scholarly journals Research on Security Communication Technology of Internet of Vehicles Based on 5G Technology

2021 ◽  
Vol 2066 (1) ◽  
pp. 012058
Author(s):  
Shaojun Xiong

Abstract With the improvement of the economic level and the development of infrastructure, the use of automobiles as a mode of transportation has become more and more common, and the number of cars has continued to grow. Based on this background, the rapid development of intelligent and networked automotive network communication technology, the birth of the Internet of Vehicles technology, has promoted the transformation of the automotive industry. This article gives the corresponding security requirements based on the security risks of IoV communication, briefly introduces the basic methods to realize the security of IoV communication, and proposes the service architecture, PKI architecture and multi-PKI system mutual trust mechanism to realize the security of IoV communication based on this.

2011 ◽  
Vol 225-226 ◽  
pp. 706-709 ◽  
Author(s):  
Shu Guo Yang

Cloud computing is regarded as one of the most enticing technologies and potential silver bullet in the IT industry. Because of open condition and general-purpose nature of cloud, security issue is becoming a bottle neck of rapid development and broad application of cloud computing. Firstly, this paper addresses cloud customers’ significant concerns about and requirements of cloud security. Secondly, cloud security risks and threats posed by the pervasive and ad hoc nature of the cloud are comprehensively analyzed. Finally, some effective and dependable security mechanisms are proposed to lower cloud security risks and meet security requirements of cloud customers. Especially, a novel scheme for integrity and copyright protection of customers’ works in the cloud is presented based on digital watermarking and digital signature.


2021 ◽  
Vol 13 (6) ◽  
pp. 3474
Author(s):  
Guang Yu ◽  
Shuo Liu ◽  
Qiangqiang Shangguan

With the rapid development of information and communication technology, future intelligent transportation systems will exhibit a trend of cooperative driving of connected vehicles. Platooning is an important application technique for cooperative driving. Herein, optimized car-following models for platoon control based on intervehicle communication technology are proposed. On the basis of existing indicators, a series of evaluation methods for platoon safety, stability, and energy consumption is constructed. Numerical simulations are used to compare the effects of three traditional models and their optimized counterparts on the car-following process. Moreover, the influence of homogenous and heterogeneous attributes on the platoon is analyzed. The optimized model proposed in this paper can improve the stability and safety of vehicle following and reduce the total fuel consumption. The simulation results show that a homogenous platoon can enhance the overall stability of the platoon and that the desired safety margin (DSM) model is better suited for heterogeneous platoon control than the other two models. This paper provides a practical method for the design and systematic evaluation of a platoon control strategy, which is one of the key focuses in the connected and autonomous vehicle industry.


2013 ◽  
Vol 662 ◽  
pp. 896-901
Author(s):  
Zong Jin Liu ◽  
Yang Yang ◽  
Zheng Fang ◽  
Yan Yan Xu

Because of rapid development of wireless communication technology, there is an increasing adoption of mobile advertising, such as location based advertising (LBA). To what extent can LBA improve advertising effectiveness is an important topic in the field of wireless communication technology research. Most researches quantify long term impacts of advertisings by VAR (Vector Autoregressive) model. However, compared to VAR model, VECM (Vector Error Correction Model) is a better method in that it allows one to estimate both a long-term equilibrium relationship and a short-term dynamic error correction process. In this study, we employ VECM to explore LBA’s (Location Based Advertising) and PUA’s (Pop-up Advertising) sales impact in both short and long terms. The developed VECM reveals that LBA’s sales impact is about more than2 times as big as PUA’s in short dynamic term and nearly 6 times bigger than PUA’s in long equilibrium term. These findings add to advertising and VECM literatures. These results can give managers more confident to apply wireless communication technology to advertising.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Yan Gao ◽  
Wenfen Liu

With the rapid development and application of medical sensor networks, the security has become a big challenge to be resolved. Trust mechanism as a method of “soft security” has been proposed to guarantee the network security. Trust models to compute the trustworthiness of single node and each path are constructed, respectively, in this paper. For the trust relationship between nodes, trust value in every interval is quantified based on Bayesian inference. A node estimates the parameters of prior distribution by using the collected recommendation information and obtains the posterior distribution combined with direct interactions. Further, the weights of trust values are allocated through using the ordered weighted vector twice and overall trust degree is represented. With the associated properties of Tsallis entropy, the definition of path Tsallis entropy is put forward, which can comprehensively measure the uncertainty of each path. Then a method to calculate the credibility of each path is derived. The simulation results show that the proposed models can correctly reflect the dynamic of node behavior, quickly identify the malicious attacks, and effectively avoid such path containing low-trust nodes so as to enhance the robustness.


2019 ◽  
Vol 1 (1) ◽  
pp. 10
Author(s):  
Hendrie Ardhiansyah ◽  
Nurhidayati Nurhidayati

Over the years, the rise of digital economy has confused countries in their efforts to tax foreign companies without physically presence within their jurisdiction. One of the potential tax revenues that have not been optimally digging comes from the digital sector. The digital economy sector has enormous potential along with the rapid development of information and communication technology, especially the internet. This digital economy market is dominated by internet-based services commonly called Over The Top (OTT) services and is filled with global content owned by foreign companies. This article argues the provisions of taxation for foreign OTT lending providers in England, Australia, India, and Japan. This research used a qualitative non-case study approach. This study outlines the strengths and weaknesses of each alternative.


2020 ◽  
Vol 6 (2) ◽  
pp. 367
Author(s):  
Kadek Ari Styawati ◽  
A.A.N. Eddy Supriyadinata Gorda

The rapid development of information and communication technology offers solutions in effective and efficient organizational management. The implementation of information technology becomes an important aspect in the competition in the digital arena. This study aims to examine in-depth about how the application of HRIS in STPBI. The research results showed that the implementation of HRIS at STPBI is used as a strategic activity in optimizing HR functions. The transformation and implementation of HRIS has several supporting and inhibiting factors. These supporting and inhibiting factors are combined in the development of HR in line with the theoretical and literary concepts used in this study. Through integrated work synergies in the field of staffing, transparency and availability of information is very helpful in decision making. The implementation of HRIS at STPBI is based on the paradigm of a balance between supporting factors and inhibiting factors.


2021 ◽  
Vol 105 ◽  
pp. 331-338
Author(s):  
Fu Xing Qin ◽  
Li Zhang ◽  
Zhong Wang

With the rapid development of communication technology, modern communication technology has been widely penetrated into modern national defense, science and technology, people's life and other fields, and has become a means to provide high-quality and seamless information communication between people and machines. With the rapid development of computer technology and the Internet, the traditional program-controlled switching technology has come to an end, and the soft-switch network based on IP technology and packet switching has gradually replaced the program-controlled switching network based on circuit switching and become the mainstream of today's communication network world. The rapid development of VOIP telephony reduces the cost of domestic and international long-distance telephony, benefiting consumers. Digital mobile communication expands channel capacity, improves service quality and promotes the rapid development of this industry. Based on the secondary development of the open source FreeSWITCH software, this paper develops a VOIP voice system based on IP technology to meet different user needs intelligently [1].


Author(s):  
Bashar Alohali

With IoT era, development raises several significant research questions in terms of system architecture, design and improvement. For example; the requirement of virtual resource utilization and storage capacity necessitates making IoT applications smarter; therefore, integrate the IoT concept with cloud computing will play an important role. This is crucial because of very large amounts of data that IoT is expected to generate. The Cloud of Things (CoT) is used to connect heterogeneous physical things to the virtual domain of the cloud. Despite its numerous advantages, there are many research challenges with utilization of CoT that needs additional consideration. These include high complexity, efficiency, improving reliability, and security. This chapter introduces CoT, its features, the applications that use CoT. CoT, like all other networked functions, is vulnerable to security attacks. The security risks for CoT are listed and described. The security requirements for CoT are identified and solutions are proposed to address the various attacks on CoT and its components.


Author(s):  
Sirje Virkus

The rapid development of information and communication technology (ICT) over the past decades has created new challenges and opportunities for libraries and librarians. As a result of ICT, library services to users have changed, the management of libraries has evolved and the roles of librarians have multiplied. The new millennium presents new opportunities to exploit an ever-growing array of information and communication technologies in the provision of library services. As one millennium draws to a close and a new one begins, there are a lot of questions to answer:


2018 ◽  
Vol 246 ◽  
pp. 03016
Author(s):  
Aidong Xu ◽  
Kai Fan ◽  
Hang Yang

With the rapid development of information technology construction in the power industry, research on network security has become a problem that cannot be ignored. This paper introduces the use of information communication network equipment at home and abroad in power system; analyzes the security risks of foreign network equipment in power system, shows the risk of power system network and the urgent need for localization of network equipment and analyzes the security of internal network of power system Risks; specific measures for the safety control of network equipment in the whole process are proposed to provide reference for power system network security protection.


Sign in / Sign up

Export Citation Format

Share Document