The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intelligent Transportation System (ITS) provides various services for vehicular environments. Many of them require accuracy information about vehicle's position. However, the current positioning techniques may not satisfy the accuracy requirement, especially for safety applications. In this paper, we propose a Video-Assisted Inter-Vehicle Positioning (VIP) system. The system integrates processed image...
No matter on the point of view of energy consumption or the carbon dioxide emissions, transportation sector has a critical impact on the energy system and sustainable development. Many countries have proposed various strategies for the sustainable development in the transportation system. In general, there are three kinds of strategies for handling the problem of carbon reduction in the transportation...
Developments in intelligent transportation systems (ITS) have led to tremendous enhancements in the present transportation systems providing various applications, including public safety, electronic payment applications, traffic management, and entertainment content distribution. IEEE 802.11p and IEEE 1609-family standards are developed to provide vehicle-to-vehicle (V2V), vehicle-to-roadside (V2R),...
The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their...
The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. The operation of V2G networks is based on continuously monitoring the status of individual EVs as well as a designed incentive scheme to attract sufficient participating EVs. However, the close monitoring might raise privacy...
IEEE 802.11p/WAVE (Wireless Access in Vehicular Environments) is an emerging family of standards intended to support wireless access in Vehicular Ad Hoc Networks (VANETs). Broadcasting of data and control packets is expected to be crucial in this environment. Both safety-related and non-safety applications rely on broadcasting for the exchange of data or status and advertisement messages. Most of...
A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that both of them agree on the established session keys for use in subsequent communications. This paper proposes an efficient anonymous key agreement protocol based on chaotic maps. By utilizing a legitimate pseudonym mechanism,...
A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that both of them agree on the established session keys for use in subsequent communications. Recently, several key agreement protocols based on chaotic maps are proposed. These protocols require a verification table to verify...
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats. The threats could cause leakage of privacy and/or economic loss. Among network attacks, the DDoS (distributed denial-of-service) attack is one of the most frequent and serious. In a DDoS attack, an attacker first breaks...
Energy conservation is an important issue in wireless networks. We propose a method for estimating the least amount of energy needed for broadcasting a message to all nodes in the network. The method can work with any reasonable energy models. We prove that this least-energy problem is NP-complete by showing that the maximum-leaf spanning-tree problem is a special case of the least-energy problem.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.