SCAV 2017 : : 2017 1st International Workshop on Safe Control of Connected and Autonomous Vehicles : proceedings : 21 April 2017, Pittsburgh, Pennsylvania, USA / / sponsors SIGBED, IEEE CS, IEEE Signal Processing Society |
Pubbl/distr/stampa | New York : , : ACM, , 2017 |
Descrizione fisica | 1 online resource (45 pages) |
Disciplina | 629.046 |
Soggetto topico |
Automated vehicles
Vehicular ad hoc networks (Computer networks) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Safe Control of Connected and Autonomous Vehicles 2017
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles CPS Week '17 : Cyber Physical Systems Week 2017 : Pittsburgh, PA, USA, April 18-21, 2017 Cyber Physical Systems Week 2017 |
Record Nr. | UNINA-9910375778203321 |
New York : , : ACM, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in vehicular networks : focus on location and identity privacy / / Leila Benarous, Salim Batim, and Abdelhamid Mellouk |
Autore | Benarous Leila |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , [2022] |
Descrizione fisica | 1 online resource (265 pages) |
Disciplina | 388.312 |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Intelligent transportation systems - Security measures |
ISBN |
1-394-17261-3
1-394-17259-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- List of Acronyms -- Introduction -- Chapter 1. Vehicular Networks -- 1.1. Introduction -- 1.2. Motivation by numbers -- 1.3. Evolution -- 1.4. Architecture -- 1.5. Characteristics -- 1.6. Technical challenges and issues -- 1.7. Wireless technology -- 1.8. Standards -- 1.8.1. IEEE WAVE stack -- 1.8.2. ETSI standards -- 1.8.3. The 3GPP standard -- 1.9. Types -- 1.9.1. The autonomous vehicle (self-dependent) -- 1.9.2. VANET -- 1.9.3. Vehicular clouds -- 1.9.4. Internet of vehicles -- 1.9.5. Social Internet of vehicles -- 1.9.6. Data named vehicular networks -- 1.9.7. Software-defined vehicular networks -- 1.10. Test beds and real implementations -- 1.11. Services and applications -- 1.12. Public opinion -- 1.13. Conclusion -- Chapter 2. Privacy and Security in Vehicular Networks -- 2.1. Introduction -- 2.2. Privacy issue in vehicular networks -- 2.2.1. Types -- 2.2.2. When and how it is threatened? -- 2.2.3. Who is the threat? -- 2.2.4. What are the consequences? -- 2.2.5. How can we protect against it? -- 2.3. State-of-the-art location privacy-preserving solutions -- 2.3.1. Non-cooperative change -- 2.3.2. Silence approaches -- 2.3.3. Infrastructure-based mix-zone approach -- 2.3.4. The cooperation approach (distributed mix-zone) -- 2.3.5. Hybrid approach -- 2.4. Authentication issues in vehicular networks -- 2.4.1. What is being authenticated in vehicular networks? -- 2.4.2. Authentication types -- 2.4.3. How does authentication risk privacy? -- 2.5. Identity privacy preservation authentication solutions: state of the art -- 2.6. Conclusion -- Chapter 3. Security and Privacy Evaluation Methodology -- 3.1. Introduction -- 3.2. Evaluation methodology -- 3.2.1. Security -- 3.2.2. Privacy -- 3.3. Conclusion -- Chapter 4. The Attacker Model -- 4.1. Introduction -- 4.2. Security objectives.
4.3. Security challenges -- 4.4. Security attacker -- 4.4.1. Aims -- 4.4.2. Types -- 4.4.3. Means -- 4.4.4. Attacks -- 4.4.5. Our attacker model -- 4.5. Conclusion -- Chapter 5. Privacy-preserving Authentication in Cloud-enabled Vehicle Data Named Networks (CVDNN) for Resources Sharing -- 5.1. Introduction -- 5.2. Background -- 5.2.1. Vehicular clouds -- 5.2.2. Vehicular data named networks -- 5.3. System description -- 5.4. Forming cloud-enabled vehicle data named networks -- 5.5. Migrating the local cloud virtual machine to the central cloud -- 5.6. Privacy and authentication when using/providing CVDNN services -- 5.6.1. The authentication process -- 5.6.2. The reputation testimony -- 5.7. The privacy in CVDNN -- 5.8. Discussion and analysis -- 5.8.1. The privacy when joining the VC -- 5.8.2. Privacy while using the VC -- 5.9. Conclusion -- Chapter 6. Privacy-preserving Authentication Scheme for On-road On-demand Refilling of Pseudonym in VANET -- 6.1. Introduction -- 6.2. Network model and system functionality -- 6.2.1. Network model -- 6.2.2. The system functionality -- 6.3. Proposed scheme -- 6.4. Analysis and discussion -- 6.4.1. Security analysis -- 6.4.2. Burrows, Abadi and Needham (BAN) logic -- 6.4.3. SPAN and AVISPA tools -- 6.5. Conclusion -- Chapter 7. Preserving the Location Privacy of Vehicular Ad hoc Network Users -- 7.1. Introduction -- 7.2. Adversary model -- 7.3. Proposed camouflage-based location privacy-preserving scheme -- 7.3.1. Analytical model -- 7.3.2. Simulation -- 7.4. Proposed hybrid pseudonym change strategy -- 7.4.1. Hypothesis and assumptions -- 7.4.2. Changing the pseudonyms -- 7.4.3. The simulation -- 7.5. Conclusion -- Chapter 8. Preserving the Location Privacy of Internet of Vehicles Users -- 8.1. Introduction -- 8.2. CE-IoV -- 8.3. Privacy challenges -- 8.4. Attacker model. 8.5. CLPPS: cooperative-based location privacy-preserving scheme for Internet of vehicles -- 8.5.1. Simulation -- 8.5.2. Comparative study and performance analysis -- 8.6. CSLPPS: concerted silence-based location privacy-preserving scheme for Internet of vehicles -- 8.6.1. The proposed solution -- 8.6.2. Simulation results -- 8.6.3. Comparative study performance analysis -- 8.7. Obfuscation-based location privacy-preserving scheme in cloud-enabled Internet of vehicles -- 8.7.1. The proposition -- 8.7.2. Study of feasibility using game theoretic approach -- 8.7.3. The simulation -- 8.7.4. Analytical model -- 8.7.5. Comparative study -- 8.8. Conclusion -- Chapter 9. Blockchain-based Privacy-aware Pseudonym Management Framework for Vehicular Networks -- 9.1. Introduction -- 9.2. Background -- 9.2.1. Public key infrastructure (PKI) -- 9.2.2. Vehicular PKI -- 9.2.3. Blockchain technology -- 9.2.4. Blockchain of blockchains -- 9.3. Related works -- 9.3.1. Blockchain-based PKI -- 9.3.2. Privacy-aware blockchain-based PKI -- 9.3.3. Monero -- 9.3.4. Blockchain-based vehicular PKI -- 9.4. Key concepts -- 9.4.1. Ring signature -- 9.4.2. One-time address -- 9.5. Proposed solution -- 9.5.1. General description -- 9.5.2. Registration to the blockchain -- 9.5.3. Certifying process -- 9.5.4. Revocation process -- 9.5.5. Transaction structure and validation -- 9.5.6. Block structure and validation -- 9.5.7. Authentication using blockchain -- 9.6. Analysis -- 9.7. Comparative study -- 9.8. Conclusion -- Conclusion -- References -- Index -- EULA. |
Record Nr. | UNINA-9910642706903321 |
Benarous Leila | ||
Hoboken, NJ : , : John Wiley & Sons, Inc., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in vehicular networks : focus on location and identity privacy / / Leila Benarous, Salim Batim, and Abdelhamid Mellouk |
Autore | Benarous Leila |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , [2022] |
Descrizione fisica | 1 online resource (265 pages) |
Disciplina | 388.312 |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Intelligent transportation systems - Security measures |
ISBN |
1-394-17261-3
1-394-17259-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- List of Acronyms -- Introduction -- Chapter 1. Vehicular Networks -- 1.1. Introduction -- 1.2. Motivation by numbers -- 1.3. Evolution -- 1.4. Architecture -- 1.5. Characteristics -- 1.6. Technical challenges and issues -- 1.7. Wireless technology -- 1.8. Standards -- 1.8.1. IEEE WAVE stack -- 1.8.2. ETSI standards -- 1.8.3. The 3GPP standard -- 1.9. Types -- 1.9.1. The autonomous vehicle (self-dependent) -- 1.9.2. VANET -- 1.9.3. Vehicular clouds -- 1.9.4. Internet of vehicles -- 1.9.5. Social Internet of vehicles -- 1.9.6. Data named vehicular networks -- 1.9.7. Software-defined vehicular networks -- 1.10. Test beds and real implementations -- 1.11. Services and applications -- 1.12. Public opinion -- 1.13. Conclusion -- Chapter 2. Privacy and Security in Vehicular Networks -- 2.1. Introduction -- 2.2. Privacy issue in vehicular networks -- 2.2.1. Types -- 2.2.2. When and how it is threatened? -- 2.2.3. Who is the threat? -- 2.2.4. What are the consequences? -- 2.2.5. How can we protect against it? -- 2.3. State-of-the-art location privacy-preserving solutions -- 2.3.1. Non-cooperative change -- 2.3.2. Silence approaches -- 2.3.3. Infrastructure-based mix-zone approach -- 2.3.4. The cooperation approach (distributed mix-zone) -- 2.3.5. Hybrid approach -- 2.4. Authentication issues in vehicular networks -- 2.4.1. What is being authenticated in vehicular networks? -- 2.4.2. Authentication types -- 2.4.3. How does authentication risk privacy? -- 2.5. Identity privacy preservation authentication solutions: state of the art -- 2.6. Conclusion -- Chapter 3. Security and Privacy Evaluation Methodology -- 3.1. Introduction -- 3.2. Evaluation methodology -- 3.2.1. Security -- 3.2.2. Privacy -- 3.3. Conclusion -- Chapter 4. The Attacker Model -- 4.1. Introduction -- 4.2. Security objectives.
4.3. Security challenges -- 4.4. Security attacker -- 4.4.1. Aims -- 4.4.2. Types -- 4.4.3. Means -- 4.4.4. Attacks -- 4.4.5. Our attacker model -- 4.5. Conclusion -- Chapter 5. Privacy-preserving Authentication in Cloud-enabled Vehicle Data Named Networks (CVDNN) for Resources Sharing -- 5.1. Introduction -- 5.2. Background -- 5.2.1. Vehicular clouds -- 5.2.2. Vehicular data named networks -- 5.3. System description -- 5.4. Forming cloud-enabled vehicle data named networks -- 5.5. Migrating the local cloud virtual machine to the central cloud -- 5.6. Privacy and authentication when using/providing CVDNN services -- 5.6.1. The authentication process -- 5.6.2. The reputation testimony -- 5.7. The privacy in CVDNN -- 5.8. Discussion and analysis -- 5.8.1. The privacy when joining the VC -- 5.8.2. Privacy while using the VC -- 5.9. Conclusion -- Chapter 6. Privacy-preserving Authentication Scheme for On-road On-demand Refilling of Pseudonym in VANET -- 6.1. Introduction -- 6.2. Network model and system functionality -- 6.2.1. Network model -- 6.2.2. The system functionality -- 6.3. Proposed scheme -- 6.4. Analysis and discussion -- 6.4.1. Security analysis -- 6.4.2. Burrows, Abadi and Needham (BAN) logic -- 6.4.3. SPAN and AVISPA tools -- 6.5. Conclusion -- Chapter 7. Preserving the Location Privacy of Vehicular Ad hoc Network Users -- 7.1. Introduction -- 7.2. Adversary model -- 7.3. Proposed camouflage-based location privacy-preserving scheme -- 7.3.1. Analytical model -- 7.3.2. Simulation -- 7.4. Proposed hybrid pseudonym change strategy -- 7.4.1. Hypothesis and assumptions -- 7.4.2. Changing the pseudonyms -- 7.4.3. The simulation -- 7.5. Conclusion -- Chapter 8. Preserving the Location Privacy of Internet of Vehicles Users -- 8.1. Introduction -- 8.2. CE-IoV -- 8.3. Privacy challenges -- 8.4. Attacker model. 8.5. CLPPS: cooperative-based location privacy-preserving scheme for Internet of vehicles -- 8.5.1. Simulation -- 8.5.2. Comparative study and performance analysis -- 8.6. CSLPPS: concerted silence-based location privacy-preserving scheme for Internet of vehicles -- 8.6.1. The proposed solution -- 8.6.2. Simulation results -- 8.6.3. Comparative study performance analysis -- 8.7. Obfuscation-based location privacy-preserving scheme in cloud-enabled Internet of vehicles -- 8.7.1. The proposition -- 8.7.2. Study of feasibility using game theoretic approach -- 8.7.3. The simulation -- 8.7.4. Analytical model -- 8.7.5. Comparative study -- 8.8. Conclusion -- Chapter 9. Blockchain-based Privacy-aware Pseudonym Management Framework for Vehicular Networks -- 9.1. Introduction -- 9.2. Background -- 9.2.1. Public key infrastructure (PKI) -- 9.2.2. Vehicular PKI -- 9.2.3. Blockchain technology -- 9.2.4. Blockchain of blockchains -- 9.3. Related works -- 9.3.1. Blockchain-based PKI -- 9.3.2. Privacy-aware blockchain-based PKI -- 9.3.3. Monero -- 9.3.4. Blockchain-based vehicular PKI -- 9.4. Key concepts -- 9.4.1. Ring signature -- 9.4.2. One-time address -- 9.5. Proposed solution -- 9.5.1. General description -- 9.5.2. Registration to the blockchain -- 9.5.3. Certifying process -- 9.5.4. Revocation process -- 9.5.5. Transaction structure and validation -- 9.5.6. Block structure and validation -- 9.5.7. Authentication using blockchain -- 9.6. Analysis -- 9.7. Comparative study -- 9.8. Conclusion -- Conclusion -- References -- Index -- EULA. |
Record Nr. | UNINA-9910829807103321 |
Benarous Leila | ||
Hoboken, NJ : , : John Wiley & Sons, Inc., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Studies on urban vehicular ad-hoc networks / / Hongzi Zhu, Minglu Li |
Autore | Zhu Hongzi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York, : Springer, 2013 |
Descrizione fisica | 1 online resource (ix, 124 pages) : illustrations (some color) |
Disciplina | 388.4132 |
Altri autori (Persone) | LiMinglu |
Collana | Springer briefs in computer science |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Ad hoc networks (Computer networks) |
ISBN | 1-4614-8048-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Overview -- Dealing with Vehicular Traces -- Realistic Vehicular Mobility Models -- Opportunistic Routing Protocols -- Vehicle Tracking -- Traffic Condition Sensing Application. |
Record Nr. | UNINA-9910437562503321 |
Zhu Hongzi | ||
New York, : Springer, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
V2V/V2I communications for improved road safety and efficiency / / edited by Ronald K. Jurgen |
Pubbl/distr/stampa | Warrendale, Pennsylvania : , : SAE International, , 2012 |
Descrizione fisica | 1 online resource (vii, 175 pages) : illustrations |
Disciplina | 629.276 |
Collana | SAE International progress in technology series |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Automobiles - Safety measures |
Soggetto genere / forma | Electronic books. |
ISBN | 0-7680-8704-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910467673903321 |
Warrendale, Pennsylvania : , : SAE International, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
V2V/V2I communications for improved road safety and efficiency / / edited by Ronald K. Jurgen |
Pubbl/distr/stampa | Warrendale, Pennsylvania : , : SAE International, , 2012 |
Descrizione fisica | 1 online resource (vii, 175 pages) : illustrations |
Disciplina | 629.276 |
Collana | SAE International progress in technology series |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Automobiles - Safety measures |
ISBN | 0-7680-8704-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New driver accident avoidance aids are on the way / Ronald K. Jurgen -- On the cusp of connected cars / Steven Ashley -- BMW demonstrates left-turn drivers' aid / Steven Ashley -- Safer cars talk to each other / Steven Ashley -- V2V, GPS integration could improve safety / Terry Costlow -- Debating IntelliDrive's future / Terry Costlow -- An autonomous and car-following system via DRC communication / Chan Wei Hsu ... [et al.] -- DSRC performance comparison with and without antenna diversity using different transmission power / Sue Bai and Radovan Miucic -- Reliability and safety/integrity analysis for vehicle-to-vehicle wireless communication / Arkadeb Ghosal ... [et al.] -- Multi-sensor system for vehicle positioning in dense urban areas / Zeljiko Popovic, Andrey Soloviev and Yutaka Mochizuki -- Vehicle safety communications, applications, mutliple on-board equipment testing / Fair Ahmed-Zaid ... [et al.] -- Understanding driver perceptions of a vehicle to vehicle (V2V) communication system useing a test track demonstration / Christopher Edwards ... [et al.] -- Vehicle safety communications, applications, system design & objective testing results / Farid Ahmed-Zaid ... [et al.] -- Vehicular networks for collision avoidance at intersections / Seyed Reza Azimi ... [et al.] -- Integrating in-vehicle safety with dedicated short range communications for intersection collision avoidance / Craig Robinson and Luca Delgrossi -- Intelligent vehicle technologies that imprvoe safety, congestion, and efficiency / Eric C. Sauck -- Prioritized CSMA protocol for roadside-to-vehicle and vehicle-to-vehicle communication systems / Jun Kosai ... [et al.] -- Communication in future vehicle cooperative safety systems / Radovan Miucic and Tom Schaffnit. |
Record Nr. | UNINA-9910795061103321 |
Warrendale, Pennsylvania : , : SAE International, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
V2V/V2I communications for improved road safety and efficiency / / edited by Ronald K. Jurgen |
Pubbl/distr/stampa | Warrendale, Pennsylvania : , : SAE International, , 2012 |
Descrizione fisica | 1 online resource (vii, 175 pages) : illustrations |
Disciplina | 629.276 |
Collana | SAE International progress in technology series |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Automobiles - Safety measures |
ISBN | 0-7680-8704-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New driver accident avoidance aids are on the way / Ronald K. Jurgen -- On the cusp of connected cars / Steven Ashley -- BMW demonstrates left-turn drivers' aid / Steven Ashley -- Safer cars talk to each other / Steven Ashley -- V2V, GPS integration could improve safety / Terry Costlow -- Debating IntelliDrive's future / Terry Costlow -- An autonomous and car-following system via DRC communication / Chan Wei Hsu ... [et al.] -- DSRC performance comparison with and without antenna diversity using different transmission power / Sue Bai and Radovan Miucic -- Reliability and safety/integrity analysis for vehicle-to-vehicle wireless communication / Arkadeb Ghosal ... [et al.] -- Multi-sensor system for vehicle positioning in dense urban areas / Zeljiko Popovic, Andrey Soloviev and Yutaka Mochizuki -- Vehicle safety communications, applications, mutliple on-board equipment testing / Fair Ahmed-Zaid ... [et al.] -- Understanding driver perceptions of a vehicle to vehicle (V2V) communication system useing a test track demonstration / Christopher Edwards ... [et al.] -- Vehicle safety communications, applications, system design & objective testing results / Farid Ahmed-Zaid ... [et al.] -- Vehicular networks for collision avoidance at intersections / Seyed Reza Azimi ... [et al.] -- Integrating in-vehicle safety with dedicated short range communications for intersection collision avoidance / Craig Robinson and Luca Delgrossi -- Intelligent vehicle technologies that imprvoe safety, congestion, and efficiency / Eric C. Sauck -- Prioritized CSMA protocol for roadside-to-vehicle and vehicle-to-vehicle communication systems / Jun Kosai ... [et al.] -- Communication in future vehicle cooperative safety systems / Radovan Miucic and Tom Schaffnit. |
Record Nr. | UNINA-9910817112203321 |
Warrendale, Pennsylvania : , : SAE International, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
VANET : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth P. Laberteaux [editors] |
Pubbl/distr/stampa | Chichester, U.K. : , : Wiley, , 2010 |
Descrizione fisica | 1 online resource (467 p.) |
Disciplina | 388.3/12 |
Altri autori (Persone) |
HartensteinHannes
LaberteauxKenneth |
Collana |
Intelligent transport systems
Intelligent transportation systems |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Computer networks |
ISBN |
1-282-38045-1
9786612380457 0-470-74063-9 0-470-74062-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Foreword -- About the Editors -- Preface -- Acknowledgements -- List of Contributors -- 1 Introduction (Hannes Hartenstein and Kenneth P. Laberteaux). -- 1.1 Basic Principles and Challenges -- 1.2 Past and Ongoing VANET Activities -- 1.3 Chapter Outlines -- 1.4 References -- 2 Cooperative Vehicular Safety Applications (Derek Caveney) -- 2.1 Introduction -- 2.2 Enabling Technologies -- 2.3 Cooperative System Architecture -- 2.4 Mapping for Safety Applications -- 2.5 VANET-enabled Active Safety Applications -- 2.6 References -- 3 Information Dissemination in VANETs (Christian Lochert, Bjorn Scheuermann and Martin Mauve) -- 3.1 Introduction -- 3.2 Obtaining Local Measurements -- 3.3 Information Transport -- 3.4 Summarizing Measurements -- 3.5 Geographical Data Aggregation -- 3.6 Conclusion -- 3.7 References -- 4 VANET Convenience and Efficiency Applications (Martin Mauve and Bjorn Scheruermann) -- 4.1 Introduction -- 4.2 Limitations -- 4.3 Applications -- 4.4 Communication Paradigms -- 4.5 Probabilistic, Area-based Aggregation -- 4.6 Travel Time Aggregation -- 4.7 Conclusion -- 4.8 References -- 5 Vehicular Mobility Modeling for VANETs (Jřm̥e Hr̃ri) -- 5.1 Introduction -- 5.2 Notation Description -- 5.3 Random Models -- 5.4 Flow Models -- 5.5 Traffic Models -- 5.6 Behavioral Models -- 5.7 Trace or Survey-based Models -- 5.8 Integration with Network Simulators -- 5.9 A Design Framework for Realistic Vehicular Mobility Models -- 5.10 Discussion and Outlook -- 5.11 Conclusion -- 5.12 References -- 6 Physical Layer Considerations for Vehicular Communications (Ian Tan and Ahmad Bahai) -- 6.1 Standards Overview -- 6.2 Previous Work -- 6.3 Wireless Propagation Theory -- 6.4 Channel Metrics -- 6.5 Measurement Theory -- 6.6 Emperical Channel Characterization at 5.9 GHz -- 6.7 Future Directions -- 6.8 Conclusion -- 6.9 Appendix: Deterministic Multipath Channel Derivations -- 6.10 Appendix: LTV Channel Response -- 6.11 Appendix: Measurement Theory Details -- 6.12 References.
7 MAC Layer and Scalability Aspects of Vehicular Communication Networks (Jens Mittag, Felix Schmidt-Eisenlohr, Moritz Killat, Marc Torrent-Moreno and Hannes Hartenstein) -- 7.1 Introduction: Challenges and Requirements -- 7.2 A Survey on Proposed MAC Approaches for VANETs -- 7.3 Communication Based on IEEE 802.11p -- 7.4 Performance Evaluation and Modeling -- 7.5 Aspects of Congestion Control -- 7.6 Open Issues and Outlook -- 7.7 References -- 8 Efficient Application Level Message Coding and Composition (Craig L Robinson) -- 8.1 Introduction to the Application Environment -- 8.2 Message Dispatcher -- 8.3 Example Applications -- 8.4 Data Sets -- 8.5 Predictive Coding -- 8.6 Architecture Analysis -- 8.7 Conclusion -- 8.8 References -- 9 Data Security in Vehicular Communication Networks (AndrW̌eimerskirch, Jason J Haas, Yih-Chun Hu and Kenneth P Laberteaux) -- 9.1 Introduction -- 9.2 Challenges of Data Security in Vehicular Networks -- 9.3 Network, Applications, and Adversarial Model -- 9.4 Security Infrastructure -- 9.5 Cryptographic Protocols -- 9.6 Privacy Protection Mechanisms -- 9.7 Implementation Aspects -- 9.8 Outlook and Conclusions -- 9.9 References -- 10 Standards and Regulations (John B Kenney) -- 10.1 Introduction -- 10.2 Layered Architecture for VANETs -- 10.3 DSRC Regulations -- 10.4 DSRC Physical Layer Standard -- 10.5 DSRC Data Link Layer Standard (MAC and LLC) -- 10.6 DSRC Middle Layers -- 10.7 DSRC Message Sublayer -- 10.8 Summary -- 10.9 Abbreviations and Acronyms -- 10.10 References -- Index. |
Record Nr. | UNINA-9910139539403321 |
Chichester, U.K. : , : Wiley, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
VANET : proceedings of the Second ACM International Workshop on Vehicular Ad Hoc Networks, held in conjunction with MobiCom 2005, September 2, 2005, Cologne, Germany |
Pubbl/distr/stampa | [Place of publication not identified], : ACM Press, 2005 |
Descrizione fisica | 1 online resource (106 p.;) |
Disciplina | 004.165 |
Collana | ACM Conferences |
Soggetto topico |
Mobile computing
Vehicular ad hoc networks (Computer networks) Wireless communication systems Engineering & Applied Sciences Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | VANET '05 |
Record Nr. | UNINA-9910375924003321 |
[Place of publication not identified], : ACM Press, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
VANETs : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth Laberteaux, editors |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Chichester, West Sussex, U.K. ; ; Hoboken, NJ, : Wiley, 2010 |
Descrizione fisica | 1 online resource (467 p.) |
Disciplina | 388.3/12 |
Altri autori (Persone) |
HartensteinHannes
LaberteauxKenneth |
Collana |
Intelligent transport systems
Intelligent transportation systems |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Computer networks |
ISBN |
1-282-38045-1
9786612380457 0-470-74063-9 0-470-74062-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Foreword -- About the Editors -- Preface -- Acknowledgements -- List of Contributors -- 1 Introduction (Hannes Hartenstein and Kenneth P. Laberteaux). -- 1.1 Basic Principles and Challenges -- 1.2 Past and Ongoing VANET Activities -- 1.3 Chapter Outlines -- 1.4 References -- 2 Cooperative Vehicular Safety Applications (Derek Caveney) -- 2.1 Introduction -- 2.2 Enabling Technologies -- 2.3 Cooperative System Architecture -- 2.4 Mapping for Safety Applications -- 2.5 VANET-enabled Active Safety Applications -- 2.6 References -- 3 Information Dissemination in VANETs (Christian Lochert, Bjorn Scheuermann and Martin Mauve) -- 3.1 Introduction -- 3.2 Obtaining Local Measurements -- 3.3 Information Transport -- 3.4 Summarizing Measurements -- 3.5 Geographical Data Aggregation -- 3.6 Conclusion -- 3.7 References -- 4 VANET Convenience and Efficiency Applications (Martin Mauve and Bjorn Scheruermann) -- 4.1 Introduction -- 4.2 Limitations -- 4.3 Applications -- 4.4 Communication Paradigms -- 4.5 Probabilistic, Area-based Aggregation -- 4.6 Travel Time Aggregation -- 4.7 Conclusion -- 4.8 References -- 5 Vehicular Mobility Modeling for VANETs (Jřm̥e Hr̃ri) -- 5.1 Introduction -- 5.2 Notation Description -- 5.3 Random Models -- 5.4 Flow Models -- 5.5 Traffic Models -- 5.6 Behavioral Models -- 5.7 Trace or Survey-based Models -- 5.8 Integration with Network Simulators -- 5.9 A Design Framework for Realistic Vehicular Mobility Models -- 5.10 Discussion and Outlook -- 5.11 Conclusion -- 5.12 References -- 6 Physical Layer Considerations for Vehicular Communications (Ian Tan and Ahmad Bahai) -- 6.1 Standards Overview -- 6.2 Previous Work -- 6.3 Wireless Propagation Theory -- 6.4 Channel Metrics -- 6.5 Measurement Theory -- 6.6 Emperical Channel Characterization at 5.9 GHz -- 6.7 Future Directions -- 6.8 Conclusion -- 6.9 Appendix: Deterministic Multipath Channel Derivations -- 6.10 Appendix: LTV Channel Response -- 6.11 Appendix: Measurement Theory Details -- 6.12 References.
7 MAC Layer and Scalability Aspects of Vehicular Communication Networks (Jens Mittag, Felix Schmidt-Eisenlohr, Moritz Killat, Marc Torrent-Moreno and Hannes Hartenstein) -- 7.1 Introduction: Challenges and Requirements -- 7.2 A Survey on Proposed MAC Approaches for VANETs -- 7.3 Communication Based on IEEE 802.11p -- 7.4 Performance Evaluation and Modeling -- 7.5 Aspects of Congestion Control -- 7.6 Open Issues and Outlook -- 7.7 References -- 8 Efficient Application Level Message Coding and Composition (Craig L Robinson) -- 8.1 Introduction to the Application Environment -- 8.2 Message Dispatcher -- 8.3 Example Applications -- 8.4 Data Sets -- 8.5 Predictive Coding -- 8.6 Architecture Analysis -- 8.7 Conclusion -- 8.8 References -- 9 Data Security in Vehicular Communication Networks (AndrW̌eimerskirch, Jason J Haas, Yih-Chun Hu and Kenneth P Laberteaux) -- 9.1 Introduction -- 9.2 Challenges of Data Security in Vehicular Networks -- 9.3 Network, Applications, and Adversarial Model -- 9.4 Security Infrastructure -- 9.5 Cryptographic Protocols -- 9.6 Privacy Protection Mechanisms -- 9.7 Implementation Aspects -- 9.8 Outlook and Conclusions -- 9.9 References -- 10 Standards and Regulations (John B Kenney) -- 10.1 Introduction -- 10.2 Layered Architecture for VANETs -- 10.3 DSRC Regulations -- 10.4 DSRC Physical Layer Standard -- 10.5 DSRC Data Link Layer Standard (MAC and LLC) -- 10.6 DSRC Middle Layers -- 10.7 DSRC Message Sublayer -- 10.8 Summary -- 10.9 Abbreviations and Acronyms -- 10.10 References -- Index. |
Record Nr. | UNINA-9910826431203321 |
Chichester, West Sussex, U.K. ; ; Hoboken, NJ, : Wiley, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|