks | |
| Bhardwaj et al. | SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks | |
| Memon et al. | Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology | |
| Sharma et al. | Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes | |
| Balouchzahi et al. | Optimal road side units placement model based on binary integer programming for efficient traffic information advertisement and discovery in vehicular environment | |
| Ali | Securing solar energy‐harvesting road‐side unit using an embedded cooperative‐hybrid intrusion detection system | |
| Almuzaini et al. | Optimization of the operational state's routing for mobile wireless sensor networks | |
| Sangwan et al. | A classification of misbehavior detection schemes for VANETs: a survey | |
| Kandhoul et al. | T_CAFE: a trust based security approach for opportunistic IoT | |
| Kerrache et al. | RITA: RIsk‐aware Trust‐based Architecture for collaborative multi‐hop vehicular communications | |
| Satyanarayana et al. | A new algorithm for detection of nodes failures and enhancement of network coverage and energy usage in wireless sensor networks | |
| Vamsi et al. | Trust and location-aware routing protocol for wireless sensor networks | |
| Lahane et al. | Secured cross‐layer cross‐domain routing in dense wireless sensor network: A new hybrid based clustering approach | |
| Gong | An application of meta‐heuristic and nature‐inspired algorithms for designing reliable networks based on the Internet of things: A systematic literature review | |
| Wu et al. | A dynamic trust model exploiting the time slice in WSNs | |
| Boualouache et al. | Federated learning-based inter-slice attack detection for 5G-V2X sliced networks | |
| Safa et al. | An opportunistic resource management model to overcome resource‐constraint in the Internet of Things | |
| Shanmugapriya et al. | Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of Things |