New proxy re-encryption method to evaluate performance of V2V communication in a straight road scenario

Author(s):  
M. Kaur ◽  
Rajni ◽  
P. Singh
2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Author(s):  
Rajesh Kumar Gupta ◽  
L. N. Padhy ◽  
Sanjay Kumar Padhi

Traffic congestion on road networks is one of the most significant problems that is faced in almost all urban areas. Driving under traffic congestion compels frequent idling, acceleration, and braking, which increase energy consumption and wear and tear on vehicles. By efficiently maneuvering vehicles, traffic flow can be improved. An Adaptive Cruise Control (ACC) system in a car automatically detects its leading vehicle and adjusts the headway by using both the throttle and the brake. Conventional ACC systems are not suitable in congested traffic conditions due to their response delay.  For this purpose, development of smart technologies that contribute to improved traffic flow, throughput and safety is needed. In today’s traffic, to achieve the safe inter-vehicle distance, improve safety, avoid congestion and the limited human perception of traffic conditions and human reaction characteristics constrains should be analyzed. In addition, erroneous human driving conditions may generate shockwaves in addition which causes traffic flow instabilities. In this paper to achieve inter-vehicle distance and improved throughput, we consider Cooperative Adaptive Cruise Control (CACC) system. CACC is then implemented in Smart Driving System. For better Performance, wireless communication is used to exchange Information of individual vehicle. By introducing vehicle to vehicle (V2V) communication and vehicle to roadside infrastructure (V2R) communications, the vehicle gets information not only from its previous and following vehicle but also from the vehicles in front of the previous Vehicle and following vehicle. This enables a vehicle to follow its predecessor at a closer distance under tighter control.


PhotoniX ◽  
2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Deming Peng ◽  
Zhaofeng Huang ◽  
Yonglei Liu ◽  
Yahong Chen ◽  
Fei Wang ◽  
...  

AbstractInformation encryption with optical technologies has become increasingly important due to remarkable multidimensional capabilities of light fields. However, the optical encryption protocols proposed to date have been primarily based on the first-order field characteristics, which are strongly affected by interference effects and make the systems become quite unstable during light–matter interaction. Here, we introduce an alternative optical encryption protocol whereby the information is encoded into the second-order spatial coherence distribution of a structured random light beam via a generalized van Cittert–Zernike theorem. We show that the proposed approach has two key advantages over its conventional counterparts. First, the complexity of measuring the spatial coherence distribution of light enhances the encryption protocol security. Second, the relative insensitivity of the second-order statistical characteristics of light to environmental noise makes the protocol robust against the environmental fluctuations, e.g, the atmospheric turbulence. We carry out experiments to demonstrate the feasibility of the coherence-based encryption method with the aid of a fractional Fourier transform. Our results open up a promising avenue for further research into optical encryption in complex environments.


2021 ◽  
Vol 184 ◽  
pp. 372-379
Author(s):  
Darko Frtunik ◽  
Amolika Sinha ◽  
Hanna Grzybowska ◽  
Navreet Virdi ◽  
S. Travis Waller ◽  
...  

Author(s):  
Jan Camenisch ◽  
Manu Drijvers ◽  
Anja Lehmann ◽  
Gregory Neven ◽  
Patrick Towa

Polymers ◽  
2021 ◽  
Vol 13 (9) ◽  
pp. 1358
Author(s):  
Taihui Wu ◽  
Jianshe Ma ◽  
Chengchen Wang ◽  
Haibei Wang ◽  
Liangcai Cao ◽  
...  

An optical encryption method based on computer generated holograms printing of photopolymer is presented. Fraunhofer diffraction is performed based on the Gerchberg-Saxton algorithm, and a hologram of the Advanced Encryption Standard encrypted Quick Response code is generated to record the ciphertext. The holograms of the key and the three-dimensional image are generated by the angular spectrum diffraction algorithm. The experimental results show that large-size encrypted Quick Response (QR) code and miniature keys can be printed in photopolymers, which has good application prospects in optical encryption. This method has the advantages of high-density storage, high speed, large fault tolerance, and anti-peeping.


Sign in / Sign up

Export Citation Format

Share Document