2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) 2015
DOI: 10.1109/ccnc.2015.7157979
|View full text |Cite
|
Sign up to set email alerts
|

Transport and traffic rule violation monitoring service in ITS: A secured VANET cloud application

Abstract: Vehicular Ad-hoc Network (VANET) cloud, a hybrid technology, provides several computational services to minimize traffic congestion, travelling time, accidents, and environmental pollution. In the proposed work, the concept of VANET cloud is used for helping the regulatory authorities in identifying the vehicles violating the traffic rules through sensors included as part of On Board Unit (OBU). When the vehicle is on fly the sensor values are periodically transferred to the cloud, controlled by the traffic po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 8 publications
(6 reference statements)
0
10
0
Order By: Relevance
“…In this paper, to overcome the weakness of Mallissery et al's, we make use of ECC-based conditional privacy preserving authentication (CPPA) technique [5] to provide privacy and authentication of the reporting vehicles. The transmission overhead of the proposed protocol achieves better performance compared to Mallissery et al, [10].…”
Section: Introductionmentioning
confidence: 81%
See 2 more Smart Citations
“…In this paper, to overcome the weakness of Mallissery et al's, we make use of ECC-based conditional privacy preserving authentication (CPPA) technique [5] to provide privacy and authentication of the reporting vehicles. The transmission overhead of the proposed protocol achieves better performance compared to Mallissery et al, [10].…”
Section: Introductionmentioning
confidence: 81%
“…The total cost of the protocol is 9Tmul=0.78 × 9=7.02 milliseconds. In Mallissery et al [10], the PID generation phase and violation reporting requires each 5Tmul+Ts-enc+Ts-dec. The total cost is 10Tmul+2Ts-enc+ 2Ts-dec=9.92 milliseconds.…”
Section: Performancementioning
confidence: 99%
See 1 more Smart Citation
“…To develop more reliable systems, some researchers focus their attention on vehicular ad hoc networks [10], [11]. Using this approach, [12] developed a method for the detection of traffic violations.…”
Section: A Speed Limit Violation Detectionmentioning
confidence: 99%
“…In [6], a traffic violation detection system is introduced by using a secured VANET cloud based application. Each vehicle periodically sends the data from its sensors, i.e.…”
Section: Related Workmentioning
confidence: 99%