This book provides a comprehensive investigation on new technologies for future vehicular networks. The authors propose different schemes to efficiently manage the multi-dimensional resources for supporting diversified applications. The authors answer the questions of why connected and automated vehicle technology should be considered; how the multi-access edge computing (MEC) and unmanned aerial vehicle (UAV) technologies can be helpful to vehicular networks; how to efficiently manage the multi-dimensional resources to support different vehicular applications with guaranteed...
This book provides a comprehensive investigation on new technologies for future vehicular networks. The authors propose different schemes to effici...
This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature....
This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five dif...