Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.
The predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the
... Show MoreThe paper deals with the traveling wave cylindrical heating systems. The analysis presented is analytical and a multi-layer model using cylindrical geometry is used to obtain the theoretical results. To validate the theoretical results, a practical model is constructed, tested and the results are compared with the theoretical ones. Comparison showed that the adopted analytical method is efficient in describing the performance of such induction heating systems.
Measurements of Hall effect properties at different of annealing temperature have been made on polycrystalline Pb0.55S0.45 films were prepared at room temperature by thermal evaporation technique under high vacuum 4*10-5 torr . The thickness of the film was 2?m .The carrier concentration (n) was observed to decrease with increasing the annealing temperature. The Hall measurements showed that the charge carriers are electrons (i.e n-type conduction). From the observed dependence on the temperature, it is found that the Hall mobility (µH), drift velocity ( d) carrier life time ( ), mean free path (?) were increased with increasing annealing temperature
<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi
... Show MoreIn this research, we make an attempt to derive theoretically 1-D linear dispersion relation of ion-acoustic waves in uniform unmagnetized dusty plasma valid in the long wavelength limits. This equation matched previously special equation of acoustic modes of a general form in magnetized dusty plasma. Depending on previously mentioned experimental data, we numerically consider various parameters that affect the properties of these waves in dusty plasma. The study has shown that the presence of dust grains is to modify the properties of ion acoustic waves and affect the behavior of the plasma in which they are immersed.