A secure cooperative transmission model in VANET using attribute based encryption

Author(s):  
Mounia Bouabdellah ◽  
Faissal El Bouanani ◽  
Hussain Ben-azza
Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1002 ◽  
Author(s):  
Jianming Cheng ◽  
Yating Gao ◽  
Ningbo Zhang ◽  
Hongwen Yang

Cooperative routing is one of the most widely used technologies for improving the energy efficiency and energy balance of wireless multi-hop networks. However, the end-to-end energy cost and network lifetime are greatly restricted if the cooperative transmission model is not designed properly. The main aim of this paper is to explore a two-stage cooperative routing scheme to further improve the energy efficiency and prolong the network lifetime. A two-stage cooperative (TSC) transmission model is firstly designed in which the core helper is introduced to determine the helper set for cooperation. Then, the two-stage link cost is formulated where x, the weight of residual energy, is introduced to be adjusted for different design goals. By selecting the optimal helper set, the two-stage link cost of each link can be optimized. Finally, based on the designed TSC transmission model and the optimized two-stage link cost, a distributed two-stage cooperative routing (TSCR) scheme is further proposed to minimize the end-to-end cooperative routing cost. Simulation results evaluate the effect of x on the different performance metrics. When x equals 0, TSCR can achieve the shortest end-to-end transmission delay and highest energy efficiency, while a larger x can achieve a longer network lifetime. Furthermore, simulation results also show that the proposed TSCR scheme can effectively improve both the energy efficiency and network lifetime compared with the existing schemes.


2015 ◽  
Vol 2015 ◽  
pp. 1-10
Author(s):  
Xi Luan ◽  
Jianjun Wu ◽  
Yuxin Cheng ◽  
Haige Xiang

An efficient data collection scheme plays an important role for the real-time intelligent monitoring in many machine-to-machine (M2M) networks. In this paper, a distributed joint cluster formation and resource allocation scheme for data collection in cluster-based M2M networks is proposed. Specifically, in order to utilize the advantages of cooperation, we first propose a hierarchical transmission model which contains two communication phases. In the first phase, the intracluster information sharing is carried out by all the nodes within the same cluster. Then these nodes transmit the total information to the BS cooperatively with virtual-MIMO (VMIMO) protocol in the second phase. To grasp the properties and advantages of this cooperative transmission strategy, the theoretical analysis results are provided. The key issue in this system is to form the clusters and allocate resources efficiently. Since the optimization problem on this issue is an NP-hard problem, a feasible joint scheme for the cluster formation and resource allocation is proposed in this paper, which is carried out via coalition formation game with a distributed algorithm. This scheme can reduce the complexity while keeping an attractive performance. Simulation results show the properties of the proposed scheme and its advantages when comparing with the noncooperative scheme for the data collection in a practical scenario.


2010 ◽  
Vol E93-B (12) ◽  
pp. 3538-3541
Author(s):  
Byungseok LEE ◽  
Ju Wook JANG ◽  
Sang-Gyu PARK ◽  
Wonjin SUNG

Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2019 ◽  
Author(s):  
Jonathan S. Nguyen-Van-Tam ◽  
Ben Killingley ◽  
Joanne Enstone ◽  
Michael Hewitt ◽  
Jovan Pantelic ◽  
...  

2020 ◽  
Author(s):  
Deepika Deepika ◽  
Rajnesh Malik ◽  
Saurabh Kumar ◽  
Rishabh Gupta ◽  
Ashutosh Kumar Singh

Author(s):  
D. Sangeetha ◽  
S. Sibi Chakkaravarthy ◽  
Suresh Chandra Satapathy ◽  
V. Vaidehi ◽  
Meenalosini Vimal Cruz

Sign in / Sign up

Export Citation Format

Share Document