-
1
Research on Wi-Fi HaLow for the Internet of things
Published 2019-09-01“…The new Wi-Fi standard,named IEEE~802.11ah or Wi-Fi HaLow,is considered as a very promising technology for the Internet of things (IoT),aiming to support large-scale IoT networks in an energy-efficient manner.It is mainly to be used for IoT scenarios,such as smart homes,digital health care,connected cars,industrial process control,logistics &asset management,smart cities,agriculture & environmental sensors,etc.An overview of the IEEE 802.11ah technology and its recent development were provided.The key features were explored,demonstrating that IEEE 802.11ah is suitable for its target use cases.Moreover,a comprehensive summary and analysis of the related work were conducted.Finally,identifies several open research issues that need to be addressed to fully realize the vision of large-scale and low power Wi-Fi networks for the IoT were discussed.…”
Get full text
Article -
2
Multiagent Routing Simulation with Partial Smart Vehicles Penetration
Published 2020-01-01“…The invention and implementation of smart connected cars will change the way how the transportation networks in cities around the world operate. …”
Get full text
Article -
3
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Published 2020-01-01“…Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. Specifically, when a vehicle is connected to an external device through a smartphone inside the vehicle or when a vehicle communicates with external infrastructure, security technology is required to protect the software network inside the vehicle. …”
Get full text
Article -
4
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
Get full text
Article -
5
A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles
Published 2024-01-01“…The Social Internet of Vehicles (SIoV) connects cars that are nearby and uses different types of infrastructure to connect people with shared interests. …”
Get full text
Article