The basis of vehicular ad hoc networks (VANETs) is the exchange of data between entities, and making a decision on received data/event is usually based on information provided by other entities. Many researchers utilize the concept of trust to assess the trustworthiness of the received data. Nevertheless, the lack of a review to sum up the best available research on specific questions on trust management in vehicular ad hoc networks is sensible. This paper presents a systematic literature review to provide comprehensive and unbiased information about various current trust conceptions, proposals, problems, and solutions in VANETs to increase quality of data in transportation. For the purpose of the writing of this paper, a total of 111 articles related to the trust model in VANETs published between 2005 and 2014 were extracted from the most relevant scientific sources (IEEE Computer Society, ACM Digital Library, Springer Link, Science Direct, and Wiley Online Library). Finally, ten articles were eventually analyzed due to several reasons such as relevancy and comprehensiveness of discussion presented in the articles. Using the systematic method of review, this paper succeeds to reveal the main challenges and requirements for trust in VANETs and future research within this scope.Keywords: Systematic literature review; Trust management; VANET; Trust metric 1 Review IntroductionVehicular ad hoc networks (VANETs) are a class of ad hoc networks that consist of vehicles and roadside units (RSUs). VANETs were originally created to enhance safety on the road using cooperative collision warning via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. In V2V communication, vehicles send and receive messages to and from one another. These messages can alert signals about road congestion, accidents ahead, or information about traffic on a given route. V2I communication takes place between nodes and roadside infrastructure and involves finding the nearest cheapest gas station, internet services, online toll payment, etc.According to [1], the applications in VANETs are categorized into safety and non-safety applications. The basis In order to overcome these threats and increase security, several concepts have been proposed by researchers. Wei and Chen [3] stated that authentication is one method for ensuring the integrity of transmitted messages. In [4], the reputation of a vehicle is introduced to evaluate the reliability of received data. Dotzer et al. also stated that a common method to deal with the safety threats in VANETs is to establish trust relationships and detect selfish and malicious entities [5].Security is one of the main issues in VANETs, and trust is a key element of security [6]. Hence, since VANETs are based upon data exchange among vehicles, trustworthiness of data is of great importance. In addition, data communication between trusted vehicles directly affects
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of applications and technology, as well as security which have also been magnified through the rapid and widespread adoption of IoMT across the globe. A number of on-going researches show the adoption of secure IoMT applications is possible by incorporating security measures with the technology. Furthermore, the development of new IoMT technologies merge with Artificial Intelligence, Big Data and Blockchain offers more viable solutions. Hence, this paper highlights the IoMT architecture, applications, technologies, and security developments that have been made with respect to IoMT in combating COVID-19. Additionally, this paper provides useful insights into specific IoMT architecture models, emerging IoMT applications, IoMT security measurements, and technology direction that apply to many IoMT systems within the medical environment to combat COVID-19.
Background The Internet of Medical Things (IoMTs) is gradually replacing the traditional healthcare system. However, little attention has been paid to their security requirements in the development of the IoMT devices and systems. One of the main reasons can be the difficulty of tuning conventional security solutions to the IoMT system. Machine Learning (ML) has been successfully employed in the attack detection and mitigation process. Advanced ML technique can also be a promising approach to address the existing and anticipated IoMT security and privacy issues. However, because of the existing challenges of IoMT system, it is imperative to know how these techniques can be effectively utilized to meet the security and privacy requirements without affecting the IoMT systems quality, services, and device’s lifespan. Methodology This article is devoted to perform a Systematic Literature Review (SLR) on the security and privacy issues of IoMT and their solutions by ML techniques. The recent research papers disseminated between 2010 and 2020 are selected from multiple databases and a standardized SLR method is conducted. A total of 153 papers were reviewed and a critical analysis was conducted on the selected papers. Furthermore, this review study attempts to highlight the limitation of the current methods and aims to find possible solutions to them. Thus, a detailed analysis was carried out on the selected papers through focusing on their methods, advantages, limitations, the utilized tools, and data. Results It was observed that ML techniques have been significantly deployed for device and network layer security. Most of the current studies improved traditional metrics while ignored performance complexity metrics in their evaluations. Their studies environments and utilized data barely represent IoMT system. Therefore, conventional ML techniques may fail if metrics such as resource complexity and power usage are not considered.
Cloud computing is currently emerging quickly as a clientserver technology structure and, currently, providing distributed service applications. However, given the availability of a diverse range of wireless access technologies, people expect continuous connection to the most suitable technology that matches price affordability and performance goals. Among the main challenges of modern communication is the accessibility to wireless networks using mobile devices, with a high service quality (QoS) based on preferences of the users. Past literatures contain several heuristic approaches that use simplified rules to look for the best network that is available. Nevertheless, attributes of mobile devices need algorithms that are quick and effective in order to select best available network near realtime. This study proposes a hybrid intelligent handover decision algorithm primarily founded on two main heuristic algorithms: Artificial Bee Colony or ABC as well as Particle Swarm Optimization or PSO named ABCPSO to select best wireless network during vertical handover process. The ABCPSO algorithm has been optimized to achieve small cost function that are powered using the IEEE 802.21 standard taking into account different available wireless networks, the application requirements and the user preferences to improve QoS. Numerical results demonstrate that the ABCPSO algorithm compared to the related work has lower cost and delay, higher available bandwidth and less number of handover.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.