2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) 2019
DOI: 10.1109/camad.2019.8858432
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of a Fog Computing-Based, Driving Behaviour Monitoring Framework

Abstract: Recent technological improvements in vehicle manufacturing may greatly improve safety however, the individuals' driving behaviour still remains a factor of paramount importance with aggressiveness, lack of focus and carelessness being the main cause of the majority of traffic incidents. The imminent deployment of 5G networking infrastructure, paired with the advent of Fog computing and the establishment of the Internet of Things (IoT) as a reliable and cost-effective service delivery framework may provide the … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Its nodes are intermediates for providing security and sensor management capabilities, such as deep packet inspection or message encryption and benefiting from context and location-related information to easily detect threats [62]. Without a doubt, resource-constrained device protection and security update delivery to the very end of distributed system nodes, in a trustworthy manner without causing intolerable disruptions, increase the overall efficiency and performance of the system to a whole new level [63].…”
Section: Fog Computingmentioning
confidence: 99%
“…Its nodes are intermediates for providing security and sensor management capabilities, such as deep packet inspection or message encryption and benefiting from context and location-related information to easily detect threats [62]. Without a doubt, resource-constrained device protection and security update delivery to the very end of distributed system nodes, in a trustworthy manner without causing intolerable disruptions, increase the overall efficiency and performance of the system to a whole new level [63].…”
Section: Fog Computingmentioning
confidence: 99%