2019
DOI: 10.1109/access.2019.2945610
|View full text |Cite
|
Sign up to set email alerts
|

A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles

Abstract: The advancements in hardware technologies have driven the evolution of vehicular ad hoc networks into the Internet of Vehicles (IoV). The IoV is a decentralized network of IoT-enabled vehicles capable of smooth traffic flow to perform fleet management and accident avoidance. The IoV has many commercial applications due to improved security and safety on the roads. However, the rapidly increasing number of wireless applications have challenged the existing spectrum bands allocated to IoV. The IoV has only six c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…Finally, a mathematical model is used for recommending a customized IoT solution for each individual. In [ 78 ], the authors proposed a disease prediction system by performing the real-time Electrocardiograph (ECG) analysis. Firstly, the proposed approach analyzes and classifies the ECG waveforms that are captured in real-time from the ECG monitoring devices using various ML classifiers such as KNN and bagged tree.…”
Section: A Taxonomy Of Machine Learning Techniques For Big Data Analymentioning
confidence: 99%
“…Finally, a mathematical model is used for recommending a customized IoT solution for each individual. In [ 78 ], the authors proposed a disease prediction system by performing the real-time Electrocardiograph (ECG) analysis. Firstly, the proposed approach analyzes and classifies the ECG waveforms that are captured in real-time from the ECG monitoring devices using various ML classifiers such as KNN and bagged tree.…”
Section: A Taxonomy Of Machine Learning Techniques For Big Data Analymentioning
confidence: 99%
“…reat intelligence can be minimized in dynamic malware analysis using a decision tree to examine behavior and overcome security risks [13]. In the decentralized web of networks, cognitive radio gives optimal results that employ the hidden Markov model to dedicate direct short range communication channels for transmission [14,15]. Maintain the quality of service in multihop communication to detect Sybil attack; whereas for this purpose, QoS-aware secure communication technique can be easily deployed using Internet of thingsbased networks, which can be performed on large scale data [16].…”
Section: Related Surveymentioning
confidence: 99%
“…The CR permits unlicensed SUs to utilize spectrum in an opportunistic way, without interfering with the communication of licensed PUs. [11][12][13] In our study, each rescue team member or worker in danger has a WBAN with CR capabilities. So, the rescue team members and workers in danger are able to send their WBAN data (EEG, EMG, Blood saturation, Temperature, etc.)…”
Section: Cw Cw Minmentioning
confidence: 99%