3 research outputs found

    Authentication mechanism of network communication nodes based on information safety of the Internet of Vehicles

    Get PDF
    The Internet of Vehicles (IoV) is an important part of intelligent traffic, and the problem of information safety is an essential task that has to be solved urgently. In this study, the main focus is on the authentication mechanism of communication nodes in the IoV. Based on elliptic curve cryptography, an authentication method was designed; the processes of system establishment, pseudonym generation and message authentication were introduced; and the safety of the system was analysed. The results indicate that the proposed method has passed the correctness verification and has significant advantages compared to SPECS and b-SPECS in terms of time cost and authentication delay. The experimental results verify the reliability of the method, which makes some contributions to the authentication of communication nodes in the IoV and is beneficial to the further improvement of information security of the IoV

    Reliability and capability based computation offloading strategy for vehicular ad hoc clouds

    Get PDF
    In the Internet of Vehicles (IoV), with the increasing demand for intelligent technologies such as driverless driving, more and more in-vehicle applications have been put into autonomous driving. For the computationally intensive task, the vehicle self-organizing network uses other high-performance nodes in the vehicle driving environment to hand over tasks to these nodes for execution. In this way, the computational load of the cloud alleviated. However, due to the unreliability of the communication link and the dynamic changes of the vehicle environment, lengthy task completion time may lead to the increase of task failure rate. Although the flooding algorithm can improve the success rate of task completion, the offloading expend will be large. Aiming at this problem, we design the partial flooding algorithm, which is a comprehensive evaluation method based on system reliability in the vehicle computing environment without infrastructure. Using V2V link to select some nodes with better performance for partial flooding offloading to reduce the task complete time, improve system reliability and cut down the impact of vehicle mobility on offloading. The results show that the proposed offloading strategy can not only improve the utilization of computing resources, but also promote the offloading performance of the system

    Establishing an Intelligent Transportation System With a Network Security Mechanism in an Internet of Vehicle Environment

    No full text
    corecore