2,899 research outputs found

    An algorithm for IoT based vehicle verification system using RFID

    Get PDF
    The verification of vehicle documents is an important role of transport department which is rising day by day due to the mass registration of the vehicles. An automated vehicle verification system can improve the efficiency of this process.  In this paper, we propose an IOT based vehicle verification system using RFID technology. As a result, the vehicle checking which is done now manually can be replaced by automation. There is a loss of a significant amount of time when the normal vehicle checking is done manually. The proposed system will make this process automated. The present verification process is using inductive loops that are placed in a roadbed for detecting vehicles as they pass through the loop of the magnetic field. Similarly, the sensing devices spread along the road can detect passing vehicles through the Bluetooth mechanism. The fixed audio detection devices that can be used to identify the type of vehicles on the road. Other measurements are fixed cameras installed in specific points of roads for categorising the vehicles. But all these mechanisms cannot verify the documents and certificates of the vehicles. In our work, we have suggested an algorithm using RFID technology to automate the documentation verification process of the vehicles like Pollution, Insurance, Rc book etc with the help of RFID reader placed at road checking areas. This documents will be updated by the motor vehicle department at specific periods

    VANET Applications: Hot Use Cases

    Get PDF
    Current challenges of car manufacturers are to make roads safe, to achieve free flowing traffic with few congestions, and to reduce pollution by an effective fuel use. To reach these goals, many improvements are performed in-car, but more and more approaches rely on connected cars with communication capabilities between cars, with an infrastructure, or with IoT devices. Monitoring and coordinating vehicles allow then to compute intelligent ways of transportation. Connected cars have introduced a new way of thinking cars - not only as a mean for a driver to go from A to B, but as smart cars - a user extension like the smartphone today. In this report, we introduce concepts and specific vocabulary in order to classify current innovations or ideas on the emerging topic of smart car. We present a graphical categorization showing this evolution in function of the societal evolution. Different perspectives are adopted: a vehicle-centric view, a vehicle-network view, and a user-centric view; described by simple and complex use-cases and illustrated by a list of emerging and current projects from the academic and industrial worlds. We identified an empty space in innovation between the user and his car: paradoxically even if they are both in interaction, they are separated through different application uses. Future challenge is to interlace social concerns of the user within an intelligent and efficient driving

    Proof of Travel for Trust-Based Data Validation in V2I Communication Part I: Methodology

    Full text link
    Previous work on misbehavior detection and trust management for Vehicle-to-Everything (V2X) communication can identify falsified and malicious messages, enabling witness vehicles to report observations about high-criticality traffic events. However, there may not exist enough "benign" vehicles with V2X connectivity or vehicle owners who are willing to opt-in in the early stages of connected-vehicle deployment. In this paper, we propose a security protocol for the communication between vehicles and infrastructure, titled Proof-of-Travel (POT), to answer the research question: How can we transform the power of cryptography techniques embedded within the protocol into social and economic mechanisms to simultaneously incentivize Vehicle-to-Infrastructure (V2I) data sharing activities and validate the data? The key idea is to determine the reputation of and the contribution made by a vehicle based on its distance traveled and the information it shared through V2I channels. In particular, the total vehicle miles traveled for a vehicle must be testified by digital signatures signed by each infrastructure component along the path of its movement. While building a chain of proofs of spatial movement creates burdens for malicious vehicles, acquiring proofs does not result in extra cost for normal vehicles, which naturally want to move from the origin to the destination. The proof of travel for a vehicle can then be used to determine the contribution and reward by its altruistic behaviors. We propose short-term and long-term incentive designs based on the POT protocol and evaluate their security and performance through theoretical analysis and simulations

    E-Wild Life Alert: Tackling the Human-Wildlife Conflict Problem

    Get PDF
    Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot that propels it around, providing a 360 degree turn for the image capturing camera to get a full view of the environment. On detecting any object in the way, the robot turns to avoid the obstacle. The E-Wild Life Alert application is able to detect five dangerous animals with an accuracy of up to 98%. On detecting any such animal in the vicinity, the application sends an SMS to a phone number in the system, logged as wildlife parks officer. This system would be useful, first to humans bordering areas with dangerous animals, as it protects them from these. Secondly, the tourism industry can benefit from the application as it reduces the number of wildlife killed on straying. In the long run, such an application is beneficial to nature in terms of conservation, promoting species diversity

    A Review Paper on Accident Detection System Using Intelligent Algorithm for VANET

    Get PDF
    Our lives became easier with the Quick accretion of technology and infrastructure. The advent of technology has also rise the traffic hazards and the road accident take place repeatedly which causes massive loss of life and property because of the poor emergency facilities. Recently, intelligent transportation systems (ITS) have emerged as an efficient way of improving interpretation of transportation systems and enhancing travel safety. Accident detection systems are one of the most effective (ITS) tools. The accident detected system which based on Global Positioning System (GPS) and Global System for Mobile communication (GSM) can be accomplish though one or several sensors, the system can gathers the information and coordinates of accident spot then send this data to the rescues services center over a network link in shortest time, It represented as an instance helping system. In this review paper, we proposed an intelligent system that composed of a GPS receiver, Vibration sensor, GSM Modem and integrated with Vehicular AD-Hoc Network (VANET). The employ of (VANET) by enhanced Ad hoc On-Demand Distance Vector protocol (AODV) helps these services in finding the optimum route to the emergency message. The use of GSM, GPS, and VANET technologies allows the system to track vehicle and provides the most instant and accurate information about the vehicle accident spot. Keywords: GPS, GSM, VANET, AODV
    • …
    corecore