Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this work, an advanced vehicle monitoring and tracking system is proposed and designed for the purpose of monitoring the vehicles which are moving from one place to the other in order to provide safety and security. The proposed method puts together superior exercise of contemporary technology by means of Embedded C programming language and the unit developed via LPC2148 and its sophisticated features...
Sexual harassment at workplace has been a criticalchallenge for women, especially in the service sector due to oddworking hours. Companies and Government on their part havetaken up measures to protect women employees but theproblem seems persistent. To address this, we have designed aregulatory solution based on operant conditioning. Operantconditioning argues that people's behaviors are primarilycontrolled...
DATEX II has been developed to provide a standardized way of communication and exchange of traffic information and it plays an important role for implementing integrated Intelligent Transportation Systems (ITS) in Europe. This standard is suggested for providing information services for safe and secure truck parking places which is considered one of the priority in the ITS Action Plan. The novelty...
The number of on-road vehicles has increased by almost 140% over the past decade, thereby increasing pollution levels, congestion and fuel consumption. To contain such a situation, Vehicular Ad-Hoc Network (VANET) technology is almost on the verge of large scale practical deployment. Hence, the aim is to provide a system to control the above using VANET and to provide an infrastructure to reduce the...
Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative solution for it is less costly in terms of computation delay and mobility adaptation, compared to the cryptography-based solutions. However, the existing solutions assume that in general the attackers have always a dishonest behavior that persists...
In recent years, vehicular networks have been drawing special attention because of its significant potential role in future smart city regarding traffic efficiency improvement and road safety. Safety's crucial status in vehicular networks is determined by its direct impact on people's lives. Several security services based on cryptography, PKI and pseudonymous have been standardized in the past few...
Security mechanisms recommended by VANET standardization bodies are not sufficient to stop authorized vehicles from sending bogus or fake messages that in the worst cases could put people's life at risk. There are efforts in evaluating the behaviour of the vehicles in VANETs, based on reputation mechanisms. However, the most of them compromise the privacy, the messages are linkable and no anonymous...
In the near future, beacon dissemination base stations will be deployed in shopping mall, supermarkets, stadiums, museums, and theatres to send advertisements offering services and products to the customers with mobile devices. Today, an example of this concept of business model is the Apple's iBeacon. Borrowing this concept from mobile computing, we envision a new opportunity for business modeling...
The goal of the work in this paper is to use occupancy grid in integrating safety distances with the planning strategy for autonomous vehicle navigation. The challenge is to avoid static and dynamic obstacles at high speed with respect to some specific road rules while following a global reference trajectory. Our local trajectory planning algorithm is based on the method of clothoid tentacles. It...
Cloud computing is gaining more and more popularity due to the wide use of the Internet. It can now be integrated into vehicle applications to enhance mobility, preventing accidents, improve safety, and improve driving comfort. In this paper, we propose a secure architecture of inter-vehicle communication which is obtained from a cloud services, including architecture level, communication level and...
Vehicular ad-hoc networks (VANETs) have gained a lot of attention from both academic and industry due to its immense potential in revolutionizing the vehicular communication industry. VANETs facilitate vehicles to share safety and non-safety information through messages. Safety information includes road accidents, natural hazards, road blocks etc. Non-safety information includes tolling information,...
In large-scale vehicular ad hoc networks, in order to speed up the anonymous message authentication and realize scalability, the forwarding node combined signatures and with the help of the Road Side Units (RSU) for quick authentication and dissemination method still some key questions: when the vehicle sends a message to RSU authentication and dissemination, the forwarding nodes using combined signature...
Software-defined vehicular cloud (SDVC) is a novel proposal to form a cloud consisting of vehicles and to share their underutilized resource and carry out collaborative jobs. Since the research on SDVC is in its initial stage, security and privacy issues are still challenging. In this paper, we propose a security mechanism for SDVC to satisfy fundamental security requirements including authentication,...
In this paper, a new cooperative control aiming at reducing the time delay is proposed in an isolated intersection without the traffic light. First of all, the control center receives the time range of arriving at the intersection from the vehicle by the communication of vehicle-to-infrastructure. Then a passing sequence is optimized by the Genetic Algorithm based on this range and sent to each vehicle...
Vehicular Cloud Computing (VCC) is the latest technology in intelligent transport system. Vehicular cloud (VC) facilitates the customers to share underutilized resources by renting it to other users over the Internet. It aims to improve travelling beyond the boundaries of traditional transport systems. VCC has many advanced applications which will help society with minimum cost of investment and less...
The vulnerability of military installations and critical infrastructure sites from underwater threats is now well accepted and, in order to combat these security weaknesses, there has been growing interest in — and adoption of — sonar technology. Greater availability of Autonomous/Unmanned Underwater Vehicles (A/UUVs) to both adversary nations and terrorists/saboteurs is also a cause of increasing...
The Smart cities are a relevant topic nowadays. It attracts most researchers and governmental authorities, due to the vision to adopt technology information and communication in this context, to facilitate access to urban services. Security stills a permanent challenge that affects most smart cities applications. Vehicular Ad Hoc Networks (VANets) is one of those applications, classified in the smart...
Future vehicles will be wirelessly connected to nearby vehicles, to the road infrastructure and to the Internet in order to enable new comfort features, safety functions and a number of new vehicle-specific services. The latter will include a fast, secure, and reliable way to remotely diagnose and reconfigure a vehicle as well as to install new software on the electronic control units integrated in...
Traffic congestions cause not only the time- consuming and frustrating experiences to drivers, but also other critical problems, such as fuel waste, air pollution and accidents. Real-time traffic information exchange can avoid vehicles being congested on roads. However, when the drivers are acquiring the traffic information, their privacy is inevitable to be disclosed. To preserve the driver's privacy,...
With expectation of widespread adoption of Connected Vehicles Technology (CVT), security within the vehicular networks has come under scrutiny. Owing to the nature of CVT applications, security flaws can result not only in loss of data or network function but also in fatal accidents. Security mechanisms that can account for privacy, authentication, integrity, and non-repudiation while having an acceptable...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.