15,481 research outputs found

    Congestion Relief: Assessing the Case for Road Tolls in Canada

    Get PDF
    Experience with road pricing generally — and congestion pricing specifically — is growing around the world. Research and planning in Canada should begin now on road pricing for heavily congested highways and streets.road pricing, traffic congestion

    Stability of secure routing protocol in ad hoc wireless network.

    Get PDF
    The contributions of this research are threefold. First, it offers a new routing approach to ad hoc wireless network protocols: the Enhanced Heading-direction Angle Routing Protocol (EHARP), which is an enhancement of HARP based on an on-demand routing scheme. We have added important features to overcome its disadvantages and improve its performance, providing the stability and availability required to guarantee the selection of the best path. Each node in the network is able to classify its neighbouring nodes according to their heading directions into four different zone-direction group. The second contribution is to present a new Secure Enhanced Heading-direction Angle Routing Protocol (SEHARP) for ad hoc networks based on the integration of security mechanisms that could be applied to the EHARP routing protocol. Thirdly, we present a new approach to security of access in hostile environments based on the history and relationships among the nodes and on digital operation certificates. We also propose an access activity diagram which explains the steps taken by a node. Security depends on access to the history of each unit, which is used to calculate the cooperative values of each node in the environment

    Mobile 5G Network Deployment Scheme on High-Speed Railway

    Get PDF
    The fifth-generation (5G) wireless communication has experienced an upsurge of interest for empowering vertical industries, due to its high data volume, extremely low latency, high reliability, and significant improvement in user experience. Specifically, deploying 5G on high-speed railway (HSR) is critical for the promotion of smart travelling such that passengers can connect to the Internet and utilize the on-board time to continue their usual activities. However, there remains a series of challenges in practical implementation, such as the serious Doppler shift caused by the high mobility, the carriage penetration loss especially in the high-frequency bands, frequent handovers, and economic issues. To address these challenges, we propose three schemes in this article to improve the coverage of 5G networks on the train. In particular, we provide a comprehensive description of each scheme in terms of their network architecture and service establishment procedures. Specifically, the mobile edge computing (MEC) is used as the key technology to provide low-latency services for on-board passengers. Moreover, these three schemes are compared among themselves regarding the quality-of-service, the scalability of service, and the related industry development status. Finally, we discuss various potential research directions and open issues in terms of deploying 5G networks on HSR

    Roaming service for electric vehicle charging using blockchain-based digital identity

    Get PDF
    We present a suitable approach to address the electric vehicle charging roaming problem (e-roaming). Blockchain technologies are applied to support the identity management process of users charging their vehicles and to record energy transactions securely. At the same time, off-chain cloud-based storage is used to record the transaction details. A user wallet settled on a mobile application stores user verified credentials; a backend application in the vehicle charging station validates the user credentials to authorize the energy transaction. The current model can be applied to similar contexts where the user may be required to keep several credentials from different providers to authenticate digital transactions.info:eu-repo/semantics/publishedVersio

    Architecture and Protocols for Service and Application Deployment in Resource Aware Ubiquitous Environments

    Get PDF
    Realizing the potential of pervasive computing will be predicated upon the availability of a flexible, mobility-aware infrastructure and the technologies to support seamless service management, provisioning and delivery. Despite the advances in routing and media access control technologies, little progress has been made towards large-scale deployment of services and applications in pervasive and ubiquitous environments. The lack of a fixed infrastructure, coupled with the time-varying characteristics of the underlying network topology, make service delivery challenging. The goal of this research is to address the fundamental design issues of a service infrastructure for ubiquitous environments and provide a comprehensive solution which is robust, scalable, secure and takes into consideration node mobility and resource constraints. We discuss the main functionalities of the proposed architecture, describe the algorithms for registration and discovery and present a power-aware location-driven message forwarding algorithm to enable node interaction in this architecture. We also provide security schemes to ensure user privacy in this architecture. The proposed architecture was evaluated through theuse of simulations. The results show that the service architecture is scalable and robust, even when node mobility is high. The comparative analysis shows that our message forwarding algorithm consistently outperforms contemporary location-driven algorithms. Furthermore, thisresearch work was implemented as a proof-of-concept implementation and tested on a real world scenario

    Radicalization of Airspace Security: Prospects and Botheration of Drone Defense System Technology

    Get PDF
    The development of a comprehensive and decisive drone defense integrated control system that can provide maximum security is crucial for maintaining territorial integrity and accelerating smart aerial mobility to sustain the emerging drone transportation system (DTS) for priority-based logistics and mobile communication. This study explores recent developments in the design of robust drone defense control systems that can observe and respond not only to drone attacks inside and outside a facility but also to equipment data such as CCTV security control on the ground and security sensors in the facility at a glance. Also, it considered DDS strategies, schema, and innovative security setups in different regions. Finally, open research issues in DDs designs are discussed, and useful recommendations are provided. Effective means for drone source authentication, delivery package verification, operator authorization, and dynamic scenario-specific engagement are solicited for comprehensive DDS design for maximum security Received: 2023-03-07 Revised: 2023-04-2

    Towards a Framework for Preserving Privacy in VANET

    Get PDF
    Vehicular Ad-hoc Network (VANET) is envisioned as an integral part of the Intelligent Transportation Systems as it promises various services and benefits such as road safety, traffic efficiency, navigation and infotainment services. However, the security and privacy risks associated with the wireless communication are often overlooked. Messages exchanged in VANET wireless communication carry inferable Personally Identifiable Information(PII). This introduces several privacy threats that could limit the adoption of VANET. The quantification of these privacy threats is an active research area in VANET security and privacy domains. The Pseudonymisation technique is currently the most preferred solution for critical privacy threats in VANET to provide conditional anonymous authentication. In the existing literature, several Pseudonym Changing Schemes(PCS) have been proposed as effective de-identification approaches to prevent the inference of PII. However, for various reasons, none of the proposed schemes received public acceptance. Moreover, one of the open research challenges is to compare different PCSs under varying circumstances with a set of standardized experimenting parameters and consistent metrics. In this research, we propose a framework to assess the effectiveness of PCSs in VANET with a systematic approach. This comprehensive equitable framework consists of a variety of building blocks which are segmented into correlated sub-domains named Mobility Models, Adversary Models, and Privacy Metrics. Our research introduces a standard methodology to evaluate and compare VANET PCSs using a generic simulation setup to obtain optimal, realistic and most importantly, consistent results. This road map for the simulation setup aims to help the research \& development community to develop, assess and compare the PCS with standard set of parameters for proper analysis and reporting of new PCSs. The assessment of PCS should not only be equitable but also realistic and feasible. Therefore, the sub-domains of the framework need coherent as well as practically applicable characteristics. The Mobility Model is the layout of the traffic on the road which has varying features such as traffic density and traffic scenarios based on the geographical maps. A diverse range of Adversary Models is important for pragmatic evaluation of the PCSs which not only considers the presence of global passive adversary but also observes the effect of intelligent and strategic \u27local attacker\u27 placements. The biggest challenge in privacy measurement is the fact that it is a context-based evaluation. In the literature, the PCSs are evaluated using either user-oriented or adversary-oriented metrics. Under all circumstances, the PCSs should be assessed from both user and adversary perspectives. Using this framework, we determined that a local passive adversary can be strong based on the attacking capabilities. Therefore, we propose two intelligent adversary placements which help in privacy assessment with realistic adversary modelling. When the existing PCSs are assessed with our systematic approach, consistent models and metrics, we identified the privacy vulnerabilities and the limitations of existing PCSs. There was a need for comprehensive PCS which consider the context of the vehicles and the changing traffic patterns in the neighbourhood. Consequently, we developed a Context-Aware \& Traffic Based PCS that focuses on increasing the overall rate of confusion for the adversary and to reduce deterministic information regarding the pseudonym change. It is achieved by increasing the number of dynamic attributes in the proposed PCS for inference of the changing pattern of the pseudonyms. The PCS increases the anonymity of the vehicle by having the synchronized pseudonym changes. The details given under the sub-domains of the framework solidifies our findings to strengthen the privacy assessment of our proposed PCS
    • …
    corecore