An Adaptive Key Exchange Procedure for VANET
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
VANET is a promising technology for intelligent transport systems (ITS). It offers new opportunities aiming at improving the circulation of vehicles on the roads and improving road safety. However, vehicles are interconnected by wireless links and without using any infrastructure, which exposes the vehicular network to many attacks. This paper presents a new solution for the exchange of security keys to protect information exchanged between vehicles. In addition to securing the inter-vehicular communication, the proposed solution has considerably decreased the time for the exchange of keys, thus improving the performance of VANET.
Authors and Affiliations
Hamza Toulni, Mohcine Boudhane, Benayad Nsiri, Mounia Miyara
Utilization of a Neuro Fuzzy Model for the Online Detection of Learning Styles in Adaptive e-Learning Systems
After conducting a historical review and establi-shing the state of the art of the various approaches regarding the design and implementation of adaptive e–learning systems—taking into consideration the characteristics o...
Exploiting SCADA vulnerabilities using a Human Interface Device
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Lo...
Extended Fuzzy Analytical Hierarchy Process Approach in Determinants of Employees’ Competencies in the Fourth Industrial Revolution
This paper explored the education factors and ranked their impacts on the employees’ competencies development in Vietnam. Factors contributing to the employees’ competencies in the Vietnamese context are proposed based o...
New Quintupling Point Arithmetic 5P Formulas for Lŏpez-Dahab Coordinate over Binary Elliptic Curve Cryptography
In Elliptic Curve Cryptography (ECC), computational levels of scalar multiplication contains three levels: scalar arithmetic, point arithmetic and field arithmetic. To achieve an efficient ECC performance, precomputed po...
AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability
In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious be...