首页    期刊浏览 2025年12月20日 星期六
登录注册

文章基本信息

  • 标题:Proposed Potential Security Infrastructure in VANETS using Tamper Registered Hardware
  • 其他标题:Proposed Potential Security Infrastructure in VANETS using Tamper Registered Hardware
  • 本地全文:下载
  • 作者:Shaik Mahaboob Jani ; Syed Umar
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2016
  • 卷号:6
  • 期号:1
  • 页码:344-348
  • DOI:10.11591/ijece.v6i1.pp344-348
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:All over the world many road accidents are occurred due to lack of knowledge of vehicle`s distance and speed. But this issue will be solved by using VANETS through which we can well know about the speed of the vehicle and how much distance it is from other vehicles in all sides. So the VANETS will play a very crucial role in the safety and mostly avoidance of accidents like reacting immediately in dangerous situations. In order to prevent the abuse of VANETS a potential security infrastructure is needed to maintain confidential requirements like message integrity & availability. To achieve this we have proposed a concept called A seperate Potential security infrastructure facilitated with symmetric & Asymmetric cryptography with TRH. Our proposed theory will give very high efficient in terms of Computational Needs for the VANETS users.
  • 其他摘要:All over the world many road accidents are occurred due to lack of knowledge of vehicle`s distance and speed. But this issue will be solved by using VANETS through which we can well know about the speed of the vehicle and how much distance it is from other vehicles in all sides. So the VANETS will play a very crucial role in the safety and mostly avoidance of accidents like reacting immediately in dangerous situations. In order to prevent the abuse of VANETS a potential security infrastructure is needed to maintain confidential requirements like message integrity & availability. To achieve this we have proposed a concept called A seperate Potential security infrastructure facilitated with symmetric & Asymmetric cryptography with TRH. Our proposed theory will give very high efficient in terms of Computational Needs for the VANETS users.
  • 关键词:Computer Science and Engineering; Computer Science and Engineering;Network Security
国家哲学社会科学文献中心版权所有