Enhanced Role-Based Handover Control Algorithm for Efficient Multimedia Data Communication Performance in Vehicular Network Using IoT Security Issues

2021 ◽  
pp. 159-172
Author(s):  
P. T. Kalaivaani ◽  
Raja Krishnamoorthy ◽  
A. Srinivasula Reddy ◽  
S. Velliangiri
2020 ◽  
pp. 87-97
Author(s):  
Sourish Chatterjee ◽  
Biswanath Roy

In an office space, an LED-based lighting system allows you to perform the function of a data transmitter. This article discusses the cost-effective design and development of a data-enabled LED driver that can transmit data along with its receiving part. In addition, this paper clearly outlines the application of the proposed VLC system in an office environment where ambient light interference is a severe issue of concern. The result shows satisfactory lighting characteristics in general for this area in terms of average horizontal illuminance and illuminance uniformity. At the same time, to evaluate real-time and static communication performance, Arduino interfaced MATLAB Simulink model is developed, which shows good communication performance in terms of BER (10–7) even in presence of ambient light noise with 6 dB signal to interference plus noise ratio. Our designed system is also flexible to work as a standalone lighting system, whenever data communication is not required.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


2012 ◽  
Vol 6-7 ◽  
pp. 356-360
Author(s):  
Shao Yin Wang ◽  
Yi Yu ◽  
Guo Xin Zheng ◽  
Qing Feng Ding

We study the anti-interference performance of the 802.11 system when it works as Data Communication System (DCS) in Communication Based Train Control (CBTC). We first conduct extensive experiments on a 802.11b network to assess the ability on a lab test bed, then the outdoor experiments are also conducted. In the presence of jammer, we find that in each case of interference model, there exists a C/I threshold which determine the DCS-Access Point (DCS-AP) and DCS-Station Adapter (DCS-STA) communication performance. In the outdoor environment, different interference sources are adopted to investigate the data throughput value and other parameters of the DCS system under the critical state.


2021 ◽  
Vol 20 (Supp01) ◽  
pp. 2140001
Author(s):  
Bremnavas Ismail Mohideen ◽  
Basem Assiri

In recent decades, the communication of electronic equipment and physical resources is combined. Internet of Things (IoT) distributes things widely in the network. The IoT is Internet-based pervasive computing, which created significant development in the recent disposition of IoT infrastructures. The IoT infrastructures lead, manage and generate large amounts of data across various applications including environmental, transportation and healthcare monitoring. In this regard, there are salient uncertainties about the use of security concepts that are frequently measured as a major concern of IoT distributed architecture design. This paper mainly focuses on the classification of IoT, novel architecture considering the sensitivity of data, IoT security layers, review of security issues and acclaimed countermeasures.


2021 ◽  
Vol 18 (4) ◽  
pp. 1287-1293
Author(s):  
M. P. Haripriya ◽  
P. Venkadesh

The 5G mobile wireless network systems faces a lot of security issues due to the opening of network and its insecurity. The insecure network prone to various attacks and it disrupts secure data communications between legitimate users. Many works have addressed the security problems in 3G and 4G networks in efficient way through authentication and cryptographic techniques. But, the security in 5G networks during data communication was not improved. Subtractive Gradient Boost Clustered Node Authentication (SGBCNA) Method is introduced to perform secure data communication. The subtractive gradient boost clustering technique is applied to authenticate the mobile node as normal nodes and malicious nodes based on the selected features. The designed ensemble clustering model combines the weak learners to make final strong clustering results with minimum loss. Finally, the malicious nodes are eliminated and normal mobile nodes are taken for performing the secured communication in 5G networks. Simulation is carried out on factors such as authentication accuracy, computation overhead and security level with respect to a number of mobile nodes and data packets. The observed outcomes clearly illustrate that the SGBCNA Method efficiently improves node authentication accuracy, security level with minimum overhead than the state-of-the-art-methods.


Author(s):  
Abdul Rahim ◽  
Dr. V.A.Sankar Ponnapalli

With the advancements in Vehicular communication technologies in automobile engineering leads to enhancement of modern societies by utilizing Internet based data communication in a vehicular network to effectively avoid accidents and traffic congestions using Multi Input Multi Output (MIMO) cooperative relay technique for enhancing the aspects of performance by reduction of transmission energy consumption by taking the advantage of spatial and temporal diversity gain in a vehicular network as the conventional routing based on topology is merely not suitable over a dynamic vehicular network environment as GPS is used to identify effective route [4].In this paper we propose applications of cooperative communication techniques and their survey for identifying close relationship between forwarding and addressing techniques in a vehicular network and further we compare performance and energy consumption of cooperative techniques with the traditional multi-hop technique over Rayleigh channel using MQAM for optimization.


Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.


Sign in / Sign up

Export Citation Format

Share Document