GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Mathematics  (1)
Material
Publisher
Language
Years
Subjects(RVK)
  • Mathematics  (1)
RVK
  • 1
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 7 ( 2021-04-10), p. 1-1
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 7 ( 2021-04-10), p. 1-1
    Abstract: Internet of Vehicles is recorded as an ever growing area for connected vehicles to exchange their information with other vehicles using vehicle‐to‐vehicle communication. Vehicle‐to‐vehicle communication is possible by forming vehicular ad hoc networks, with the help of roadside units using vehicle‐to‐roadside communications in the network. Internet of networks has many advantages such as road safety, traffic management, and sharing information on daily traffic and updating traffic information. For example, the Internet of Vehicles can be used to reduce traffic and deaths occurring due to road accidents, to reduce the fuel needed, and to reduce travel time. Interconnected vehicles rapidly learn about road conditions and traffic and respond to the driver; thus, necessary actions are taken. However, the attacker can modify the information in the connected vehicles and, thus, creates problem on the road. Data fascination is one of the main attacks on connected vehicles where connected vehicles take action based on information from the other vehicle. In this paper, first, a model has been proposed to detect the data fascination attack using the hashing technique to enhance the security in the interconnected vehicles by adjusting the size of the contention window to transfer original information to other interconnected vehicles at the correct time. Second, a model has been suggested to reduce the travel time in case of traffic congestion. The efficiency of the proposed model is checked using numerical methods obtained from the simulation results. From the obtained results, the proposed approach prevents data fascination attacks in interconnected vehicles and provides high throughput with lower delay.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...