Named‐Data Network based secure communication strategy for smart cities
نویسندگان
چکیده
منابع مشابه
GPS Based Secure Communication Strategy For Vehicular Ad Hoc Networks
Now a day, one of the most attractive research topics in the area of Intelligent Traffic Control is Inter vehicle communication. In V2V communication or we can also call VANET i.e. Vehicular ad-hoc network; a vehicle can communicate with its neighboring vehicles even in the absence of a central Base Station. The concept of this shortest communication is to send vehicle safety messages one-to-on...
متن کاملInteroperability issues on heterogeneous wireless communication for smart cities
Keywords: Smart cities Heterogeneous wireless communication Architecture Low cost Interoperability a b s t r a c t Smart cities have become a reality around the world. They rely on wireless communication technologies, and they have provided many benefits to society, such as monitoring road traffic in real-time, giving continuous healthcare assistance to residents and managing the environment. T...
متن کاملSmart Cities and Languages: The Language Network
This paper intends to analyze the potential of smart cities from a linguistic perspective, with particular attention towards aspects such as second language acquisition (SLA), social inclusion and innovation, but also positive influences on sectors such as tourism and commerce. After an introduction of the theoretical foundations, the possible developing scenarios will be taken into considerati...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Internet Technology Letters
سال: 2020
ISSN: 2476-1508,2476-1508
DOI: 10.1002/itl2.211