
Vehicular Ad-Hoc Networks: Applications and Technology
Beschreibung
Weitere Details
Weitere Ausgaben
Inhalt
- Intro
- Contents
- Preface
- Chapter 1
- Role of Position-Based Routing Protocols for Different Applications of VANET
- Abstract
- 1. Introduction
- 2. Communication Model for Vanet
- 3. Routing Protocol for Vanet
- 3.1. Topology Based Routing Protocol
- 3.1.1. Proactive Routing Protocols
- 3.1.2. Reactive Routing Protocols
- 3.1.3. Hybrid Routing Protocols
- 3.2. Position-Based Routing Protocols
- 3.3. Cluster-Based Routing Protocols
- 3.4. Geo Cast Based Routing Protocols
- 3.5. Broadcast Based Routing Protocols
- 4. Position-Based VANET Routing Protocol
- 4.1. Non-Delay Tolerant Network
- 4.1.1. Beacon Based Position-Based Routing Protocol
- 4.1.1.1. Greedy Perimeter Stateless Routing (GPSR)
- 4.1.1.2. Geographic Source Routing (GSR)
- 4.1.1.3. Anchor Based Street and Traffic-Aware Routing (A-STAR)
- 4.1.1.4. Greedy Perimeter Coordinator Routing (GPCR)
- 4.1.1.5. Connectivity Aware Routing protocol (CAR)
- 4.1.2. Non-Beacon Based Position-Based Routing Protocol
- 4.1.2.1. Contention Based Forwarding (CBF)
- 4.1.3. Hybrid Routing Protocol
- 4.1.3.1. Topology Assist Geo Opportunistic Routing (TO-GO)
- 4.2. Delay Tolerant Network
- 4.2.1. Vehicle Assisted Data Delivery (VADD)
- 4.2.2. Reactive Pseudo-Suboptimal-Path Selection Routing (RPS)
- 4.3. Hybrid Network
- 4.3.1. GeoDTN + NAV
- 4.3.2. Connectivity Aware Minimum Delay Geographic Routing Protocol (CMGR)
- Conclusion and Future Scope
- References
- Chapter 2
- Elliptic Curve Cryptography in Intelligent Transport Systems
- Abstract
- Introduction
- ITS Applications and Security
- Security in ITS
- Elliptic Curve Cryptography
- Elliptic Curve
- Domain Parameters of the Elliptic Curve
- Point Addition and Point Multiplication
- Different Multiplication Techniques
- Proposed Architecture
- Endomorphism
- Efficient Usage of Endomorphism in ECDSA
- Calculations Using Endomorphism
- Point Adder
- Point Multiplier
- LUT Main
- Proposed Architecture for =
- Total Delay
- Architecture for =
- U1-k Module
- Results
- Validation Results
- Computational Time Analysis
- Memory Utilization
- Comparison with Other Implementations
- Discussion
- Conclusion and Future Work
- References
- Chapter 3
- Exploitation of Network Coding in On-Demand Wireless Data Broadcast
- Chapter 4
- Fault Diagnosis Techniques for Mobile Wireless Networks
- Abstract
- Introduction
- Unreliable Wireless Connections
- Dynamic and Arbitrary Network Topology
- Resource Limitations
- Minimum Bandwidth Usage
- Distributed Diagnosis
- Adaptable
- Scalability
- Heterogeneous
- Self-Diagnosis
- Dependability: Attributes, Threats, and Means
- Availability
- Reliability
- Safety
- Integrity
- Maintainability
- Fault Prevention Techniques
- Fault Tolerance Techniques
- Fault Removal Techniques
- Fault Forecasting Techniques
- Fault Diagnosis
- Fault Diagnosis Techniques
- Test-Based Techniques
- Invalidation-Based Models
- Comparison-Based Models
- Watchdog Techniques
- Self-Checking Techniques
- Heartbeat-Based Techniques
- Replication with Voting Techniques
- Model-Based Techniques
- Concluding Remarks
- System-Level Fault Diagnosis
- Faults Classification under System-Level Diagnosis
- System-Level Diagnosis Terminologies and Concepts
- Comparison-Based Fault Diagnosis for Wireless Networks
- Chessa and Santi Diagnostic Model
- Flooding-Based Protocols
- Static-DSDP
- Mobile-DSDP
- Spanning -Tree -Based Protocols
- Dynamic-DSDP
- Adaptive-DSDP
- Hierarchy-DSDP
- Fixed-DSDP
- Vehicle-DSDP
- Flexible-DSDP
- Clustering-Based Protocols
- CBCD
- Hi-DSDP
- NOL-CBDP
- Discussion
- Time-Free Diagnostic Model
- Time-Free-DSDP
- RLNC-DSDP
- Discussion
- Conclusion
- References
- Chapter 5
- Blockchain: Basics, Applications, Challenges and Opportunities
- Abstract
- 1. Introduction
- 2. Blockchain Architecture
- A. Block
- B. Hash of the Block
- C. Time Stamp
- D. Difficulty
- E. Nonce
- F. Block Header
- G. Blockchain Data Structure
- H. Digital Signature
- 3. Consensus Algorithms
- A. Proof of Work (PoW)
- B. Proof of Stake (PoS)
- C. Practical Byzantine Fault Tolerance (PBFT)
- D. Delegated Proof-of-Stake (DPoS)
- E. Proof of Space (PoS)
- F. Proof of Authority
- G. Ripple
- H. Tendermint
- 4. Blockchain Variants
- A. Public Blockchain
- B. Private Blockchain
- 5. Blockchain Versions
- A. Blockchain 1.0
- B. Blockchain 2.0
- C. Blockchain 3.0
- 6. Cryptocurrency
- A. Bitcoin
- B. Bitcoin Cash
- C. Zilliqa
- D. ZCash
- E. USDT
- F. Litecoin
- G. Peercoin
- H. Permacoin
- I. Ethereum
- 7. Blockchain Applications
- A. Internet of Things (IoT)
- B. Blockchain in Big Data
- C. Blockchain in Cloud Computing and Edge Computing
- D. Blockchain in Supply Chain and Logistics
- E. Industry Perspective
- 8. Challenges of Blockchain Technology
- A. Scalability
- B. Security and Privacy Issues
- C. Storage Management
- D. Consensus Performance
- E. Resource Management
- F. Conditions Inflexibility
- G. Lack of Governance, Standards, and Regulations
- Conclusion
- References
- Chapter 6
- Optimal Hole Coverage in the Presence of Dumb Node in Wireless Sensor Networks
- Abstract
- Introduction
- Related Work
- Objective
- Methodology
- Hole Area Calculation
- Finding Sector of a Circle
- Hole Coverage
- State Transition Diagram
- Conclusion
- References
- About the Editors
- Index
- Blank Page
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.