Iovcom: Reliable comprehensive communication system for internet of vehicles
T Limbasiya, D Das - IEEE Transactions on Dependable and …, 2019 - ieeexplore.ieee.org
IEEE Transactions on Dependable and Secure Computing, 2019•ieeexplore.ieee.org
By 2020, around 25 billion “things” will be connected to the Internet for a better society using
different technological systems. Vehicle users have better experience by collaborating the
Internet of Things (IoT) and vehicular ad-hoc network (VANET) architectures, and this
emerging field is called the Internet of vehicles (IoV). Therefore, the IoV architecture will play
an important role in the industry, research organization, and academics for various public
and commercial applications. However, the IoV structure should ensure secure and efficient …
different technological systems. Vehicle users have better experience by collaborating the
Internet of Things (IoT) and vehicular ad-hoc network (VANET) architectures, and this
emerging field is called the Internet of vehicles (IoV). Therefore, the IoV architecture will play
an important role in the industry, research organization, and academics for various public
and commercial applications. However, the IoV structure should ensure secure and efficient …
By 2020, around 25 billion “things” will be connected to the Internet for a better society using different technological systems. Vehicle users have better experience by collaborating the Internet of Things (IoT) and vehicular ad-hoc network (VANET) architectures, and this emerging field is called the Internet of vehicles (IoV). Therefore, the IoV architecture will play an important role in the industry, research organization, and academics for various public and commercial applications. However, the IoV structure should ensure secure and efficient performance for vehicular communications, else an attacker may interfere in the system. In this article, we propose protected comprehensive data dissemination protocols (say IoVCom) based on one-way hash function and elliptic curve cryptography (ECC) for the IoV structure. Next, we analyze security strengths of the IoVCom against various security attacks and discuss performance results in terms of communication overhead, computation time, storage cost, and energy consumption.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果