Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    Security and Privacy in 5G Internet of Vehicles (IoV) Environment

    Benjamin Kwapong Osibo1, Chengbo Zhang1, Changsen Xia1, Guanzhe Zhao2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.3, No.2, pp. 77-86, 2021, DOI:10.32604/jiot.2021.017943 - 15 July 2021

    Abstract Modern vehicles are equipped with sensors, communication, and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety. The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality. However, the demanding specifications such as high data rate, low latency, and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges. In the 5G IoV environment, various technologies and models are deployed, making the environment open More >

  • Open Access

    ARTICLE

    Container Application Migration Algorithm in Internet of Vehicles

    Xiaoliang Lin1,*, Junxiao Shi1, Yanbo Wang1, Chenyang Liu1, Bin Lu1, Siwen Xu2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 915-926, 2021, DOI:10.32604/iasc.2021.018513 - 01 July 2021

    Abstract Internet of Vehicles (IoV) is a popular application scenario that combines edge computing and the Internet of Things. Among them, service migration caused by IoV application mobility is a research hotspot in this field. This paper studies the migration strategy of container applications based on edge computing in the IoV business scenario. In order to solve the difficulty in selecting the target server of the application to be migrated in the crossroads scenario, this paper converts the migration decision to the shortest path problem based on dynamic programming, and obtains the best migration choice at More >

  • Open Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620 - 06 May 2021

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a… More >

  • Open Access

    ARTICLE

    Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles

    Mohana Priya Pitchai1, Manikandan Ramachandran1,*, Fadi Al-Turjman2, Leonardo Mostarda3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3947-3966, 2021, DOI:10.32604/cmc.2021.015568 - 06 May 2021

    Abstract The Internet of Things plays a predominant role in automating all real-time applications. One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules. As vehicles are connected to the internet through wireless communication technologies, the Internet of Vehicles network infrastructure is susceptible to flooding attacks. Reconfiguring the network infrastructure is difficult as network customization is not possible. As Software Defined Network provide a flexible programming environment for network customization, detecting flooding attacks on the Internet of Vehicles is integrated on top of it. The basic methodology used is… More >

  • Open Access

    ARTICLE

    Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme

    Geetanjali Rathee1, Razi Iqbal2,*, Adel Khelifi3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2755-2769, 2021, DOI:10.32604/cmc.2021.017000 - 13 April 2021

    Abstract Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention. Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges. Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues. Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data. Due to the lack of existing transportation integration schemes, IoV has not been… More >

  • Open Access

    ARTICLE

    Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

    Juan Guo1, Yanzhu Liu2,*, Shan Li3, Zhi Li4, Sonia Kherbachi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2145-2157, 2021, DOI:10.32604/cmc.2021.016411 - 13 April 2021

    Abstract With the rapid development of mobile communication technology, the application of internet of vehicles (IoV) services, such as for information services, driving safety, and traffic efficiency, is growing constantly. For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing, encryption and decision-making can be completed at the local end, thus providing real-time and highly reliable communication capability. The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication… More >

  • Open Access

    ARTICLE

    A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

    Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3349-3361, 2021, DOI:10.32604/cmc.2021.012454 - 01 March 2021

    Abstract The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme,… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264 - 23 July 2020

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to More >

  • Open Access

    ARTICLE

    Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles

    Pengshou Xie1, Guoqiang Ma1, *, Tao Feng1, Yan Yan1, 2, Xueming Han1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1127-1137, 2020, DOI:10.32604/cmc.2020.09695 - 10 June 2020

    Abstract Undoubtedly, uncooperative or malicious nodes threaten the safety of Internet of Vehicles (IoV) by destroying routing or data. To this end, some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication, data, energy, etc., to detect and evaluate vehicle nodes. However, it is difficult to effectively assess the trust level of a vehicle node only by message forwarding, data consistency, and energy sufficiency. In order to resolve these problems, a novel mechanism and a new trust calculating model is proposed in this… More >

  • Open Access

    ARTICLE

    Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model

    Wenxi Han1, 2, Mingzhi Cheng3, *, Min Lei1, 2, Hanwen Xu2, Yu Yang1, 2, Lei Qian4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1025-1038, 2020, DOI:10.32604/cmc.2020.09815 - 10 June 2020

    Abstract In recent years, with the continuous advancement of the intelligent process of the Internet of Vehicles (IoV), the problem of privacy leakage in IoV has become increasingly prominent. The research on the privacy protection of the IoV has become the focus of the society. This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms, proposes a privacy protection system structure based on untrusted data collection server, and designs a vehicle location acquisition algorithm based on a local differential privacy and game model. The algorithm first meshes the road… More >

Displaying 41-50 on page 5 of 51. Per Page