75 research outputs found

    Vehicular multitier gateway selection algorithm for heterogeneous VANET architectures

    Get PDF

    SAI: safety application identifier algorithm at MAC layer for vehicular safety message dissemination over LTE VANET networks

    Get PDF
    Vehicular safety applications have much significance in preventing road accidents and fatalities. Among others, cellular networks have been under investigation for the procurement of these applications subject to stringent requirements for latency, transmission parameters, and successful delivery of messages. Earlier contributions have studied utilization of Long-Term Evolution (LTE) under single cell, Friis radio, or simplified higher layer. In this paper, we study the utilization of LTE under multicell and multipath fading environment and introduce the use of adaptive awareness range. Then, we propose an algorithm that uses the concept of quality of service (QoS) class identifiers (QCIs) along with dynamic adaptive awareness range. Furthermore, we investigate the impact of background traffic on the proposed algorithm. Finally, we utilize medium access control (MAC) layer elements in order to fulfill vehicular application requirements through extensive system-level simulations. The results show that, by using an awareness range of up to 250 m, the LTE system is capable of fulfilling the safety application requirements for up to 10 beacons/s with 150 vehicles in an area of 2 × 2 km2. The urban vehicular radio environment has a significant impact and decreases the probability for end-to-end delay to be ≤100 ms from 93%–97% to 76%–78% compared to the Friis radio environment. The proposed algorithm reduces the amount of vehicular application traffic from 21 Mbps to 13 Mbps, while improving the probability of end-to-end delay being ≤100 ms by 20%. Lastly, use of MAC layer control elements brings the processing of messages towards the edge of network increasing capacity of the system by about 50%

    On the design and deployment of multitier heterogeneous and adaptive vehicular networks

    Get PDF

    Data privacy threat modelling for autonomous systems: a survey from the GDPR’s perspective

    Get PDF
    Artificial Intelligence-based applications have been increasingly deployed in every field of life including smart homes, smart cities, healthcare services, and autonomous systems where personal data is collected across heterogeneous sources and processed using ”black-box” algorithms in opaque centralised servers. As a consequence, preserving the data privacy and security of these applications is of utmost importance. In this respect, a modelling technique for identifying potential data privacy threats and specifying countermeasures to mitigate the related vulnerabilities in such AI-based systems plays a significant role in preserving and securing personal data. Various threat modelling techniques have been proposed such as STRIDE, LINDDUN, and PASTA but none of them is sufficient to model the data privacy threats in autonomous systems. Furthermore, they are not designed to model compliance with data protection legislation like the EU/UK General Data Protection Regulation (GDPR), which is fundamental to protecting data owners' privacy as well as to preventing personal data from potential privacy-related attacks. In this article, we survey the existing threat modelling techniques for data privacy threats in autonomous systems and then analyse such techniques from the viewpoint of GDPR compliance. Following the analysis, We employ STRIDE and LINDDUN in autonomous cars, a specific use-case of autonomous systems, to scrutinise the challenges and gaps of the existing techniques when modelling data privacy threats. Prospective research directions for refining data privacy threats & GDPR-compliance modelling techniques for autonomous systems are also presented

    Efficient blockchain-based group key distribution for secure authentication in VANETs

    Get PDF
    This paper proposes a group key distribution scheme using smart contract-based blockchain technology. The smart contract’s functions allow for securely distributing the group session key, following the initial legitimacy detection using public key infrastructure-based authentication. For message authentication, we propose a lightweight symmetric key cryptography-based group signature method, supporting the security and privacy requirements of vehicular ad hoc networks (VANETs). Our discussion examined the scheme’s robustness against typical adversarial attacks. To evaluate the gas costs associated with smart contract’s functions, we implemented it on the Ethereum main network. Finally, comprehensive analyses of computation and communication costs demonstrate the scheme’s effectiveness

    A digital twin (DT) approach to narrow-band Internet of things (NB-IoT) wireless communication optimization in an industrial scenario

    Get PDF
    The pervasive realization of virtual replication of physical entities termed Digital Twin (DT) has been utilized in this paper to optimize the wireless communication of the Narrowband Internet of Things (NB-IoT) in an industrial scenario. This optimization is exclusively achieved through DT approach. NB-IoT is a Low-Powered Wide Area Network (LPWAN) standardized by 3GPP and leverages Long Term Evolution (LTE) technology. The Amplify-and-Forward (AF) optimization technique is used to improve the performance of some notably poor-performing terminals in the scenario. Bit-Error-Rate (BER) tests show the terminals’ overall performance before and after optimization. An improvement of 17% is achieved in BER. The signal quality of the channels is analyzed as well as the Cumulative Distribution Function (CDF) is used to showcase the effective throughput performance of the NB-IoT terminals

    Blockchain-based secret key extraction for efficient and secure authentication in VANETs

    Get PDF
    Intelligent transportation systems are an emerging technology that facilitates real-time vehicle-to-everything communication. Hence, securing and authenticating data packets for intra- and inter-vehicle communication are fundamental security services in vehicular ad-hoc networks (VANETs). However, public-key cryptography (PKC) is commonly used in signature-based authentication, which consumes significant computation resources and communication bandwidth for signatures generation and verification, and key distribution. Therefore, physical layer-based secret key extraction has emerged as an effective candidate for key agreement, exploiting the randomness and reciprocity features of wireless channels. However, the imperfect channel reciprocity generates discrepancies in the extracted key, and existing reconciliation algorithms suffer from significant communication costs and security issues. In this paper, PKC-based authentication is used for initial legitimacy detection and exchanging authenticated probing packets. Accordingly, we propose a blockchain-based reconciliation technique that allows the trusted third party (TTP) to publish the correction sequence of the mismatched bits through a transaction using a smart contract. The smart contract functions enable the TTP to map the transaction address to vehicle-related information and allow vehicles to obtain the transaction contents securely. The obtained shared key is then used for symmetric key cryptography (SKC)-based authentication for subsequent transmissions, saving significant computation and communication costs. The correctness and security robustness of the scheme are proved using Burrows–Abadi–Needham (BAN)-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator. We also discussed the scheme’s resistance to typical attacks. The scheme’s performance in terms of packet delay and loss ratio is evaluated using the network simulator (OMNeT++). Finally, the computation analysis shows that the scheme saves ~99% of the time required to verify 1000 messages compared to existing PKC-based schemes

    A review of the state of the art in non-contact sensing for covid-19

    Get PDF
    COVID-19, caused by SARS-CoV-2, has resulted in a global pandemic recently. With no approved vaccination or treatment, governments around the world have issued guidance to their citizens to remain at home in efforts to control the spread of the disease. The goal of controlling the spread of the virus is to prevent strain on hospitals. In this paper, we focus on how non-invasive methods are being used to detect COVID-19 and assist healthcare workers in caring for COVID-19 patients. Early detection of COVID-19 can allow for early isolation to prevent further spread. This study outlines the advantages and disadvantages and a breakdown of the methods applied in the current state-of-the-art approaches. In addition, the paper highlights some future research directions, which need to be explored further to produce innovative technologies to control this pandemic
    • …
    corecore