An Adaptive Key Exchange Procedure for VANET
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
VANET is a promising technology for intelligent transport systems (ITS). It offers new opportunities aiming at improving the circulation of vehicles on the roads and improving road safety. However, vehicles are interconnected by wireless links and without using any infrastructure, which exposes the vehicular network to many attacks. This paper presents a new solution for the exchange of security keys to protect information exchanged between vehicles. In addition to securing the inter-vehicular communication, the proposed solution has considerably decreased the time for the exchange of keys, thus improving the performance of VANET.
Authors and Affiliations
Hamza Toulni, Mohcine Boudhane, Benayad Nsiri, Mounia Miyara
Design of a web-based courseware authoring and presentation system
A Web-based Courseware Authoring and Presentation System is a user-friendly and interactive e-learning software that can be used by both computer experts and non-computer experts to prepare a courseware in any subj...
A Blockchain Technology Evolution Between Business Process Management (BPM) and Internet-of-Things (IoT)
A Blockchain is considered the main mechanism for Bitcoin concurrency. A Blockchain is known by a public ledger and public transactions stored in a chain. The properties of blockchain demonstrate in decentralization as d...
A hybrid Evolutionary Functional Link Artificial Neural Network for Data mining and Classification
This paper presents a specific structure of neural network as the functional link artificial neural network (FLANN). This technique has been employed for classification tasks of data mining. In fact, there are a few stud...
Method for Image Source Separation by Means of Independent Component Analysis: ICA, Maximum Entory Method: MEM, and Wavelet Based Method: WBM
Method for image source separation based on Independent Component Analysis: ICA, Maximum Entropy Method: MEM, and Wavelet Based Method: WBM is proposed. Experimental results show that image separation can be done from th...
A Survey of IPv6 Deployment
The next-generation Internet protocol (IPv6) was designed to overcome the limitation in IPv4 by using a 128-bit address instead of a 32-bit address. In addition to solving the address the limitations, IPv6 has many impro...