Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services

Author(s):  
Alexey Busygin ◽  
Artem Konoplev ◽  
Maxim Kalinin ◽  
Dmitry Zegzhda
Sensors ◽  
2019 ◽  
Vol 19 (16) ◽  
pp. 3589 ◽  
Author(s):  
Sheikh ◽  
Liang ◽  
Wang

Vehicular ad hoc networks (VANETs) are an emerging type of mobile ad hoc networks (MANETs) with robust applications in intelligent traffic management systems. VANET has drawn significant attention from the wireless communication research community and has become one of the most prominent research fields in intelligent transportation system (ITS) because of the potential to provide road safety and precautionary measures for the drivers and passengers. In this survey, we discussed the basic overview of the VANET from the architecture, communication methods, standards, characteristics, and VANET security services. Second, we presented the threats and attacks and the recent state-of-the-art methods of the VANET security services. Then, we comprehensively reviewed the authentication schemes that can protect vehicular networks from malicious nodes and fake messages. Third, we discussed the latest simulation tools and the performance of the authentication schemes in terms of simulation tools, which was followed by the VANET applications. Lastly, we identified the open research challenges and gave future research directions. In sum, this survey fills the gap of existing surveys and summarizes the latest research development. All the security attacks in VANETs and their related countermeasures are discussed with respect to ensuring secure communication. The authentication schemes and comprehensive applications were introduced and analyzed in detail. In addition, open research challenges and future research directions were issued.


2020 ◽  
Vol 11 (3) ◽  
pp. 19-23
Author(s):  
Mаrvarid Narzieva ◽  
Keyword(s):  

In this article, we discuss the competitiveness of the organization Guard, performing administrative-legal actions that protect property, property and ensure the safety of life and health of citizens, from emergencies and criminal encroachments


Author(s):  
Roman Kotsan

The article considers smuggling as economic crime in the Soviet-Polish border in the interwar period. The reasons for smuggling activities are studied and summarized. Range of smuggled goods is shown. The number of arrested smugglers, their nationality, the value of seized goods both from Poland and the Soviet Union are investigated. Smuggling as a political phenomenon in the Soviet-Polish border in 1921-1939 is under study. The use of smugglers by the intelligence agencies of both Poland and the USSR are emphasized. The role of public authorities of both abovementioned countries in the fight against smuggling, namely Border Guard Corps from Poland; border guards, customs, security services and local Soviet authorities on the part of the USSR are studied. The influence of anti smuggling measures (increased criminal liability, limitation of private capital in trade, strengthen of the state borders protection) on its amount decrease is studied. Keywords: State border, smuggling, crime, scouting, Poland, USSR


2019 ◽  
pp. 172-176
Author(s):  
Otegbulu M. I. ◽  
Ezeagu A. Agbo ◽  
Agbo Genevieve N.

Security is pre-requisite for the development of human beings and the society. It is a pre-condition for the survival, development and advancement of individuals and groups. The school is an organization that needs to have a planned safety rules and regulations to protect it components so that the culture of learning and teaching is enhanced. Security threat within the school environment could hamper the peaceful atmosphere in the school, and disrupt academic exercises and panic among the personnel in the school. The government, security agents, parents, school administrators and the community has a lot of role to play to make school environment safe and conducive. However, security gadgets and apparatus should be provided to nip these issues in the bud, as well as train the teaching and non-teaching staff on security issues.


Sign in / Sign up

Export Citation Format

Share Document