The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Safety applications in vehicular networks involve real-time information included in periodical exchanged messages, called beacons. Denial of Service (DoS) attacks, especially jamming, may have high impact on these basic safety messages mainly because of the adequate condition of the attack at the lower layers. Due to the important role of these safety messages, securing beacons against jamming attacks...
In this work, an advanced vehicle monitoring and tracking system is proposed and designed for the purpose of monitoring the vehicles which are moving from one place to the other in order to provide safety and security. The proposed method puts together superior exercise of contemporary technology by means of Embedded C programming language and the unit developed via LPC2148 and its sophisticated features...
Cloud computing is gaining more and more popularity due to the wide use of the Internet. It can now be integrated into vehicle applications to enhance mobility, preventing accidents, improve safety, and improve driving comfort. In this paper, we propose a secure architecture of inter-vehicle communication which is obtained from a cloud services, including architecture level, communication level and...
The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different...
Modern vehicles are running complex and safety critical applications distributed over several Electronic Control Units (ECUs). Some ECUs are equipped with communication interfaces providing access to other devices, networks or remote services. Since the number of attack vectors is increasing, an early investigation of the impact of attacks becomes steadily more important. This paper gives an example...
Nowadays accidents and vehicle theft cases of two-wheelers are increasing at an alarming rate. In present systems, the speed is monitored by using cameras, speed governors etc. These systems have geographical, visibility and applicability restrictions. These systems can't be used completely for two-wheeler because it will affect the stability of the vehicle and cause accidents. Here we are proposing...
For information dissemination in highly dynamic vehicular networks, two technological approaches can be considered: Cellular communication standards are continually evolving to incorporate the requirements of vehicular applications. An alternative is ad-hoc communication which is restricted to direct, short range communication between vehicles/road-side units. Currently, no single technology can fulfill...
The off-shore industry requires periodic monitoring of underwater infrastructure for preventive maintenance and security reasons. The tasks in hostile environments can be achieved automatically through autonomous robots like UUV, AUV and ASV. When the robot controllers are based on prespecified conditions they could not function properly in these hostile changing environments. It is beneficial to...
Nowadays most of the public and commercial transportation organizations are using the vehicle tracking system to track the vehicles in real time. But, in many organizations like cab service providing companies, public vehicles and school busses do not have the security system. The purpose of this project is to provide the effective vehicle tracking, real time online monitoring, dedicated remote server...
Interconnected vehicles are a growing commodity providing remote access to onboard systems for monitoring and controlling the state of the vehicle. Such features are built to facilitate and strengthen the owner's knowledge about its car but at the same time they impact its safety and security. Vehicles are not ready to be fully connected as various attacks are currently possible against their control...
An ad hoc network is a suburbanized types of wireless network. The ad hoc which means “for this purpose” formed network instantly when nodes are connected in network for communication. Ad hoc network is a temporary network built for specific purpose. It does not require any pre-established infrastructure. The dynamic nature of ad hoc networks makes them more utilisable. On the other hand, selfish...
Car parking has become a serious problem of everyday occurrence for educational institutions with the decreasing parking supply, increasing enrollments and high percentage of vehicle ownership, in result causing congestion, time and money wastage. This problem is getting worse and more frustrating in Jazan University due to the fact that majority of students, faculty and staff members own cars and...
Most modern metropolitan cities have suffered from increasing traffic accidents and jams. Vehicular ad hoc network (VANET), consisting of information collecting, processing and transmitting units embedded in vehicles assisted by roadside infrastructures, has been proposed as one the most promising solution to problems introduced by the increasing number of vehicles in modern cities. To achieve the...
Data routing has gained great intention since the appearance of Vehicular Networks (VANETs). However, in the presence of attackers, reliable and trustworthy operations in such networks become impossible without securing routing protocols. In this paper, we target to study and design a secure routing protocol S-GyTAR for vehicular environments. Several kinds of routing techniques are proposed in the...
The state-of-the-art improvements in cellular communication and ubiquitous availability of internet have led to significant breakthroughs in intelligent transportation systems where connectivity, autonomous driving and infotainment play a pivotal role in the enhanced driving experience. The Vehicle ad hoc Networks (VANET) have emerged as a distinguished branch of wireless communication pertaining...
Congestion control is an important research issue to ensure safe and reliable vehicle to vehicle communication by using the limited resource available in vehicular ad hoc network. It supports the communication of safe and unsafe messages among vehicles. The present work controls channel congestion dynamically by reducing the rate of transmission of messages among vehicles. The transmission rate of...
Radio Frequency Identification (RFID) is a kind of the automatic identification technology which identifies an object by radio frequency mode for non-contact bidirectional data communication. It has been applied in many industries such as supply chain management, retail management, logistics management, security supervising, traffic supervising, and so on. This paper firstly introduces the principle...
In 2011, the UK Office for Security and Counter Terrorism (OSCT) CBRNe Unit, at HM Governments Home Office, tasked specialists from the Atomic Weapons Establishment (AWE) to provide assurance to the Olympic Delivery Authority (ODA). This assurance was to provide access to a unique knowledge base into the design, concept of operations and monitoring of the radiation screening capability to be deployed...
This paper investigates the critical privacy implications of short-time certificates to vehicular ad hoc networks (VANETs). A short-time certificate-based privacy protection scheme, STCP2, is proposed to address such privacy implications. STCP2 features a progressive roadside unit (RSU) deployment algorithm to optimize RSU deployment with cost and application constraints, while providing a minimal...
Mobile devices such as smartphones have gained more and more attention from security researchers and malware authors, the latter frequently attacking those platforms and stealing personal information. Vehicle on-board networks, in particular infotainment systems, are increasingly connected with such mobile devices and the internet and will soon make it possible to load and install third party applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.