Named‐Data Network based secure communication strategy for smart cities

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GPS Based Secure Communication Strategy For Vehicular Ad Hoc Networks

Now a day, one of the most attractive research topics in the area of Intelligent Traffic Control is Inter vehicle communication. In V2V communication or we can also call VANET i.e. Vehicular ad-hoc network; a vehicle can communicate with its neighboring vehicles even in the absence of a central Base Station. The concept of this shortest communication is to send vehicle safety messages one-to-on...

متن کامل

Interoperability issues on heterogeneous wireless communication for smart cities

Keywords: Smart cities Heterogeneous wireless communication Architecture Low cost Interoperability a b s t r a c t Smart cities have become a reality around the world. They rely on wireless communication technologies, and they have provided many benefits to society, such as monitoring road traffic in real-time, giving continuous healthcare assistance to residents and managing the environment. T...

متن کامل

Smart Cities and Languages: The Language Network

This paper intends to analyze the potential of smart cities from a linguistic perspective, with particular attention towards aspects such as second language acquisition (SLA), social inclusion and innovation, but also positive influences on sectors such as tourism and commerce. After an introduction of the theoretical foundations, the possible developing scenarios will be taken into considerati...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Internet Technology Letters

سال: 2020

ISSN: 2476-1508,2476-1508

DOI: 10.1002/itl2.211