- الوحدات والمجموعات
- تصفح النسخ ب :
- تاريخ النشر
- المؤلف
- العنوان
- الموضوع
الإطار الأمني ل VANET: المسح والتقييم
In the last few years, and with the massive development in wireless networks, high internet speeds, and car manufacturing improvements, more focus has been placed on Vehicular Ad-HOC Networks (VANETs). Consequently, many frameworks that serve VANETs were researched, and one of the main issues that were researched and tested is the security of VANETs. Despite that, a small number of research studies have considered the identification of performance standards and parameters. In this research paper, many of these VANET security frameworks were surveyed, studied and analyzed, and finally resulted identifying a list of performance evaluation parameters. These parameters counted forty, and afterwards they were defined and categorized based on the nature of the parameter, i.e., whether it is in the security, network or general context. These parameters were identified to be used by future researchers to have a base to work-on when it comes to evaluating their proposed VANET security frameworks. The implementation paradigms of the surveyed security frameworks were also identified, revealing that all the surveyed researches used simulation for implementation and testing. The simulators used in the simulation processes were also analyzed, and the results of this study showed that most of the surveyed studies used the NS-2 simulator, with a usage percentage of 54.4%. Not all researched studies used specific urban scenario, however, among the studies that had this specification in place,
العنوان: | الإطار الأمني ل VANET: المسح والتقييم |
عناوين أخرى: | Security Framework for VANET: Survey and Evaluation |
المؤلفون: | Felemban, Emad AL-Bogami, Salem |
الموضوعات :: | الحاسب الآلي |
تاريخ النشر :: | 2020 |
الناشر :: | جامعة أم القرى |
الملخص: | In the last few years, and with the massive development in wireless networks, high internet speeds, and car manufacturing improvements, more focus has been placed on Vehicular Ad-HOC Networks (VANETs). Consequently, many frameworks that serve VANETs were researched, and one of the main issues that were researched and tested is the security of VANETs. Despite that, a small number of research studies have considered the identification of performance standards and parameters. In this research paper, many of these VANET security frameworks were surveyed, studied and analyzed, and finally resulted identifying a list of performance evaluation parameters. These parameters counted forty, and afterwards they were defined and categorized based on the nature of the parameter, i.e., whether it is in the security, network or general context. These parameters were identified to be used by future researchers to have a base to work-on when it comes to evaluating their proposed VANET security frameworks. The implementation paradigms of the surveyed security frameworks were also identified, revealing that all the surveyed researches used simulation for implementation and testing. The simulators used in the simulation processes were also analyzed, and the results of this study showed that most of the surveyed studies used the NS-2 simulator, with a usage percentage of 54.4%. Not all researched studies used specific urban scenario, however, among the studies that had this specification in place, |
الوصف :: | 48 ورقة |
الرابط: | http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/132089 |
يظهر في المجموعات : | الرسائل العلمية المحدثة |
ملف | الوصف | الحجم | التنسيق | |
---|---|---|---|---|
24396.pdf " الوصول المحدود" | الرسالة الكاملة | 951.68 kB | Adobe PDF | عرض/ فتحطلب نسخة |
absa24396.pdf " الوصول المحدود" | ملخص الرسالة بالعربي | 101.91 kB | Adobe PDF | عرض/ فتحطلب نسخة |
abse24396.pdf " الوصول المحدود" | ملخص الرسالة بالإنجليزي | 28.88 kB | Adobe PDF | عرض/ فتحطلب نسخة |
cont24396.pdf " الوصول المحدود" | فهرس الموضوعات | 110.94 kB | Adobe PDF | عرض/ فتحطلب نسخة |
indu24396.pdf " الوصول المحدود" | المقدمة | 324.69 kB | Adobe PDF | عرض/ فتحطلب نسخة |
title24396.pdf " الوصول المحدود" | غلاف | 57.82 kB | Adobe PDF | عرض/ فتحطلب نسخة |
جميع الأوعية على المكتبة الرقمية محمية بموجب حقوق النشر، ما لم يذكر خلاف ذلك
تعليقات (0)