The alliance effects of technological innovation strategic alliance: A comparative analysis between EIT KICs and ITISAs
In: Innovation: the European journal of social science research, S. 1-19
ISSN: 1469-8412
44 Ergebnisse
Sortierung:
In: Innovation: the European journal of social science research, S. 1-19
ISSN: 1469-8412
In: Environmental science and pollution research: ESPR, Band 30, Heft 48, S. 106514-106532
ISSN: 1614-7499
In: International journal of academic research in business and social sciences: IJ-ARBSS, Band 13, Heft 1
ISSN: 2222-6990
In: Environmental science and pollution research: ESPR, Band 23, Heft 5, S. 4692-4699
ISSN: 1614-7499
In: Waste management: international journal of integrated waste management, science and technology, Band 23, Heft 2, S. 103-106
ISSN: 1879-2456
In: Springer eBook Collection
In: Environmental science and pollution research: ESPR, Band 21, Heft 16, S. 9717-9726
ISSN: 1614-7499
In: Waste management: international journal of integrated waste management, science and technology, Band 27, Heft 11, S. 1557-1561
ISSN: 1879-2456
In: Milliy yeziqta qanun omumlashturushqa dair kitablar, räsimgä qarap qanun öginish
In: Environmental science and pollution research: ESPR, Band 30, Heft 48, S. 105685-105699
ISSN: 1614-7499
In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Everything (V2X) technologies are widely adopted in future autonomous vehicles. However, security issues have not been fully addressed in V2V and V2I systems, especially in key distribution and key management. The physical layer key generation, which exploits wireless channel reciprocity and randomness to generate secure keys, provides a feasible solution for secure V2V/V2I communication. It is lightweight, flexible, and dynamic. In this paper, the physical layer key generation is brought to the V2I and V2V scenarios. A LoRa-based physical key generation scheme is designed for securing V2V/V2I communications. The communication is based on Long Range (LoRa) protocol, which is able to measure Received Signal Strength Indicator (RSSI) in long-distance as consensus information to generate secure keys. The multi-bit quantization algorithm, with an improved Cascade key agreement protocol, generates secure binary bit keys. The proposed schemes improved the key generation rate, as well as to avoid information leakage during transmission. The proposed physical layer key generation scheme was implemented in a V2V/V2I network system prototype. The extensive experiments in V2I and V2V environments evaluate the efficiency of the proposed key generation scheme. The experiments in real outdoor environments have been conducted. Its key generation rate could exceed 10 bit/s on our V2V/V2I network system prototype and achieve 20 bit/s in some of our experiments. For binary key sequences, all of them pass the suite of statistical tests from National Institute of Standards and Technology (NIST).
BASE
In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Everything (V2X) technologies are widely adopted in future autonomous vehicles. However, security issues have not been fully addressed in V2V and V2I systems, especially in key distribution and key management. The physical layer key generation, which exploits wireless channel reciprocity and randomness to generate secure keys, provides a feasible solution for secure V2V/V2I communication. It is lightweight, flexible, and dynamic. In this paper, the physical layer key generation is brought to the V2I and V2V scenarios. A LoRa-based physical key generation scheme is designed for securing V2V/V2I communications. The communication is based on Long Range (LoRa) protocol, which is able to measure Received Signal Strength Indicator (RSSI) in long-distance as consensus information to generate secure keys. The multi-bit quantization algorithm, with an improved Cascade key agreement protocol, generates secure binary bit keys. The proposed schemes improved the key generation rate, as well as to avoid information leakage during transmission. The proposed physical layer key generation scheme was implemented in a V2V/V2I network system prototype. The extensive experiments in V2I and V2V environments evaluate the efficiency of the proposed key generation scheme. The experiments in real outdoor environments have been conducted. Its key generation rate could exceed 10 bit/s on our V2V/V2I network system prototype and achieve 20 bit/s in some of our experiments. For binary key sequences, all of them pass the suite of statistical tests from National Institute of Standards and Technology (NIST).
BASE
In: Environmental science and pollution research: ESPR, Band 24, Heft 1, S. 676-684
ISSN: 1614-7499
In: Emerging markets, finance and trade: EMFT, Band 52, Heft 6, S. 1298-1304
ISSN: 1558-0938
In: Progress in nuclear energy: the international review journal covering all aspects of nuclear energy, Band 78, S. 36-46
ISSN: 0149-1970