The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security mechanisms recommended by VANET standardization bodies are not sufficient to stop authorized vehicles from sending bogus or fake messages that in the worst cases could put people's life at risk. There are efforts in evaluating the behaviour of the vehicles in VANETs, based on reputation mechanisms. However, the most of them compromise the privacy, the messages are linkable and no anonymous...
The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different...
Security protocols built on strong cryptographic algorithms to defeat attempts of pattern analysis are popular nowadays, but these algorithms consume a lot of processor's efficiency. So, devices with limited processor capabilities need some modified protocols. Billions of such devices, known as ‘smart objects’ are used in IOT (Internet of things). IOT is an interconnection of a large number of smart...
Nowadays most of the public and commercial transportation organizations are using the vehicle tracking system to track the vehicles in real time. But, in many organizations like cab service providing companies, public vehicles and school busses do not have the security system. The purpose of this project is to provide the effective vehicle tracking, real time online monitoring, dedicated remote server...
Plug-in Electric Vehicles (PEVs) are expected to be widely utilized in the near future if issues related to the availability of charging infrastructure are resolved and if PEVs are efficiently integrated with the smart grid. The Vehicle-to-Grid (V2G) system is an emerging technology that enables the communication and control between PEVs and the smart grid. This promising concept is designed to provide...
The automotive industry is growing rapidly. Many innovations are being focused on the automotive industry and the connected vehicles concept is becoming more reality than ever. The vehicle is being connected to the cloud for more features and better control. A previous paper, “Firmware Over the Air for Automotive, FOTAMOTIVE” was published [1]. One of the main challenges for FOTAMOTIVE is the cost...
This research paper focuses on the sensitive issue of traffic jams on roads, which often lead to some problems like- missing of an important meeting or appointment, missing of scheduled trains, getting late for schools/college etc. or sometimes a conflict amongst people. However this paper tries to sort this problem by tracking the root cause of it i.e. “the movement of vehicles on roads” and hereby...
VANET is a wireless network that provides driving comfort and road safety. VANET cannot guarantee correct detection of dangerous road conditions, and communication between vehicles when the network is very high, which is dangerous to drive safely. We propose a new scenario using VANET for rescue purpose at time of emergency to overcome such dangerous accidents and communication problems in VANET,...
The diagnostic tester is presented here to read out the contents of external EEPROM of an EMS ECU. The tester and the EMS ECU are built with Unified Diagnostic Service (UDS) on Controller Area Network (CAN) as per ISO 14229-1 and ISO 15765-3. When the tester requests the UDS on CAN bus, the ECU invokes the respective routines. The micro-controller of ECU uses Serial Peripheral Interface (SPI) protocol...
The International Standards Organization (ISO) and the European Telecommunications Standards Institute (ETSI) have defined a common ITS reference communications stack which have paved the way to new research lines in vehicular networks. Currently, most of the efforts have focused on the definition and testing of ITS applications operating over Internet Protocol version 6 (IPv6) communication technologies...
Security is highly challenging in today's world. A country may face lot of problems due to security such as military applications, vehicle theft. Radio Frequency Identification (RFID) is the next technology to improve the security. RFID technology is applied in national defense, Medical, Human Identification, for tracking stable and moving objects. A small RFID Tag and the Reader have Contribute their...
The concept of Electric Vehicle as Power Energy Storage has gained much attention from the research community and market recently. The increasing capacity of the power storages in the electric vehicles (EV) motivates this concept and makes it more feasible. However, the privacy of the customers can be compromised by tracing the stations that an EV has been connected to during a period of the time...
This paper introduces a novel method for diagnosing embedded systems and updating embedded software installed on the electronics control units of vehicles through the Internet using client and server units. It also presents the communication protocols between the vehicle and the manufacturer for instant fault diagnosis and software update while ensuring security for both parties. AiroDiag ensures...
For vehicular networks, the security and privacy face two major challenges. One is the open wireless medium and the other is the high-speed mobility of the vehicles. For the open wireless medium, eavesdropping and man-in-the-middle attacks may exist in the communication path. This is called an unsafe routing path. Based on quantum nature, quantum channel supported unconditionally secure communication...
Services such as sending a pre-crash sensing warning and traffic condition warning are expected to be provided in car-to-car/infrastructure (C2X) communication systems. Maintaining message integrity is essential for these services because wrong messages may cause collision accidents and congestion. A message authentication code (MAC) generated by using a symmetric key is used to authenticate a message...
Security attributes of a Vehicular ad hoc network (VANET) include confidentiality, integrity, authentication, non-repudiation (liability), revocation and privacy. Privacy, having characteristics opposing to the rest of the attributes, makes design of a security architecture quite difficult. A commonly used solution is to have a large number of temporary certificates (i.e., pseudonyms) to achieve these...
Self-propelled patrolling vehicle can patrol periodically in the designed area as a surveillance robot to ensure the safety like men do. The proposed robot based on the self-propelled vehicle not only can save manpower but also ensure the operation of surveillance being well performed. Due to the limitation of manpower and the fixed camera positions, using surveillance is different from the traditional...
Electronic toll collection (ETC) with combined information and communication technology has become a major concern in the intelligent transportation systems. In this paper, an efficient design of ETC system is proposed, which incorporates automatic vehicle classification, identification, and violation enforcement. In the proposed design, to enhance the level of security in data communication, a two...
We address the problem of efficiently revoking certificates of malicious and compromised nodes in vehicular networks. As in previous work, our focus is making sure that vehicles receive the new list of revoked certificates (CRL) before they can be compromised. Unlike previous solutions, our work revolves around the idea of making use of existing capabilities offered by mobile network operators to...
In an overview paper called State of the Art: Embedding Security in Vehicles, Wolf et al. give a general state-of- the-art overview of IT security in vehicles and describe core security technologies and relevant security mechanisms. In this paper we show that a formal analysis of many of the related properties is possible. This indicates that many expected aspects in the design of vehicular security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.