Downloaded from Along with a Cover Letter Containing the Corresponding Author's Details Should Be Sent to Official Journal E-Mail

Total Page:16

File Type:pdf, Size:1020Kb

Downloaded from Along with a Cover Letter Containing the Corresponding Author's Details Should Be Sent to Official Journal E-Mail ComSIS is an international journal published by the ComSIS Consortium ComSIS Consortium: University of Belgrade: University of Novi Sad: Faculty of Organizational Science, Belgrade, Serbia Faculty of Sciences, Novi Sad, Serbia Faculty of Mathematics, Belgrade, Serbia Faculty of Technical Sciences, Novi Sad, Serbia School of Electrical Engineering, Belgrade, Serbia Faculty of Economics, Subotica, Serbia Serbian Academy of Science and Art: Technical Faculty “Mihajlo Pupin”, Zrenjanin, Serbia Mathematical Institute, Belgrade, Serbia University of Montenegro: Union University: Faculty of Economics, Podgorica, Montenegro School of Computing, Belgrade, Serbia EDITORIAL BOARD: Editorial Assistants: Editor-in-Chief: Mirjana Ivanović, University of Novi Sad Vladimir Kurbalija, University of Novi Sad Vice Editor-in-Chief: Ivan Luković, University of Novi Sad Jovana Vidaković, University of Novi Sad Managing Editors: Ivan Pribela, University of Novi Sad Miloš Radovanović, University of Novi Sad Slavica Aleksić, University of Novi Sad Zoran Putnik, University of Novi Sad Srđan Škrbić, University of Novi Sad Miloš Savić, University of Novi Sad Editorial Board: S. Ambroszkiewicz, Polish Academy of Science, Poland Lj. Kašćelan, University of Montenegro, Montenegro P. Andreae, Victoria University, New Zealand Z. Konjović, University of Novi Sad, Serbia Z. Arsovski, University of Kragujevac, Serbia I. Koskosas, University of Western Macedonia, Greece D. Banković, University of Kragujevac, Serbia W. Lamersdorf, University of Hamburg, Germany T. Bell, University of Canterbury, New Zealand T.C. Lethbridge, University of Ottawa, Canada D. Bojić, University of Belgrade, Serbia A. Lojpur, University of Montenegro, Montenegro Z. Bosnić, University of Ljubljana, Slovenia M. Maleković, University of Zagreb, Croatia B. Delibašić, University of Belgrade, Serbia Y. Manolopoulos, Aristotle University, Greece I. Berković, University of Novi Sad, Serbia A. Mishra, Atilim University, Turkey L. Böszörmenyi, University of Clagenfurt, Austria S. Misra, Atilim University, Turkey K. Bothe, Humboldt University of Berlin, Germany N. Mitić, University of Belgrade, Serbia S. Bošnjak, University of Novi Sad, Serbia A. Mitrović, University of Canterbury, New Zealand D. Letić, University of Novi Sad, Serbia N. Mladenović, Serbian Academy of Science, Serbia Z. Budimac, University of Novi Sad, Serbia S. Mrdalj, Eastern Michigan University, USA H.D. Burkhard, Humboldt University of Berlin, Germany G. Nenadić, University of Manchester, UK B. Chandrasekaran, Ohio State University, USA D. Urošević, Serbian Academy of Science, Serbia V. Ćirić, University of Belgrade, Serbia A. Pakstas, London Metropolitan University, UK G. Devedžić, University of Kragujevac, Serbia P. Pardalos, University of Florida, USA V. Devedžić, University of Belgrade, Serbia J. Protić, University of Belgrade, Serbia D. Đurić, University of Belgrade, Serbia M. Racković, University of Novi Sad, Serbia D. Domazet, FIT, Belgrade, Serbia B. Radulović, University of Novi Sad, Serbia J. Đurković, University of Novi Sad, Serbia D. Simpson, University of Brighton, UK G. Eleftherakis, CITY College Thessaloniki, International M. Stanković, University of Niš, Serbia Faculty of the University of Sheffield, Greece D. Starčević, University of Belgrade, Serbia M. Gušev, FINKI, Skopje, FYR Macedonia D. Surla, University of Novi Sad, Serbia S. Guttormsen Schar, ETH Zentrum, Switzerland D. Tošić, University of Belgrade, Serbia P. Hansen, University of Montreal, Canada J. Trninić, University of Novi Sad, Serbia M. Ivković, University of Novi Sad, Serbia M. Tuba, University of Belgrade, Serbia L.C. Jain, University of South Australia, Australia L. Šereš, University of Novi Sad, Serbia D. Janković, University of Niš, Serbia J. Woodcock, University of York, UK V. Jovanović, Georgia Southern University, USA P. Zarate, IRIT-INPT, Toulouse, France Z. Jovanović, University of Belgrade, Serbia K. Zdravkova, FINKI, Skopje, FYR Macedonia L. Kalinichenko, Russian Academy of Scence, Russia ComSIS Editorial Office: University of Novi Sad, Faculty of Sciences, Department of Mathematics and Informatics Trg Dositeja Obradovića 4, 21000 Novi Sad, Serbia Phone: +381 21 458 888; Fax: +381 21 6350 458 www.comsis.org; Email: [email protected] Volume 14, Number 3, 2017 Novi Sad Computer Science and Information Systems Special Issue on Advances in Information Technology, Distributed and Model Driven Systems ISSN: 1820-0214 (Print) 2406-1018 (Online) The ComSIS journal is sponsored by: Ministry of Education, Science and Technological Development of the Republic of Serbia http://www.mpn.gov.rs/ Computer Science and Information Systems AIMS AND SCOPE Computer Science and Information Systems (ComSIS) is an international refereed journal, pub- lished in Serbia. The objective of ComSIS is to communicate important research and development results in the areas of computer science, software engineering, and information systems. We publish original papers of lasting value covering both theoretical foundations of computer science and commercial, industrial, or educational aspects that provide new insights into design and implementation of software and information systems. In addition to wide-scope regular issues, ComSIS also includes special issues covering specific topics in all areas of computer science and information systems. ComSIS publishes invited and regular papers in English. Papers that pass a strict reviewing procedure are accepted for publishing. ComSIS is published semiannually. Indexing Information ComSIS is covered or selected for coverage in the following: Science Citation Index (also known as SciSearch) and Journal Citation Reports / Science ۰ Edition by Thomson Reuters, with 2016 two-year impact factor 0.837, ,(Computer Science Bibliography, University of Trier (DBLP ۰ ,(EMBASE (Elsevier ۰ ,(Scopus (Elsevier ۰ ,(Summon (Serials Solutions ۰ ,EBSCO bibliographic databases ۰ ,IET bibliographic database Inspec ۰ ,FIZ Karlsruhe bibliographic database io-port ۰ ,(Index of Information Systems Journals (Deakin University, Australia ۰ ,(Directory of Open Access Journals (DOAJ ۰ ,Google Scholar ۰ Journal Bibliometric Report of the Center for Evaluation in Education and Science ۰ (CEON/CEES) in cooperation with the National Library of Serbia, for the Serbian Ministry of Education and Science, ,(Serbian Citation Index (SCIndeks ۰ .doiSerbia ۰ Information for Contributors The Editors will be pleased to receive contributions from all parts of the world. An electronic version (MS Word or LaTeX), or three hard-copies of the manuscript written in English, intended for publication and prepared as described in "Manuscript Requirements" (which may be downloaded from http://www.comsis.org), along with a cover letter containing the corresponding author's details should be sent to official journal e-mail. Criteria for Acceptance Criteria for acceptance will be appropriateness to the field of Journal, as described in the Aims and Scope, taking into account the merit of the content and presentation. The number of pages of submitted articles is limited to 20 (using the appropriate Word or LaTeX template). Manuscripts will be refereed in the manner customary with scientific journals before being accepted for publication. Copyright and Use Agreement All authors are requested to sign the "Transfer of Copyright" agreement before the paper may be published. The copyright transfer covers the exclusive rights to reproduce and distribute the paper, including reprints, photographic reproductions, microform, electronic form, or any other reproductions of similar nature and translations. Authors are responsible for obtaining from the copyright holder permission to reproduce the paper or any part of it, for which copyright exists. Computer Science and Information Systems Volume 14, Number 3, Special Issue, September 2017 CONTENTS Editorial Guest Editorial: Advances in Distributed Computing and Data Analysis Guest Editorial: Advances in Information Technology Guest Editorial: Model Driven Approaches in System Development Special Section: Advances in Distributed Computing and Data Analysis 579 Imbalanced Data Classification Based on Hybrid Resampling and Twin Support Vector Machine Lu Cao, Hong Shen 597 Promising Techniques for Anomaly Detection on Network Traffic Hui Tian, Jingtian Liu, Meimei Ding 611 BHyberCube: a MapReduce Aware Heterogeneous Architecture for Data Center Tao Jiang, Huaxi Gu, Kun Wang, Xiaoshan Yu, Yunfeng Lu 629 Click-Boosted Graph Ranking for Image Retrieval Jun Wu, Yu He, Xiaohong Qin, Na Zhao, Yingpeng Sang 643 A Weighted Mutual Information Biclustering Algorithm for Gene Expression Data Yidong Li, Wenhua Liu, Yankun Jia, Hairong Dong 661 An Optimization Scheme for Routing and Scheduling of Concurrent User Requests in Wireless Mesh Networks Zhanmao Cao, Chase Q. Wu, Mark L. Berry Special Section: Advances in Information Technology 685 Construction of Affective Education in Mobile Learning: The Study Based on Learner’s Interest and Emotion Recognition Haijian Chen, Yonghui Dai, Yanjie Feng, Bo Jiang, Jun Xiao, Ben You 703 A Retrieval Algorithm of Encrypted Speech based on Syllable-level Perceptual Hashing Shaofang He, Huan Zhao 719 A Novel Link Quality Prediction Algorithm for Wireless Sensor Networks Chenhao Jia, Linlan Liu, Xiaole Gu, Manlan Liu 735 Connected Model for Opportunistic Sensor Network Based on Katz Centrality Jian Shu, Lei Xu, Shandong Jiang, Lingchong Meng 751 An Improved Artificial Bee Colony Algorithm with Elite-Guided Search Equations
Recommended publications
  • Handheld Computing Terminal Industrializing Mobile Gateway for the Internet of Things
    Handheld Computing Terminal Industrializing Mobile Gateway for the Internet of Things Retail Inventory Logistics Management Internet of Vehicles Electric Utility Inspection www.AMobile-solutions.com About AMobile Mobile Gateway for IIoT Dedicated IIoT, AMobile develops mobile devices and gateways for data collectivity, wireless communications, local computing and processing, and connectivity between the fields and cloud. In addition, AMobile's unified management platform-Node-Watch monitors and manages not only mobile devices but also IoT equipment in real-time to realize industrial IoT applications. Manufacturing • IPC mobile • Mobility computing technology Retail Inspection (IP-6X, Military • Premier member grade, Wide- - early access Blockchain temperature) Healthcare Logistics • Manufacturing resource pool Big Data & AI • Logistics • Global customer support Handheld Mobile Computing Data Collector Smart Meter Mobile Inspection Device with Keyboard Assistant Mobile Computing IoT Terminal Device Ultra-rugged Intelligent Barcode Reader Vehicle Mount Handheld Device Handheld Device Tablet Mobile Gateway AMobile Intelligent established in 2013, a joint venture by Arbor Technology, MediaTek, and Wistron, is Pressure Image an expert in industrial mobile computers and solutions for industrial applications including warehousing, Temperature Velocity Gyroscope logistics, manufacturing, and retail. Leveraging group resources of manufacturing and services from Wistron, IPC know-how and distribution channels from Arbor, mobility technology and
    [Show full text]
  • A Survey of Autonomous Vehicles: Enabling Communication Technologies and Challenges
    sensors Review A Survey of Autonomous Vehicles: Enabling Communication Technologies and Challenges M. Nadeem Ahangar 1, Qasim Z. Ahmed 1,*, Fahd A. Khan 2 and Maryam Hafeez 1 1 School of Computing and Engineering, University of Huddersfield, Huddersfield HD1 3DH, UK; [email protected] (M.N.A.); [email protected] (M.H.) 2 School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad 44000, Pakistan; [email protected] * Correspondence: [email protected] Abstract: The Department of Transport in the United Kingdom recorded 25,080 motor vehicle fatali- ties in 2019. This situation stresses the need for an intelligent transport system (ITS) that improves road safety and security by avoiding human errors with the use of autonomous vehicles (AVs). There- fore, this survey discusses the current development of two main components of an ITS: (1) gathering of AVs surrounding data using sensors; and (2) enabling vehicular communication technologies. First, the paper discusses various sensors and their role in AVs. Then, various communication tech- nologies for AVs to facilitate vehicle to everything (V2X) communication are discussed. Based on the transmission range, these technologies are grouped into three main categories: long-range, medium- range and short-range. The short-range group presents the development of Bluetooth, ZigBee and ultra-wide band communication for AVs. The medium-range examines the properties of dedicated short-range communications (DSRC). Finally, the long-range group presents the cellular-vehicle to everything (C-V2X) and 5G-new radio (5G-NR). An important characteristic which differentiates each category and its suitable application is latency.
    [Show full text]
  • Fog Computing for Detecting Vehicular Congestion, an Internet of Vehicles Based Approach: a Review
    > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Fog Computing for Detecting Vehicular Congestion, An Internet of Vehicles based Approach: A review Arnav Thakur and Reza Malekian, Senior Member, IEEE double by the year 2020 [3]. To enhance the efficiency of the Abstract—Vehicular congestion is directly impacting the transportation sector and reduce the associated economic and efficiency of the transport sector. A wireless sensor network for environmental consequences, an accurate real-time vehicular vehicular clients is used in Internet of Vehicles based solutions traffic congestion identification system is required to be used for traffic management applications. It was found that vehicular in effective traffic management schemes that improve traffic congestion detection by using Internet of Vehicles based connected vehicles technology are practically feasible for flow and utilization of road infrastructure. congestion handling. It was found that by using Fog Computing Vehicular congestion is quantified by using the traffic based principles in the vehicular wireless sensor network, density estimate metric which is the number of vehicles per communication in the system can be improved to support larger unit area [4]. The traffic density estimation techniques use number of nodes without impacting performance. In this paper, parameters that include road occupancy rates, difference of connected vehicles technology based vehicular congestion incoming and outgoing traffic in an observation area, traffic identification techniques are studied. Computing paradigms that can be used for the vehicular network are studied to develop a flow estimation and motion detection and tracking to identify practically feasible vehicular congestion detection system that congestion [5].
    [Show full text]
  • An Intelligent Edge-Chain Enabled Access Control Mechanism For
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3061467, IEEE Internet of Things Journal JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 An Intelligent Edge-Chain Enabled Access Control Mechanism for IoV Yuanni Liu, Man Xiao, Shanzhi Chen, Fellow, IEEE, Fan Bai, Jianli Pan, Member, IEEE, Di Zhang, Senior Member, IEEE Abstract—The current security method of Internet of Vehicles the amounts of vehicles exceed one billion and is expected (IoV) systems is rare, which makes it vulnerable to various to reach two billion by 2035 [6], [7]. As explosive on-road attacks. The malicious and unauthorized nodes can easily in- devices are connecting to Internet, communication security vade the IoV systems to destroy the integrity, availability, and confidentiality of information resources shared among vehicles. becomes a big issue. As we know, the communication security Indeed, access control mechanism can remedy this. However, as method of current IoV devices is rare, making it easy to be a static method, it cannot timely response to these attacks. To attacked. Such malicious attacks include replay, camouflage, solve this problem, we propose an intelligent edge-chain enabled and message tampering attacks et al. [8]. The attacked IoV access control framework with vehicle nodes and RoadSide Units devices may rise potential risks, such as critical electronic (RSUs) in this study. In our scenario, vehicle nodes act as lightweight nodes, whereas RUSs serve as full and edge nodes control unit hacking and control, untrustworthy messages from to provide access control services.
    [Show full text]
  • Position Prediction for Routing in Software Defined Internet of Vehicles
    Journal of Communications Vol. 15, No. 2, February 2020 Position Prediction for Routing in Software Defined Internet of Vehicles Muhammad Ali Jibran1, Muhammad Tahir Abbas2, Adeel Rafiq1, and Wang-Cheol Song1 1, Jeju National University, Jeju, South Korea 2 Karlstad University, Karlstad, Sweden Email: [email protected]; [email protected] Abstract—By the prediction of future location for a vehicle in In the past few years, vehicle to vehicle (V2V) Internet of Vehicles (IoV), data forwarding schemes can be communication gain a lot of attention because of its further improved. Major parameters for vehicle position potential to make our journey comfortable on the roads. prediction includes traffic density, motion, road conditions, and The core requirement of connected cars include a reliable vehicle current position. In this paper, therefore, our proposed and fast communication with very low latency response system enforces the accurate prediction with the help of real- time traffic from the vehicles. In addition, the proposed Neural to and from a service provider. In the meanwhile, it needs Network Model assists Edge Controller and centralized to be more efficient to manage a huge number of requests controller to compute and predict vehicle future position inside simultaneously with no traffic congestion. In ITS, a and outside of the vicinity, respectively. Last but not least, in vehicle on the road always initiates a new connection order to get real-time data, and to maintain a quality of request towards the traffic controller in case of path experience, the edge controller is explored with Software failure. Traffic controller estimates a new path each time Defined Internet of Vehicles.
    [Show full text]
  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
    Computers, Materials & Continua CMC, vol.65, no.1, pp.653-681, 2020 Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song 1, Ruxiang Li 1 and Renhong Diao1 Abstract: The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to verify the accuracy and efficiency of the proposed model, it was evaluated using real vehicle data. The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior. The parameters of the model are self-iteratively updated using the time-based back propagation algorithm. We verified that the model proposed in this study can reach a nearly 96% accurate detection rate. Keywords: Internet of vehicles, safety protection technology, intrusion detection system, advanced auto-encoder, recurrent neural network, time-based back propagation algorithm. 1 Introduction In recent years, intelligent vehicles, a fusion of Internet technology and the machinery manufacturing industry, have resulted in the development of comprehensive information services for travel and daily commutes [Unluturk, Oguz and Atay (2015); Contreras- Castillo, Zeadally and Guerrero-Ibañez (2017)].
    [Show full text]
  • The Concepts of Connected Car and Internet of Cars and Their Impact on Future People Mobility
    INFORMATION SYSTEMS IN MANAGEMENT Information Systems in Management (2017) Vol. 6 (3) 234 −245 THE CONCEPTS OF CONNECTED CAR AND INTERNET OF CARS AND THEIR IMPACT ON FUTURE PEOPLE MOBILITY AGNIESZKA SZMELTER Department of Logistics, University of Gda ńsk (UG) Technological convergence has had a huge impact on development of automo- tive industry. Two main concepts related to mobile technology and the Internet of Things (IoT) in this industry are car connectivity and Internet of Cars (IoC). The ar- ticle aims to present these two concepts with special emphasis on the characteristics of people mobility in future cities. Keywords: automotive, logistics, information logistics, convergence, technological convergence, internet of things, internet of cars, connected car, car connectivity, mobility, public transport. 1. Introduction The global economy, which is currently characterized by development of mo- bile and Internet technologies, is in large part composed of the services sector. A new paradigm appeared: information and communication technologies enable achievement of the economic and / or social objectives by use of cooperation methods (including sharing). ICT contribute to the acceleration of economic recov- ery and the creation of "sustainable digital future" [7]. This paper aims to achieve cognitive objective, which is to present the impact of technological developments in automotive industry (especially the concepts of car connectivity and Internet of Cars) on the development of new people mobility behaviour in cities. The author hypothesizes that technological convergence, pre- sent in currently-sold cars and cars of the future significantly contributes and will contribute to development of new patterns of mobility in cities. The main research method used in the study is analysis of secondary sources, including literature and branch studies made by experts in automotive industry.
    [Show full text]
  • Huawei HCIA-Iot V. 2.5 Evaluation Questions Michel Bakni
    Huawei HCIA-IoT v. 2.5 Evaluation Questions Michel Bakni To cite this version: Michel Bakni. Huawei HCIA-IoT v. 2.5 Evaluation Questions. Engineering school. Huawei HCIA-IoT v. 2.5, Bidart, France. 2021, pp.77. hal-03189245 HAL Id: hal-03189245 https://hal.archives-ouvertes.fr/hal-03189245 Submitted on 2 Apr 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Huawei HCIA-IoT v. 2.5 Evaluation Questions March 2021 Michel BAKNI Author: Michel BAKNI Editor: Sandra HANBO Version: 1.0 , 2021 DOI: 10.6084/m9.figshare.14336687 Copyright notice This work is licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) You are free to: Share — copy and redistribute the material in any medium or format Adapt — remix, transform, and build upon the material for any purpose, even commercially. The licensor cannot revoke these freedoms as long as you follow the license terms: Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
    [Show full text]
  • Internet of Autonomous Vehicles: Architecture, Features, and Socio-Technological Challenges Furqan Jameel, Zheng Chang, Jun Huang, Tapani Ristaniemi
    ACCEPTED IN IEEE WIRELESS COMMUNICATIONS 1 Internet of Autonomous Vehicles: Architecture, Features, and Socio-Technological Challenges Furqan Jameel, Zheng Chang, Jun Huang, Tapani Ristaniemi Abstract Mobility is the backbone of urban life and a vital economic factor in the development of the world. Rapid urbanization and the growth of mega-cities is bringing dramatic changes in the capabilities of vehicles. Innovative solutions like autonomy, electrification, and connectivity are on the horizon. How, then, we can provide ubiquitous connectivity to the legacy and autonomous vehicles? This paper seeks to answer this question by combining recent leaps of innovation in network virtualization with remarkable feats of wireless communications. To do so, this paper proposes a novel paradigm called the Internet of autonomous vehicles (IoAV). We begin painting the picture of IoAV by discussing the salient features, and applications of IoAV which is followed by a detailed discussion on the key enabling technologies. Next, we describe the proposed layered architecture of IoAV and uncover some critical functions of each layer. This is followed by the performance evaluation of IoAV which shows significant advantage of the proposed architecture in terms of transmission time and energy consumption. Finally, to best capture the benefits of IoAV, we enumerate some social and technological challenges and explain how some unresolved issues can disrupt the widespread use of autonomous vehicles in the future. Index Terms Autonomous vehicles, Autonomy, Internet of autonomous vehicles (IoAV), Technological challenges I. INTRODUCTION The development of the automotive landscape in the coming years will be significantly influenced by the global political and economic conditions. The idea of sustainability against the background of dwindling and rapidly increasing supplies of fossil fuels will also be consolidated on a global scale [1].
    [Show full text]
  • An Intrusion Detection System in Connected Vehicles
    electronics Article Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles Francesco Pascale 1,* , Ennio Andrea Adinolfi 2 , Simone Coppola 2 and Emanuele Santonicola 2 1 Department of Energy, Polytechnic of Milan, 20156 Milan, Italy 2 Department of Industrial Engineering, University of Salerno, 84084 Fisciano, Italy; eadinolfi@unisa.it (E.A.A.); [email protected] (S.C.); [email protected] (E.S.) * Correspondence: [email protected] Abstract: Today’s modern vehicles are connected to a network and are considered smart objects of IoT, thanks to the capability to send and receive data from the network. One of the greatest challenges in the automotive sector is to make the vehicle secure and reliable. In fact, there are more connected instruments on a vehicle, such as the infotainment system and/or data interchange systems. Indeed, with the advent of new paradigms, such as Smart City and Smart Road, the vision of Internet of Things has evolved substantially. Today, we talk about the V2X systems in which the vehicle is strongly connected with the rest of the world. In this scenario, the main aim of all connected vehicles vendors is to provide a secure system to guarantee the safety of the drive and persons against a possible cyber-attack. So, in this paper, an embedded Intrusion Detection System (IDS) for the automotive sector is introduced. It works by adopting a two-step algorithm that provides detection of a possible cyber-attack. In the first step, the methodology provides a filter of all the messages on the Controller Area Network (CAN-Bus) thanks to the use of a spatial and temporal Citation: Pascale, F.; Adinolfi, E.A.; analysis; if a set of messages are possibly malicious, these are analyzed by a Bayesian network, which Coppola, S.; Santonicola, E.
    [Show full text]
  • Autonomous Vehicle Technology: a Guide for Policymakers
    Autonomous Vehicle Technology A Guide for Policymakers James M. Anderson, Nidhi Kalra, Karlyn D. Stanley, Paul Sorensen, Constantine Samaras, Oluwatobi A. Oluwatola C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/rr443-2 This revised edition incorporates minor editorial changes. Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-8398-2 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Cover image: Advertisement from 1957 for “America’s Independent Electric Light and Power Companies” (art by H. Miller). Text with original: “ELECTRICITY MAY BE THE DRIVER. One day your car may speed along an electric super-highway, its speed and steering automatically controlled by electronic devices embedded in the road. Highways will be made safe—by electricity! No traffic jams…no collisions…no driver fatigue.” Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous.
    [Show full text]
  • A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network
    sensors Article A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network A. F. M. Suaib Akhter 1 , Mohiuddin Ahmed 2 , A. F. M. Shahen Shah 3 , Adnan Anwar 4 , A. S. M. Kayes 5,* and Ahmet Zengin 1 1 Department of Computer Engineering, Sakarya University, Serdivan 54050, Sakarya, Turkey; [email protected] (A.F.M.S.A.); [email protected] (A.Z.) 2 School of Science, Edith Cowan University, Perth, WA 6027, Australia; [email protected] 3 Department of Electrical and Electronics Engineering, Istanbul Gelisim University, Avcilar 34315, Istanbul, Turkey; [email protected] 4 Centre for Cyber Security Research and Innovation (CSRI), School of IT, Deakin University, Waurn Ponds, VIC 3216, Australia; [email protected] 5 Department of Computer Science and Information Technology, School of Engineering and Mathematical Sciences (SEMS), La Trobe University, Bundoora, VIC 3086, Australia * Correspondence: [email protected] Abstract: The efficiency of cooperative communication protocols to increase the reliability and range of transmission for Vehicular Ad hoc Network (VANET) is proven, but identity verification and communication security are required to be ensured. Though it is difficult to maintain strong network connections between vehicles because of there high mobility, with the help of cooperative communication, it is possible to increase the communication efficiency, minimise delay, packet loss, and Packet Dropping Rate (PDR). However, cooperating with unknown or unauthorized vehicles could result in information theft, privacy leakage, vulnerable to different security attacks, etc. In this paper, a blockchain based secure and privacy preserving authentication protocol is proposed for the Citation: Akhter, A.F.M.S.; Internet of Vehicles (IoV).
    [Show full text]